Segui
Shushan Zhao
Titolo
Citata da
Citata da
Anno
A survey of applications of identity-based cryptography in mobile ad-hoc networks
S Zhao, A Aggarwal, R Frost, X Bai
IEEE Communications surveys & tutorials 14 (2), 380-400, 2011
1412011
A key management and secure routing integrated framework for mobile ad-hoc networks
S Zhao, R Kent, A Aggarwal
Ad Hoc Networks 11 (3), 1046-1061, 2013
622013
PKI-based authentication mechanisms in grid systems
S Zhao, A Aggarwal, RD Kent
2007 International Conference on Networking, Architecture, and Storage (NAS …, 2007
332007
Building secure user-to-user messaging in mobile telecommunication networks
S Zhao, A Aggarwal, S Liu
2008 Wireless Telecommunications Symposium, 151-157, 2008
252008
A secure routing protocol in proactive security approach for mobile ad-hoc networks
S Zhao, A Aggarwal, S Liu, H Wu
2008 IEEE wireless communications and networking conference, 2627-2632, 2008
172008
Improvement on OTP authentication and a possession-based authentication framework
S Zhao, W Hu
International Journal of Multimedia Intelligence and Security 3 (2), 187-203, 2018
142018
A simple taxonomy for mobile emergency announcement systems
R Addams-Moring, M Kekkonen, S Zhao
Proceedings of the 2nd International ISCRAM Conference 128, 2005
102005
An integrated key management and secure routing framework for mobile ad-hoc networks
S Zhao, RD Kent, A Aggarwal
2012 Tenth Annual International Conference on Privacy, Security and Trust …, 2012
82012
A framework for revocation of proxy certificates in a grid
S Zhao, A Aggarwal, RD Kent
Eighth ACIS International Conference on Software Engineering, Artificial …, 2007
82007
Building mobile emergency announcement systems in 3G networks
S Zhao, R Addams-Moring, M Kekkonen
IASTED Communications and Computer Networks-CCN 2005, Marina del Rey, CA …, 2005
82005
Peer-to-peer Application in mobile cellular systems
S Liu, J Chen, S Zhao, F Na
Fifth International Conference on Information Technology: New Generations …, 2008
72008
A deployment tool for public safety ad-hoc networks
S Zhao, D Jaskiewicz, J Karvo
2006 1st International Conference on Communication Systems Software …, 2006
72006
Against mobile attacks in Mobile Ad-hoc Networks
S Zhao, A Aggarwal
2010 IEEE International Conference on Information Theory and Information …, 2010
62010
PAPA‐UIC: a design approach and a framework for secure mobile ad hoc networks
S Zhao, A Aggarwal
Security and Communication Networks 3 (5), 371-383, 2010
52010
General-purpose identity hiding schemes for ad-hoc networks
S Zhao, A Aggarwal
2009 International Symposium on Intelligent Ubiquitous Computing and …, 2009
52009
Issues and solutions of applying identity-based cryptography to mobile ad-hoc networks
S Zhao
University of Windsor (Canada), 2012
32012
Fragmentation attack on wireless network
A Patel, MF Mokbel, S Zhao
Comput Sci Univ, 2007
32007
An improved scheme for image scaling, cropping and colour correction in encrypted domain
S Zhao
International Journal of Multimedia Intelligence and Security 4 (1), 86-99, 2022
22022
An add-on end-to-end secure email solution in mobile communications
S Zhao, S Liu
10th EAI International Conference on Mobile Multimedia Communications, 57-61, 2017
22017
Security Vulnerabilities of Popular Multifactor Authentication Methods and a Remedy.
S Zhao
Journal of Network & Information Security 11 (1), 2023
12023
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20