A survey of applications of identity-based cryptography in mobile ad-hoc networks S Zhao, A Aggarwal, R Frost, X Bai IEEE Communications surveys & tutorials 14 (2), 380-400, 2011 | 141 | 2011 |
A key management and secure routing integrated framework for mobile ad-hoc networks S Zhao, R Kent, A Aggarwal Ad Hoc Networks 11 (3), 1046-1061, 2013 | 62 | 2013 |
PKI-based authentication mechanisms in grid systems S Zhao, A Aggarwal, RD Kent 2007 International Conference on Networking, Architecture, and Storage (NAS …, 2007 | 33 | 2007 |
Building secure user-to-user messaging in mobile telecommunication networks S Zhao, A Aggarwal, S Liu 2008 Wireless Telecommunications Symposium, 151-157, 2008 | 25 | 2008 |
A secure routing protocol in proactive security approach for mobile ad-hoc networks S Zhao, A Aggarwal, S Liu, H Wu 2008 IEEE wireless communications and networking conference, 2627-2632, 2008 | 17 | 2008 |
Improvement on OTP authentication and a possession-based authentication framework S Zhao, W Hu International Journal of Multimedia Intelligence and Security 3 (2), 187-203, 2018 | 14 | 2018 |
A simple taxonomy for mobile emergency announcement systems R Addams-Moring, M Kekkonen, S Zhao Proceedings of the 2nd International ISCRAM Conference 128, 2005 | 10 | 2005 |
An integrated key management and secure routing framework for mobile ad-hoc networks S Zhao, RD Kent, A Aggarwal 2012 Tenth Annual International Conference on Privacy, Security and Trust …, 2012 | 8 | 2012 |
A framework for revocation of proxy certificates in a grid S Zhao, A Aggarwal, RD Kent Eighth ACIS International Conference on Software Engineering, Artificial …, 2007 | 8 | 2007 |
Building mobile emergency announcement systems in 3G networks S Zhao, R Addams-Moring, M Kekkonen IASTED Communications and Computer Networks-CCN 2005, Marina del Rey, CA …, 2005 | 8 | 2005 |
Peer-to-peer Application in mobile cellular systems S Liu, J Chen, S Zhao, F Na Fifth International Conference on Information Technology: New Generations …, 2008 | 7 | 2008 |
A deployment tool for public safety ad-hoc networks S Zhao, D Jaskiewicz, J Karvo 2006 1st International Conference on Communication Systems Software …, 2006 | 7 | 2006 |
Against mobile attacks in Mobile Ad-hoc Networks S Zhao, A Aggarwal 2010 IEEE International Conference on Information Theory and Information …, 2010 | 6 | 2010 |
PAPA‐UIC: a design approach and a framework for secure mobile ad hoc networks S Zhao, A Aggarwal Security and Communication Networks 3 (5), 371-383, 2010 | 5 | 2010 |
General-purpose identity hiding schemes for ad-hoc networks S Zhao, A Aggarwal 2009 International Symposium on Intelligent Ubiquitous Computing and …, 2009 | 5 | 2009 |
Issues and solutions of applying identity-based cryptography to mobile ad-hoc networks S Zhao University of Windsor (Canada), 2012 | 3 | 2012 |
Fragmentation attack on wireless network A Patel, MF Mokbel, S Zhao Comput Sci Univ, 2007 | 3 | 2007 |
An improved scheme for image scaling, cropping and colour correction in encrypted domain S Zhao International Journal of Multimedia Intelligence and Security 4 (1), 86-99, 2022 | 2 | 2022 |
An add-on end-to-end secure email solution in mobile communications S Zhao, S Liu 10th EAI International Conference on Mobile Multimedia Communications, 57-61, 2017 | 2 | 2017 |
Security Vulnerabilities of Popular Multifactor Authentication Methods and a Remedy. S Zhao Journal of Network & Information Security 11 (1), 2023 | 1 | 2023 |