|
Search the dblp DataBase
Haowen Chan:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Haowen Chan, Adrian Perrig, Dawn Xiaodong Song
Secure hierarchical in-network aggregation in sensor networks. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2006, pp:278-287 [Conf]
- Haowen Chan, Mark Luk, Adrian Perrig
Using Clustering Information for Sensor Network Localization. [Citation Graph (0, 0)][DBLP] DCOSS, 2005, pp:109-125 [Conf]
- Haowen Chan, Adrian Perrig
ACE: An Emergent Algorithm for Highly Uniform Cluster Formation. [Citation Graph (0, 0)][DBLP] EWSN, 2004, pp:154-171 [Conf]
- Ross J. Anderson, Haowen Chan, Adrian Perrig
Key Infection: Smart Trust for Smart Dust. [Citation Graph (0, 0)][DBLP] ICNP, 2004, pp:206-215 [Conf]
- Haowen Chan, Adrian Perrig
PIKE: peer intermediaries for key establishment in sensor networks. [Citation Graph (0, 0)][DBLP] INFOCOM, 2005, pp:524-535 [Conf]
- Haowen Chan, Debabrata Dash, Adrian Perrig, Hui Zhang
Modeling adoptability of secure BGP protocol. [Citation Graph (0, 0)][DBLP] SIGCOMM, 2006, pp:279-290 [Conf]
- Haowen Chan, Debabrata Dash, Adrian Perrig, Hui Zhang
Modeling adoptability of secure BGP protocols. [Citation Graph (0, 0)][DBLP] SIGMETRICS/Performance, 2006, pp:389-390 [Conf]
- Haowen Chan, Adrian Perrig, Dawn Xiaodong Song
Random Key Predistribution Schemes for Sensor Networks. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2003, pp:197-0 [Conf]
- Haowen Chan, Adrian Perrig
Security and Privacy in Sensor Networks. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2003, v:36, n:10, pp:103-105 [Journal]
- Haowen Chan, Adrian Perrig, Bartosz Przydatek, Dawn Xiaodong Song
SIA: Secure information aggregation in sensor networks. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2007, v:15, n:1, pp:69-102 [Journal]
- Haowen Chan, Virgil D. Gligor, Adrian Perrig, Gautam Muralidharan
On the Distribution and Revocation of Cryptographic Keys in Sensor Networks. [Citation Graph (0, 0)][DBLP] IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:3, pp:233-247 [Journal]
Efficient security primitives derived from a secure aggregation algorithm. [Citation Graph (, )][DBLP]
Secure outsourced aggregation via one-way chains. [Citation Graph (, )][DBLP]
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.003secs
|