The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Wenjing Lou: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Kui Ren, Wenjing Lou
    Privacy enhanced access control in pervasive computing environments. [Citation Graph (0, 0)][DBLP]
    BROADNETS, 2005, pp:384-396 [Conf]
  2. Wenjing Lou, Wei Liu, Yuguang Fang
    SPREAD: Enhancing Data Confidentiality in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2004, pp:- [Conf]
  3. Yanchao Zhang, Wei Liu, Wenjing Lou
    Anonymous communications in mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2005, pp:1940-1951 [Conf]
  4. Wei Liu, Yanchao Zhang, Wenjing Lou, Yuguang Fang
    Managing Wireless Sensor Networks with Supply Chain Strategy. [Citation Graph (0, 0)][DBLP]
    QSHINE, 2004, pp:59-66 [Conf]
  5. Kui Ren, Kai Zeng, Wenjing Lou, Patrick J. Moran
    On Broadcast Authentication in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    WASA, 2006, pp:502-514 [Conf]
  6. Wei Liu, Wenjing Lou, Yuguang Fang
    An efficient quality of service routing algorithm for delay-sensitive applications. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2005, v:47, n:1, pp:87-104 [Journal]
  7. Kui Ren, Wenjing Lou, Kai Zeng, Feng Bao, Jianying Zhou, Robert H. Deng
    Routing optimization security in mobile IPv6. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2006, v:50, n:13, pp:2401-2419 [Journal]
  8. Arun Avudainayagam, Wenjing Lou, Yuguang Fang
    DEAR: A Device and Energy Aware Routing protocol for heterogeneous ad hoc networks. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 2003, v:63, n:2, pp:228-236 [Journal]
  9. Kui Ren, Wenjing Lou
    Privacy-enhanced, Attack-resilient Access Control in Pervasive Computing Environments with Optional Context Authentication Capability. [Citation Graph (0, 0)][DBLP]
    MONET, 2007, v:12, n:1, pp:79-92 [Journal]
  10. Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang
    Securing Mobile Ad Hoc Networks with Certificateless Public Keys. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2006, v:3, n:4, pp:386-399 [Journal]
  11. Kui Ren, Kai Zeng, Wenjing Lou
    A new approach for random key pre-distribution in large-scale wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    , 2006, v:, n:, pp:307-318 [Journal]
  12. Wei Liu, Yanchao Zhang, Wenjing Lou, Yuguang Fang
    A robust and energy-efficient data dissemination framework for wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 2006, v:12, n:4, pp:465-479 [Journal]
  13. Wenjing Lou, Yuguang Fang
    Predictive Caching Strategy for On-Demand Routing Protocols in Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 2002, v:8, n:6, pp:671-679 [Journal]
  14. Kui Ren, Wenjing Lou, Yanchao Zhang
    LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2006, pp:- [Conf]
  15. Kui Ren, Kai Zeng, Wenjing Lou
    Fault-tolerant Event Boundary Detection in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  16. Yanchao Zhang, Wenjing Lou, Wei Liu, Yuguang Fang
    A secure incentive protocol for mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 2007, v:13, n:5, pp:569-582 [Journal]

  17. Attribute based data sharing with attribute revocation. [Citation Graph (, )][DBLP]


  18. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing. [Citation Graph (, )][DBLP]


  19. FSA: A Fast Coordination Scheme for Opportunistic Routing. [Citation Graph (, )][DBLP]


  20. A Sophisticated Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks. [Citation Graph (, )][DBLP]


  21. Secure Ranked Keyword Search over Encrypted Cloud Data. [Citation Graph (, )][DBLP]


  22. Optimized User Revocation for Group Signature Based Privacy-Aware PKI. [Citation Graph (, )][DBLP]


  23. On End-to-End Throughput of Opportunistic Routing in Multirate and Multihop Wireless Networks. [Citation Graph (, )][DBLP]


  24. Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance. [Citation Graph (, )][DBLP]


  25. FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  26. Group Device Pairing based Secure Sensor Association and Key Management for Body Area Networks. [Citation Graph (, )][DBLP]


  27. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing. [Citation Graph (, )][DBLP]


  28. Fuzzy Keyword Search over Encrypted Data in Cloud Computing. [Citation Graph (, )][DBLP]


  29. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing. [Citation Graph (, )][DBLP]


  30. Opportunistic Routing in Multi-radio Multi-channel Multi-hop Wireless Networks. [Citation Graph (, )][DBLP]


  31. A Network Coding Approach to Reliable Broadcast in Wireless Mesh Networks. [Citation Graph (, )][DBLP]


  32. Towards Secure Link Quality Measurement in Multihop Wireless Networks. [Citation Graph (, )][DBLP]


  33. R-Code: Network Coding Based Reliable Broadcast in Wireless Mesh Networks with Unreliable Links. [Citation Graph (, )][DBLP]


  34. Multi-user Broadcast Authentication in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  35. Anonymous ID-Based Group Key Agreement for Wireless Networks. [Citation Graph (, )][DBLP]


  36. Attribute-based on-demand multicast group setup with membership anonymity. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002