Search the dblp DataBase
Chin-Tser Huang :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Sen Xu , Manton M. Matthews , Chin-Tser Huang Security issues in privacy and key management protocols of IEEE 802.16. [Citation Graph (0, 0)][DBLP ] ACM Southeast Regional Conference, 2006, pp:113-118 [Conf ] Xinliang Zheng , Chin-Tser Huang , Manton M. Matthews Chinese remainder theorem based group key management. [Citation Graph (0, 0)][DBLP ] ACM Southeast Regional Conference, 2007, pp:266-271 [Conf ] Mohamed G. Gouda , Chin-Tser Huang , E. N. Elnozahy Key Trees and the Security of Interval Multicast. [Citation Graph (0, 0)][DBLP ] ICDCS, 2002, pp:467-468 [Conf ] Chin-Tser Huang , Mohamed G. Gouda State Checksum and Its Role in System Stabilization. [Citation Graph (0, 0)][DBLP ] ICDCS Workshops, 2005, pp:29-34 [Conf ] Chin-Tser Huang , Mohamed G. Gouda , E. N. Elnozahy Convergence of IPsec in Presence of Resets. [Citation Graph (0, 0)][DBLP ] ICDCS Workshops, 2003, pp:22-27 [Conf ] Mohamed G. Gouda , E. N. Elnozahy , Chin-Tser Huang , Tommy M. McGuire Hop Integrity in Computer Networks. [Citation Graph (0, 0)][DBLP ] ICNP, 2000, pp:3-11 [Conf ] Mohamed G. Gouda , Chin-Tser Huang , Anish Arora On the Security and Vulnerability of PING. [Citation Graph (0, 0)][DBLP ] WSS, 2001, pp:124-135 [Conf ] Mohamed G. Gouda , Chin-Tser Huang A secure address resolution protocol. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2003, v:41, n:1, pp:57-71 [Journal ] Chin-Tser Huang , Mohamed G. Gouda , E. N. Elnozahy Convergence of IPsec in presence of resets. [Citation Graph (0, 0)][DBLP ] J. High Speed Networks, 2006, v:15, n:2, pp:173-183 [Journal ] Mohamed G. Gouda , E. N. Elnozahy , Chin-Tser Huang , Tommy M. McGuire Hop integrity in computer networks. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 2002, v:10, n:3, pp:308-319 [Journal ] Mohamed G. Gouda , Jorge Arturo Cobb , Chin-Tser Huang Fault Masking in Tri-redundant Systems. [Citation Graph (0, 0)][DBLP ] SSS, 2006, pp:304-313 [Conf ] P2F: A User-Centric Privacy Protection Framework. [Citation Graph (, )][DBLP ] Containing Hitlist-Based Worms with Polymorphic Signatures. [Citation Graph (, )][DBLP ] Fates: A Granular Approach to Real-Time Anomaly Detection. [Citation Graph (, )][DBLP ] Fast and Secure Mobility for IEEE 802.16e Broadband Wireless Networks. [Citation Graph (, )][DBLP ] Stabilization of Maximal-Metric Routing without Knowledge of Network Size. [Citation Graph (, )][DBLP ] LOFT: Low-Overhead Freshness Transmission in Sensor Networks. [Citation Graph (, )][DBLP ] On capturing and containing E-mail worms. [Citation Graph (, )][DBLP ] Improving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks. [Citation Graph (, )][DBLP ] Multi-dimensional credentialing using veiled certificates: Protecting privacy in the face of regulatory reporting requirements. [Citation Graph (, )][DBLP ] Search in 0.004secs, Finished in 0.005secs