Biblio

Export 118 results:
Sort by:
Filters: Author is Wenjing Lou  [Clear All Filters]
2009
2008
Zeng, K., W. Lou, and H. Zhai, "Capacity of opportunistic routing in multirate and multihop wireless networks", IEEE Transactions on Wireless Communications, vol. 7, no. 12, 12/2008.
Zeng, K., K. R. Shucheng Yu, W. Lou, and Y. Zhang, "Towards secure link quality measurement in multihop wireless networks", IEEE Global Telecommunications Conference (GLOBECOM 2008), New Orleans, LA, USA, 11/2008.
Yu, S., K. Ren, and W. Lou, "Attribute-based content distribution with hidden policy", The 4th Workshop on Secure Network Protocols (NPSec 2008), Orlando, FL, USA, 10/2008.
Yu, S., K. Ren, and W. Lou, "Attribute-based on-demand multicast group Setup with receiver anonymity", The 4th International Conference on Security and Privacy in Communication Networks (SecureComm 2008), Istanbul, Turkey, 09/2008.
Ren, W., K. Ren, W. Lou, and Y. Zhang, "Efficient User Revocation for Privacy-aware PKI", The Fifth International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QShine 2008), Hong Kong, China, 07/2008.
Li, M., and W. Lou, "Opportunistic Broadcast of Emergency Messages in Vehicular Ad Hoc Networks with Unreliable Links", The Fifth International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QShine 2008), Hong Kong, China, 07/2008.
Ren, W., K. Ren, and W. Lou, "Optimized User Revocation for Group Signature Based Privacy-aware PKI", The First International Workshop on Wireless Security and Privacy (WiSP'08), Beijing, China, 06/2008.
Ren, K., and W. Lou, "A sophisticated privacy-enhanced yet accountable security framework for wireless mesh networks", The 28th International Conference on Distributed Computing Systems (ICDCS 2008), Beijing, China, 06/2008.
Wan, Z., K. Ren, W. Lou, and B. Preneel, "Anonymous ID-based group key agreement for wireless networks", IEEE Wireless Communications and Networking Conference (WCNC’2008), Las Vegas, 03/2008.
Guo, W., X. Huang, W. Lou, and C. Liang, "On relay node placement and assignment for two-tiered wireless networks", ACM Mobile Networks and Applications (MONET), special issue on "Advances in wireless mesh networks", vol. 13, 01/2008.
Ren, K., K. Zeng, and W. Lou, "Secure and fault-tolerant event boundary detection in wireless sensor networks", IEEE Transactions on Wireless Communications, vol. 7, no. 1, 01/2008.
Ren, K., W. Lou, and Y. Zhang, "Multi-user broadcast authentication in wireless sensor networks", Encyclopedia on Ad Hoc and Ubiquitous Computing: World Scientific, 2008.
2007
Ren, K., W. Lou, K. Zeng, and P. J. Moran, "On broadcast authentication in wireless sensor networks", IEEE Transactions on Wireless Communications, vol. 6, no. 11, 11/2007.
Zeng, K., W. Lou, and Y. Zhang, "Multi-rate geographic opportunistic routing in wireless ad hoc networks", IEEE Military Communication Conference (MILCOM 2007), Orlando, FL, 10/2007.
Yu, S., K. Ren, and W. Lou, "A privacy-preserving lightweight authentication protocol for low-cost RFID tags", IEEE Military Communication Conference (MILCOM 2007), Orlando, FL, 10/2007.
Zeng, K., W. Lou, J. Yang, and R. B. D. III, "On geographic collaborative forwarding in wireless ad hoc and sensor networks", International Conference on Wireless Algorithms, Systems, and Applications (WASA 2007), Chicago, IL, 08/2007.
Zeng, K., W. Lou, J. Yang, and R. B. D. III, "On throughput efficiency of geographic opportunistic routing in multihop wireless networks", The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security, and Robustness (QShine 2007), Vancouver, BC, Canada, 08/2007.