The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Kun Sun: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Donggang Liu, Peng Ning, Kun Sun
    Efficient self-healing group key distribution with revocation capability. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:231-240 [Conf]
  2. Kun Sun, Peng Ning, Cliff Wang
    TinySeRSync: secure and resilient time synchronization in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:264-277 [Conf]
  3. Peng Ning, Kun Sun
    How to Misuse AODV: A Case Study of Insiider Attacks against Mobile Ad-hoc Routing Protocols. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:60-67 [Conf]
  4. Qiang Guo, Xin Yang, Ming Zhu, Kun Sun
    Anisotropic 3D Reconstruction and Restoration for Rotation-Scanning 4D Echocardiographic Images Based on MAP-MRF. [Citation Graph (0, 0)][DBLP]
    IbPRIA (2), 2005, pp:487-494 [Conf]
  5. Sheng Chen, Xin Yang, Liping Yao, Kun Sun
    Segmentation in Echocardiographic Sequences Using Shape-Based Snake Model. [Citation Graph (0, 0)][DBLP]
    ICIAP, 2005, pp:375-382 [Conf]
  6. Chen Sheng, Xin Yang, Liping Yao, Kun Sun
    Total Variation-Based Speckle Reduction Using Multi-grid Algorithm for Ultrasound Images. [Citation Graph (0, 0)][DBLP]
    ICIAP, 2005, pp:245-252 [Conf]
  7. Boi Faltings, Kun Sun
    Computer-Aided Creative Mechanism Design. [Citation Graph (0, 0)][DBLP]
    IJCAI, 1993, pp:1451-1459 [Conf]
  8. Boi Faltings, Kun Sun
    Computer-Aided Creative Mechanism Design. [Citation Graph (0, 0)][DBLP]
    IJCAI, 1995, pp:2055-2056 [Conf]
  9. Peng Ning, Kun Sun
    How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols. [Citation Graph (0, 0)][DBLP]
    Ad Hoc Networks, 2005, v:3, n:6, pp:795-819 [Journal]
  10. Boi Faltings, Kun Sun
    FAMING: Supporting innovative mechanism shape design. [Citation Graph (0, 0)][DBLP]
    Computer-Aided Design, 1996, v:28, n:3, pp:207-216 [Journal]
  11. Kun Sun, Peng Ning, Cliff Wang
    Fault-Tolerant Cluster-Wise Clock Synchronization for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:3, pp:177-189 [Journal]
  12. Kun Sun, Pai Peng, Peng Ning, Cliff Wang
    Secure Distributed Cluster Formation in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:131-140 [Conf]

  13. A SNMPv3 Replay Protection Scheme Used in Space Network Based on Random Number. [Citation Graph (, )][DBLP]


  14. Securing network access in wireless sensor networks. [Citation Graph (, )][DBLP]


  15. Dynamic Modeling and Control of Rigid-Flexible Constrained Robot with Three Links. [Citation Graph (, )][DBLP]


  16. Design and Implementation of a P2P-Based Media Streaming System. [Citation Graph (, )][DBLP]


Search in 0.016secs, Finished in 0.017secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002