|
Search the dblp DataBase
Xukai Zou:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Xukai Zou, Byrav Ramamurthy
A Simple Group Diffie-Hellman Key Agreement Protocol Without Member Serialization. [Citation Graph (0, 0)][DBLP] CIS, 2004, pp:725-731 [Conf]
- Yuan-Shun Dai, Michael G. Hinchey, Manish Madhusoodan, James L. Rash, Xukai Zou
A Prototype Model for Self-Healing and Self-Reproduction In Swarm Robotics System. [Citation Graph (0, 0)][DBLP] DASC, 2006, pp:3-10 [Conf]
- Yuan-Shun Dai, Michael G. Hinchey, Mingrui Qi, Xukai Zou
Autonomic Security and Self-Protection based on Feature-Recognition with Virtual Neurons. [Citation Graph (0, 0)][DBLP] DASC, 2006, pp:227-234 [Conf]
- Omkar J. Tilak, Rajeev R. Raje, Xukai Zou
Composing Access Control Policies of Distributed Components. [Citation Graph (0, 0)][DBLP] DASC, 2006, pp:301-307 [Conf]
- Amandeep Thukral, Xukai Zou
Secure Group Instant Messaging Using Cryptographic Primitives. [Citation Graph (0, 0)][DBLP] ICCNMC, 2005, pp:1002-1011 [Conf]
- Xukai Zou, Byrav Ramamurthy, Spyros S. Magliveras
Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication. [Citation Graph (0, 0)][DBLP] ICICS, 2001, pp:381-385 [Conf]
- Yogesh Karandikar, Xukai Zou, Yuan-Shun Dai
Secure Group Communication Based Scheme for Differential Access Control in Dynamic Environments. [Citation Graph (0, 0)][DBLP] ICPADS (2), 2005, pp:448-452 [Conf]
- Pratima Adusumilli, Xukai Zou
KTDCKM-SDC: A Distributed Conference Key Management Scheme for Secure Dynamic Conferencing. [Citation Graph (0, 0)][DBLP] ISCC, 2005, pp:476-481 [Conf]
- Xukai Zou, Byrav Ramamurthy, Spyros S. Magliveras
A GCD attack resistant CRTHACS for secure group communications. [Citation Graph (0, 0)][DBLP] ITCC (2), 2004, pp:153-154 [Conf]
- Xukai Zou, Amandeep Thukral, Byrav Ramamurthy
An Authenticated Key Agreement Protocol for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP] MSN, 2006, pp:509-520 [Conf]
- Xukai Zou, Byrav Ramamurthy
A block-free TGDH key agreement protocol for secure group communications. [Citation Graph (0, 0)][DBLP] Parallel and Distributed Computing and Networks, 2004, pp:288-293 [Conf]
- Xukai Zou, Byrav Ramamurthy, Spyros S. Magliveras
Efficient Key Management for Secure Group Communications with Bursty Behavior. [Citation Graph (0, 0)][DBLP] Communications, Internet, and Information Technology, 2002, pp:148-153 [Conf]
- Yuan-Shun Dai, Yi Pan, Xukai Zou
A Hierarchical Modeling and Analysis for Grid Service Reliability. [Citation Graph (0, 0)][DBLP] IEEE Trans. Computers, 2007, v:56, n:5, pp:681-691 [Journal]
- Xukai Zou, Yuan-Shun Dai, Bradley N. Doebbeling, Mingrui Qi
Dependability and Security in Medical Information System. [Citation Graph (0, 0)][DBLP] HCI (4), 2007, pp:549-558 [Conf]
- Xukai Zou, Yuan-Shun Dai, Xiang Ran
Dual-Level Key Management for secure grid communication in dynamic and hierarchical groups. [Citation Graph (0, 0)][DBLP] Future Generation Comp. Syst., 2007, v:23, n:6, pp:776-786 [Journal]
Pervasive and Trustworthy Healthcare. [Citation Graph (, )][DBLP]
A Multiple Secret Sharing Scheme based on Matrix Projection. [Citation Graph (, )][DBLP]
KeyRev: An Efficient Key Revocation Scheme for Wireless Sensor Networks. [Citation Graph (, )][DBLP]
Notes on the CRTDH Group Key Agreement Protocol. [Citation Graph (, )][DBLP]
A Practical and Flexible Key Management Mechanism For Trusted Collaborative Computing. [Citation Graph (, )][DBLP]
An Efficient Time-Bound Access Control Scheme for Dynamic Access Hierarchy. [Citation Graph (, )][DBLP]
Fuzzy Closeness-Based Delegation Forwarding in Delay Tolerant Networks. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
|