The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Haowen Chan: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Haowen Chan, Adrian Perrig, Dawn Xiaodong Song
    Secure hierarchical in-network aggregation in sensor networks. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:278-287 [Conf]
  2. Haowen Chan, Mark Luk, Adrian Perrig
    Using Clustering Information for Sensor Network Localization. [Citation Graph (0, 0)][DBLP]
    DCOSS, 2005, pp:109-125 [Conf]
  3. Haowen Chan, Adrian Perrig
    ACE: An Emergent Algorithm for Highly Uniform Cluster Formation. [Citation Graph (0, 0)][DBLP]
    EWSN, 2004, pp:154-171 [Conf]
  4. Ross J. Anderson, Haowen Chan, Adrian Perrig
    Key Infection: Smart Trust for Smart Dust. [Citation Graph (0, 0)][DBLP]
    ICNP, 2004, pp:206-215 [Conf]
  5. Haowen Chan, Adrian Perrig
    PIKE: peer intermediaries for key establishment in sensor networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2005, pp:524-535 [Conf]
  6. Haowen Chan, Debabrata Dash, Adrian Perrig, Hui Zhang
    Modeling adoptability of secure BGP protocol. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2006, pp:279-290 [Conf]
  7. Haowen Chan, Debabrata Dash, Adrian Perrig, Hui Zhang
    Modeling adoptability of secure BGP protocols. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS/Performance, 2006, pp:389-390 [Conf]
  8. Haowen Chan, Adrian Perrig, Dawn Xiaodong Song
    Random Key Predistribution Schemes for Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2003, pp:197-0 [Conf]
  9. Haowen Chan, Adrian Perrig
    Security and Privacy in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2003, v:36, n:10, pp:103-105 [Journal]
  10. Haowen Chan, Adrian Perrig, Bartosz Przydatek, Dawn Xiaodong Song
    SIA: Secure information aggregation in sensor networks. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2007, v:15, n:1, pp:69-102 [Journal]
  11. Haowen Chan, Virgil D. Gligor, Adrian Perrig, Gautam Muralidharan
    On the Distribution and Revocation of Cryptographic Keys in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:3, pp:233-247 [Journal]

  12. Efficient security primitives derived from a secure aggregation algorithm. [Citation Graph (, )][DBLP]


  13. Secure outsourced aggregation via one-way chains. [Citation Graph (, )][DBLP]


  14. Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes. [Citation Graph (, )][DBLP]


Search in 0.016secs, Finished in 0.017secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002