An efficient identity-based batch verification scheme for vehicular sensor networks C Zhang, R Lu, X Lin, PH Ho, X Shen IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 246-250, 2008 | 873 | 2008 |
Security in vehicular ad hoc networks X Lin, R Lu, C Zhang, H Zhu, PH Ho, X Shen IEEE communications magazine 46 (4), 88-95, 2008 | 469 | 2008 |
RAISE: An efficient RSU-aided message authentication scheme in vehicular communication networks C Zhang, X Lin, R Lu, PH Ho 2008 IEEE international conference on communications, 1451-1457, 2008 | 399 | 2008 |
An efficient message authentication scheme for vehicular communications C Zhang, X Lin, R Lu, PH Ho, X Shen IEEE transactions on vehicular technology 57 (6), 3357-3368, 2008 | 364 | 2008 |
TSVC: Timed efficient and secure vehicular communications with privacy preserving X Lin, X Sun, X Wang, C Zhang, PH Ho, X Shen IEEE transactions on wireless communications 7 (12), 4987-4998, 2008 | 250 | 2008 |
On batch verification with group testing for vehicular communications C Zhang, PH Ho, J Tapolcai Wireless Networks 17, 1851-1865, 2011 | 176 | 2011 |
A location privacy preserving authentication scheme in vehicular networks C Zhang, R Lu, PH Ho, A Chen 2008 IEEE Wireless Communications and Networking Conference, 2543-2548, 2008 | 96 | 2008 |
A novel fair incentive protocol for mobile ad hoc networks R Lu, X Lin, H Zhu, C Zhang, PH Ho, X Shen 2008 IEEE Wireless Communications and Networking Conference, 3237-3242, 2008 | 35 | 2008 |
AICN: an efficient algorithm to identify compromised nodes in wireless sensor network R Lu, X Lin, C Zhang, H Zhu, PH Ho, X Shen 2008 IEEE International Conference on Communications, 1499-1504, 2008 | 24 | 2008 |
A secure business framework for file purchasing in vehicular networks S Yuan, C Zhang, PH Ho Security and Communication Networks 1 (3), 259-268, 2008 | 11 | 2008 |
Performance enhancement for secure vehicular communications X Lin, C Zhang, X Sun, PH Ho, XS Shen IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference, 480-485, 2007 | 11 | 2007 |
Static gesture quantization and DCT based sign language generation C Zhang, F Jiang, H Yao, G Yao, W Gao Affective Computing and Intelligent Interaction: First International …, 2005 | 6 | 2005 |
On Achieving Encrypted File Recovery X Lin, C Zhang, T Dule Forensics in Telecommunications, Information, and Multimedia: Third …, 2011 | 5 | 2011 |
On Achieving Secure Message Authentication for Vehicular Communications C Zhang University of Waterloo, 2010 | 5 | 2010 |
Ppbr: Privacy-aware position-based routing in mobile ad hoc networks C Zhang, X Lin, PH Ho, X Sun, X Zhan MILCOM 2007-IEEE Military Communications Conference, 1-7, 2007 | 4 | 2007 |
A keyless facility access control system with wireless enabled personal devices C Zhang, X Sun, X Lin, PH Ho The Fourth International Conference on Heterogeneous Networking for Quality …, 2007 | 4 | 2007 |
Multilayer method based on multi-resolution feature extracting and MVC dimension reducing method for sign language recognition CX Zhang, HX Yao, F Jiang, DB Zhao, XT Sun 2005 International Conference on Machine Learning and Cybernetics 7, 4452-4457, 2005 | 3 | 2005 |
SECURITY IN MOBILE AD HOC AND SENSOR NETWORKS: PART II P VERMA, X LIN, R LU, C ZHANG, H ZHU, P HO, XS SHEN IEEE Communications Magazine, 2008 | | 2008 |
Device independence based on BSOFMS in sign language recognition F Jiang, W Gao, HX Yao, CX Zhang 2005 International Conference on Machine Learning and Cybernetics 7, 4458-4463, 2005 | | 2005 |
TSVC: Efficient and Secure Vehicular Communications with Privacy Preserving X Lin, C Zhang, X Sun, PH Ho, XS Shen | | |