The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Guorui Li: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Guorui Li, Jingsha He, Yingfang Fu
    A Group-Based Dynamic Key Management Scheme in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (2), 2007, pp:127-132 [Conf]
  2. Guorui Li, Jingsha He, Yingfang Fu
    A Hexagon-Based Key Predistribution Scheme in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 2006, pp:175-180 [Conf]
  3. Yingfang Fu, Jingsha He, Guorui Li
    A Composite Key Management Scheme for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    OTM Workshops (1), 2006, pp:575-584 [Conf]
  4. Guorui Li, Jingsha He, Yingfang Fu
    Key Predistribution in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    UIC, 2006, pp:845-853 [Conf]
  5. Guorui Li, Jingsha He, Yingfang Fu
    Key Management in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    WASA, 2006, pp:457-466 [Conf]
  6. Yingfang Fu, Jingsha He, Guorui Li
    A Distributed Intrusion Detection Scheme for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2007, pp:75-80 [Conf]
  7. Guorui Li, Jingsha He, Yingfang Fu
    Analysis of an Adaptive Key Selection Scheme in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (4), 2007, pp:409-416 [Conf]

  8. A Zone-Based Distributed Key Management Scheme for Wireless Mesh Networks. [Citation Graph (, )][DBLP]


  9. A Group-Based Intrusion Detection Scheme in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  10. Mutual Authentication in Wireless Mesh Networks. [Citation Graph (, )][DBLP]


  11. A Distributed Intrusion Detection Scheme for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  12. Secure Multiple Deployment in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  13. A Key Management Scheme Combined with Intrusion Detection for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  14. Efficient Group Key Management Scheme in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  15. Group-based intrusion detection system in wireless sensor networks. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002