Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Chin-Tser Huang
2010 – today
- 2013
[c30]Hyungbae Park, Sejun Song, Baek-Young Choi, Chin-Tser Huang: PASSAGES: Preserving Anonymity of Sources and Sinks against Global Eavesdroppers. INFOCOM 2013: 210-214- 2012
[c29]Will Goss, Chin-Tser Huang: A practical implementation of veiled certificate for user-centric privacy protection. ACM Southeast Regional Conference 2012: 335-336
[c28]Muhammad N. Sakib, Chin-Tser Huang: Textact: A text-action based web authentication scheme. GLOBECOM 2012: 955-960
[c27]Jie Huang, Chin-Tser Huang: A Secure and Efficient Multi-Device and Multi-Service Authentication Protocol (SEMMAP) for 3GPP-LTE Networks. ICCCN 2012: 1-7
[c26]Chin-Tser Huang, Vipul Gupta: Modeling and Automating Analysis of Server Duty and Client Obligation for High Assurance. ICDCS Workshops 2012: 409-416
[c25]Jie Huang, Mohamed Sharaf, Chin-Tser Huang: A Hierarchical Framework for Secure and Scalable EHR Sharing and Access Control in Multi-cloud. ICPP Workshops 2012: 279-287- 2011
[j13]Yi Xian, Chin-Tser Huang, Jorge Arturo Cobb: Look-Ahead Routing and Message Scheduling in Delay-Tolerant Networks. Computer Communications 34(18): 2184-2194 (2011)
[c24]Chin-Tser Huang, Keesook J. Han, James Perretta: Automatic Selection of Routers for Placing Early Filters of Malicious Traffic. GLOBECOM 2011: 1-5
[c23]- 2010
[j12]Young-ri Choi, Chin-Tser Huang, Mohamed G. Gouda: Stabilization of Flood Sequencing Protocols in Sensor Networks. IEEE Trans. Parallel Distrib. Syst. 21(7): 1042-1055 (2010)
[c22]Chin-Tser Huang, Chang-Ling Huang, J. Morris Chang: Analysis and Enhancement of Bandwidth Request Strategies in IEEE 802.16 Networks. ICC 2010: 1-5
[c21]Yi Xian, Chin-Tser Huang, Jorge Arturo Cobb: Look-ahead routing and Message Scheduling in delay-tolerant networks. LCN 2010: 40-47
2000 – 2009
- 2009
[j11]John Gerdes Jr., Joakim Kalvenes, Chin-Tser Huang: Multi-dimensional credentialing using veiled certificates: Protecting privacy in the face of regulatory reporting requirements. Computers & Security 28(5): 248-259 (2009)
[j10]Chin-Tser Huang, Rocky K. C. Chang, Polly Huang: Signal Processing Applications in Network Intrusion Detection Systems. EURASIP J. Adv. Sig. Proc. 2009 (2009)
[j9]Chin-Tser Huang, Jeff Janies: An Adaptive Approach to Granular Real-Time Anomaly Detection. EURASIP J. Adv. Sig. Proc. 2009 (2009)
[c20]Maryam Jafari-lafti, Chin-Tser Huang, Csilla Farkas: P2F: A User-Centric Privacy Protection Framework. ARES 2009: 386-391
[c19]Chin-Tser Huang, John Gerdes Jr.: Privacy-preserving multi-dimensional credentialing using veiled certificates. CSIIRW 2009: 32
[c18]Prasanth Kalakota, Chin-Tser Huang: On the Benefits of Early Filtering of Botnet Unwanted Traffic. ICCCN 2009: 1-6
[c17]Jorge Arturo Cobb, Chin-Tser Huang: Stabilization of Maximal-Metric Routing without Knowledge of Network Size. PDCAT 2009: 306-311- 2008
[j8]Chin-Tser Huang, Sachin Thareja, Yong-June Shin: Wavelet-based Real Time Detection of Network Traffic Anomalies. I. J. Network Security 6(3): 309-320 (2008)
