Anonymous secure routing in mobile ad-hoc networks B Zhu, Z Wan, MS Kankanhalli, F Bao, RH Deng Local Computer Networks, 2004. 29th Annual IEEE International Conference on …, 2004 | 317 | 2004 |
Privacy-aware attribute-based encryption with user accountability J Li, K Ren, B Zhu, Z Wan International Conference on Information Security, 347-362, 2009 | 276 | 2009 |
Efficient distributed detection of node replication attacks in sensor networks B Zhu, VGK Addada, S Setia, S Jajodia, S Roy Computer Security Applications Conference, 2007. ACSAC 2007. Twenty-Third …, 2007 | 177 | 2007 |
Localized multicast: efficient and distributed replica detection in large-scale sensor networks B Zhu, S Setia, S Jajodia, S Roy, L Wang IEEE Transactions on Mobile Computing 9 (7), 913-926, 2010 | 128 | 2010 |
Efficient and robust key management for large mobile ad hoc networks B Zhu, F Bao, RH Deng, MS Kankanhalli, G Wang Computer networks 48 (4), 657-682, 2005 | 77 | 2005 |
Role-based access to facilities lifecycle information on RFID tags A Motamedi, R Saini, A Hammad, B Zhu Advanced Engineering Informatics 25 (3), 559-568, 2011 | 56 | 2011 |
Anonymous user communication for privacy protection in wireless metropolitan mesh networks Z Wan, K Ren, B Zhu, B Preneel, M Gu IEEE transactions on vehicular technology 59 (2), 519-532, 2010 | 47 | 2010 |
Building trust in peer-to-peer systems: a review B Zhu, S Jajodia, MS Kankanhalli International Journal of Security and Networks 1 (1), 103-112, 2006 | 47 | 2006 |
Peksrand: Providing predicate privacy in public-key encryption with keyword search B Zhu, B Zhu, K Ren 2011 IEEE International Conference on Communications (ICC), 1-6, 2011 | 38 | 2011 |
Secure and efficient multicast in wireless sensor networks allowing ad hoc group formation K Ren, W Lou, B Zhu, S Jajodia IEEE Transactions on vehicular technology 58 (4), 2018-2029, 2009 | 32 | 2009 |
A PIN entry scheme resistant to recording-based shoulder-surfing P Shi, B Zhu, A Youssef 2009 Third International Conference on Emerging Security Information …, 2009 | 28 | 2009 |
On the security of two threshold signature schemes with traceable signers G Wang, X Han, B Zhu International Conference on Applied Cryptography and Network Security, 111-122, 2003 | 25 | 2003 |
Preventing collusion attacks on the one-way function tree (oft) scheme X Xu, L Wang, A Youssef, B Zhu Applied Cryptography and Network Security, 177-193, 2007 | 21 | 2007 |
A rotary pin entry scheme resilient to shoulder-surfing P Shi, B Zhu, A Youssef Internet Technology and Secured Transactions, 2009. ICITST 2009 …, 2009 | 19 | 2009 |
DoS-resistant access control protocol with identity confidentiality for wireless networks Z Wan, B Zhu, RH Deng, F Bao, AL Ananda IEEE Wireless Communications and Networking Conference, 2005 3, 1521-1526, 2005 | 19 | 2005 |
Providing witness anonymity in peer-to-peer systems B Zhu, S Setia, S Jajodia Proceedings of the 13th ACM conference on Computer and communications …, 2006 | 15 | 2006 |
Providing witness anonymity under peer-to-peer settings B Zhu, S Setia, S Jajodia, L Wang IEEE Transactions on Information Forensics and Security 5 (2), 324-336, 2010 | 10 | 2010 |
A new approach to malware detection H Tang, B Zhu, K Ren International Conference on Information Security and Assurance, 229-238, 2009 | 7 | 2009 |
Anonymous misbehavior detection in mobile ad hoc networks B Zhu, K Ren, L Wang 2008 The 28th International Conference on Distributed Computing Systems …, 2008 | 6 | 2008 |
Remarks on Saeednia's Identity-based Society Oriented Signature Scheme with Anonymous Signers. G Wang, B Zhu IACR Cryptology ePrint Archive 2003, 46, 2003 | 6 | 2003 |