Search

Your search keyword '"Chin-Tser Huang"' showing total 47 results

Search Constraints

Start Over You searched for: Author "Chin-Tser Huang" Remove constraint Author: "Chin-Tser Huang" Topic computer network Remove constraint Topic: computer network
47 results on '"Chin-Tser Huang"'

Search Results

1. Efficient and Trustworthy Authentication in 5G Networks Based on Blockchain

2. Decision tree rule learning approach to counter burst header packet flooding attack in Optical Burst Switching network

3. Benefits and schemes of prefetching from cloud to fog networks

4. A game theoretic approach for inspecting web-based malvertising

5. Jamming mobility in 802.11p networks: Modeling, evaluation, and detection

6. Using anomaly detection based techniques to detect HTTP-based botnet C&C traffic

7. Look-Ahead Routing and Message Scheduling in Delay-Tolerant Networks

8. Stabilization of Flood Sequencing Protocols in Sensor Networks

9. Responding to Security Issues in WiMAX Networks

10. Countering Burst Header Packet Flooding Attack in Optical Burst Switching Network

11. Design and Verification of Secure Mutual Authentication Protocols for Mobile Multihop Relay WiMAX Networks against Rogue Base/Relay Stations

12. Efficient and Secure Multicast in WirelessMAN: A Cross-layer Design

13. A secure address resolution protocol

14. Determining Location and Movement Pattern Using Anonymized WiFi Access Point BSSID

15. Improving Cloud Performance with Router-Based Filtering

16. PASSAGES: Preserving Anonymity of Sources and Sinks against Global Eavesdroppers

17. A Secure and Efficient Multi-Device and Multi-Service Authentication Protocol (SEMMAP) for 3GPP-LTE Networks

18. Traffic-aware geographic forwarding in vehicular ad hoc networks

19. Modeling and Automating Analysis of Server Duty and Client Obligation for High Assurance

20. Automatic Selection of Routers for Placing Early Filters of Malicious Traffic

21. Secure Mutual Authentication Protocols for Mobile Multi-Hop Relay WiMAX Networks against Rogue Base/Relay Stations

22. Analysis and Enhancement of Bandwidth Request Strategies in IEEE 802.16 Networks

24. LOFT: Low-Overhead Freshness Transmission in Sensor Networks

25. Secure Multicast in WiMAX

26. Modeling and analysis of IEEE 802.16 PKM Protocols using CasperFDR

27. Improving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks

28. Securing VoIP Services in Multi-Hop Wireless Mesh Networks

29. Fast and Secure Mobility for IEEE 802.16e Broadband Wireless Networks

30. Chinese remainder theorem based group key management

31. Secure multicast in various scenarios of WirelessMAN

32. Efficient and Secure Multicast in WirelessMAN

33. Security in Wireless Mesh Networks

34. A secure cookie protocol

35. Attacks on PKM Protocols of IEEE 802.16 and Its Later Versions

36. Wavelet-based Real Time Detection of Network Traffic Anomalies

37. On Capturing and Containing E-mail Worms

38. Security issues in privacy and key management protocols of IEEE 802.16

39. SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks

40. A Dual Authentication Protocol for IEEE 802.11 Wireless LANs

41. Convergence of IPsec in presence of resets

42. Key trees and the security of interval multicast

43. An anti-replay window protocol with controlled shift

44. Hop integrity in computer networks

45. Anti-replay window protocols for secure IP

46. On the Security and Vulnerability of PING

47. SUMP: a secure unicast messaging protocol for wireless ad hoc sensor networks

Catalog

Books, media, physical & digital resources