[j7]Chin-Tser Huang, J. Morris Chang: Responding to Security Issues in WiMAX Networks. IT Professional 10(5): 15-21 (2008)
[j6]Yuliya Kopylova, Duncan A. Buell, Chin-Tser Huang, Jeff Janies: Mutual information applied to anomaly detection. Journal of Communications and Networks 10(1): 89-97 (2008)
[j5]
[c16]- 2007
[j4]Jeff Janies, Chin-Tser Huang, Nathan L. Johnson, Theodor Richardson: SUMP: a secure unicast messaging protocol for wireless ad hoc sensor networks. IJSNet 2(5/6): 358-367 (2007)
[c15]Xinliang Zheng, Chin-Tser Huang, Manton M. Matthews: Chinese remainder theorem based group key management. ACM Southeast Regional Conference 2007: 266-271
[c14]Chin-Tser Huang, Prasanth Kalakota, Alexander B. Alexandrov: Improving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks. GLOBECOM 2007: 2769-2773
[c13]Jeff Janies, Chin-Tser Huang: Fates: A Granular Approach to Real-Time Anomaly Detection. ICCCN 2007: 605-610
[c12]Theodor Richardson, Chin-Tser Huang: Containing Hitlist-Based Worms with Polymorphic Signatures. ICCCN 2007: 652-657
[c11]Chung-Kuo Chang, Chin-Tser Huang: Fast and Secure Mobility for IEEE 802.16e Broadband Wireless Networks. ICPP Workshops 2007: 46- 2006
[b1]Chin-Tser Huang, Mohamed G. Gouda: Hop Integrity in the Internet. Advances in Information Security 21, Springer 2006, ISBN 978-0-387-24426-6, pp. 1-112
[j3]Chin-Tser Huang, Mohamed G. Gouda, E. N. Elnozahy: Convergence of IPsec in presence of resets. J. High Speed Networks 15(2): 173-183 (2006)
[c10]Sen Xu, Manton M. Matthews, Chin-Tser Huang: Security issues in privacy and key management protocols of IEEE 802.16. ACM Southeast Regional Conference 2006: 113-118
[c9]Jeff Janies, Chin-Tser Huang, Nathan L. Johnson: SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks. ICC 2006: 3663-3669
[c8]Chin-Tser Huang, Nathan L. Johnson, Jeff Janies, Alex X. Liu: On capturing and containing E-mail worms. IPCCC 2006
[c7]Chin-Tser Huang, Sachin Thareja, Yong-June Shin: Wavelet-based Real Time Detection of Network Traffic Anomalies. SecureComm 2006: 1-7
[c6]Mohamed G. Gouda, Jorge Arturo Cobb, Chin-Tser Huang: Fault Masking in Tri-redundant Systems. SSS 2006: 304-313- 2005
[c5]Chin-Tser Huang, Mohamed G. Gouda: State Checksum and Its Role in System Stabilization. ICDCS Workshops 2005: 29-34- 2003
[j2]Mohamed G. Gouda, Chin-Tser Huang: A secure address resolution protocol. Computer Networks 41(1): 57-71 (2003)
[c4]Chin-Tser Huang, Mohamed G. Gouda, E. N. Elnozahy: Convergence of IPsec in Presence of Resets. ICDCS Workshops 2003: 22-27- 2002
[j1]Mohamed G. Gouda, E. N. Elnozahy, Chin-Tser Huang, Tommy M. McGuire: Hop integrity in computer networks. IEEE/ACM Trans. Netw. 10(3): 308-319 (2002)
[c3]Mohamed G. Gouda, Chin-Tser Huang, E. N. Elnozahy: Key Trees and the Security of Interval Multicast. ICDCS 2002: 467-468- 2001
[c2]Mohamed G. Gouda, Chin-Tser Huang, Anish Arora: On the Security and Vulnerability of PING. WSS 2001: 124-135- 2000
[c1]Mohamed G. Gouda, E. N. Elnozahy, Chin-Tser Huang, Tommy M. McGuire: Hop Integrity in Computer Networks. ICNP 2000: 3-11
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:22 CEST by the dblp team



