The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Chin-Tser Huang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Sen Xu, Manton M. Matthews, Chin-Tser Huang
    Security issues in privacy and key management protocols of IEEE 802.16. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:113-118 [Conf]
  2. Xinliang Zheng, Chin-Tser Huang, Manton M. Matthews
    Chinese remainder theorem based group key management. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2007, pp:266-271 [Conf]
  3. Mohamed G. Gouda, Chin-Tser Huang, E. N. Elnozahy
    Key Trees and the Security of Interval Multicast. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2002, pp:467-468 [Conf]
  4. Chin-Tser Huang, Mohamed G. Gouda
    State Checksum and Its Role in System Stabilization. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2005, pp:29-34 [Conf]
  5. Chin-Tser Huang, Mohamed G. Gouda, E. N. Elnozahy
    Convergence of IPsec in Presence of Resets. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2003, pp:22-27 [Conf]
  6. Mohamed G. Gouda, E. N. Elnozahy, Chin-Tser Huang, Tommy M. McGuire
    Hop Integrity in Computer Networks. [Citation Graph (0, 0)][DBLP]
    ICNP, 2000, pp:3-11 [Conf]
  7. Mohamed G. Gouda, Chin-Tser Huang, Anish Arora
    On the Security and Vulnerability of PING. [Citation Graph (0, 0)][DBLP]
    WSS, 2001, pp:124-135 [Conf]
  8. Mohamed G. Gouda, Chin-Tser Huang
    A secure address resolution protocol. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2003, v:41, n:1, pp:57-71 [Journal]
  9. Chin-Tser Huang, Mohamed G. Gouda, E. N. Elnozahy
    Convergence of IPsec in presence of resets. [Citation Graph (0, 0)][DBLP]
    J. High Speed Networks, 2006, v:15, n:2, pp:173-183 [Journal]
  10. Mohamed G. Gouda, E. N. Elnozahy, Chin-Tser Huang, Tommy M. McGuire
    Hop integrity in computer networks. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2002, v:10, n:3, pp:308-319 [Journal]
  11. Mohamed G. Gouda, Jorge Arturo Cobb, Chin-Tser Huang
    Fault Masking in Tri-redundant Systems. [Citation Graph (0, 0)][DBLP]
    SSS, 2006, pp:304-313 [Conf]

  12. P2F: A User-Centric Privacy Protection Framework. [Citation Graph (, )][DBLP]


  13. Containing Hitlist-Based Worms with Polymorphic Signatures. [Citation Graph (, )][DBLP]


  14. Fates: A Granular Approach to Real-Time Anomaly Detection. [Citation Graph (, )][DBLP]


  15. Fast and Secure Mobility for IEEE 802.16e Broadband Wireless Networks. [Citation Graph (, )][DBLP]


  16. Stabilization of Maximal-Metric Routing without Knowledge of Network Size. [Citation Graph (, )][DBLP]


  17. LOFT: Low-Overhead Freshness Transmission in Sensor Networks. [Citation Graph (, )][DBLP]


  18. On capturing and containing E-mail worms. [Citation Graph (, )][DBLP]


  19. Improving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks. [Citation Graph (, )][DBLP]


  20. Multi-dimensional credentialing using veiled certificates: Protecting privacy in the face of regulatory reporting requirements. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002