Node Reclamation and Replacement for Long-Lived Sensor Networks CW Bin Tong, Guiling (Grace) Wang, Wensheng Zhang IEEE Transactions on Parallel and Distributed Systems 22 (9), 1550-1563, 2011 | 131 | 2011 |
Gp^ 2s: Generic privacy-preservation solutions for approximate aggregation of sensor data (concise contribution) W Zhang, C Wang, T Feng 2008 Sixth Annual IEEE International Conference on Pervasive Computing and …, 2008 | 105 | 2008 |
Confidentiality protection for distributed sensor data aggregation T Feng, C Wang, W Zhang, L Ruan IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 56-60, 2008 | 85 | 2008 |
Catching Packet Droppers and Modifiers in Wireless Sensor Networks WZ Chuang Wang, Taiming Feng, Jinsook Kim, Guiling IEEE Transactions on Parallel and Distributed Systems, vol. 23 no.5, May …, 2012 | 84* | 2012 |
Study on qos driven web services composition Y Chen, Z Li, Q Jin, C Wang Frontiers of WWW Research and Development-APWeb 2006, 702-707, 2006 | 50 | 2006 |
Reconciling privacy preservation and intrusion detection in sensory data aggregation C Wang, G Wang, W Zhang, T Feng 2011 Proceedings IEEE INFOCOM, 336-340, 2011 | 31 | 2011 |
Service selection algorithm based on quality of service and its implementation for web services composition C Yanping, L Zengzhi, G Zhisheng JOURNAL-XIAN JIAOTONG UNIVERSITY 40 (8), 897, 2006 | 25 | 2006 |
Confidentiality protection schemes for data aggregation in sensor networks T Feng, C Wang, W Zhang, L Ruan IEEE INFOCOM 4, 2008 | 23 | 2008 |
Java 安全认证在电子政务系统中的应用研究 王创, 李增智, 晋勤学, 武亚强 微电子学与计算机 21 (5), 82-84, 2004 | 5 | 2004 |
Study on life cycle model of dynamic composed web services C Yanping, L Zengzhi, J Qinxue, W Chuang Distributed and Parallel Computing, 159-164, 2005 | 3 | 2005 |
AdHocSign: An ad hoc group signature scheme for accountable and anonymous access to outsourced data W Zhang, C Wang 10th International Conference, ACNS 2012, 2012 | 2 | 2012 |
Privacy and security protection in cloud integrated sensor networks C Wang Iowa State University, 2012 | 1 | 2012 |
An Ad Hoc Group Signature Scheme for Accountable and Anonymous Access to Outsourced Data W Zhang, C Wang Applied Cryptography and Network Security, 43, 2012 | 1 | 2012 |
PXT-based path protection for multicast sessions in WDM networks T Feng, L Ruan, C Wang, H Qin 2010 IEEE Sarnoff Symposium, 1-5, 2010 | 1 | 2010 |
LA: A Lightweight Accountable and Anonymous Authentication Scheme for Resource-Constrained Devices W Zhang, C Wang International Conference on Network and System Security, 2018 | | 2018 |
QoS driven computer system for providing combined Web service based on computer network H Li, Zengzhi, Chen, Yanping, Jin, Qinxue, Yang CN Patent CN1764183 A, 2006 | | 2006 |
Study on Dynamic Management Constraints for Service-oriented Network Management CW Yanping Chen, Zengzhi Li International Conference on Communication and Information, 219-224, 2005 | | 2005 |