
Yih-Chun Hu
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2020
- [j24]Taehyoung Kim, Im Young Jung
, Yih-Chun Hu:
Automatic, location-privacy preserving dashcam video sharing using blockchain and deep learning. Hum. centric Comput. Inf. Sci. 10: 36 (2020) - [c81]Hui Lin, Jianing Zhuang, Yih-Chun Hu, Huayu Zhou:
DefRec: Establishing Physical Function Virtualization to Disrupt Reconnaissance of Power Grids' Cyber-Physical Infrastructures. NDSS 2020 - [c80]Bo-Rong Chen, Yih-Chun Hu:
Mitigating denial-of-service attacks on digital contact tracing: poster abstract. SenSys 2020: 770-771 - [c79]J. Harshan, Amogh Vithalkar, Naman Jhunjhunwala, Manthan Kabra, Prafull Manav, Yih-Chun Hu:
Bloom Filter Based Low-Latency Provenance Embedding Schemes in Wireless Networks. WCNC 2020: 1-7 - [i15]Bo-Rong Chen, Yih-Chun Hu:
BlindSignedID: Mitigating Denial-of-Service Attacks on Digital Contact Tracing. CoRR abs/2008.09351 (2020) - [i14]Zhuotao Liu, Yangxi Xiang, Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao, Bihan Wen, Yih-Chun Hu:
HyperService: Interoperability and Programmability Across Heterogeneous Blockchains. IACR Cryptol. ePrint Arch. 2020: 578 (2020)
2010 – 2019
- 2019
- [j23]Qi Li, Jiajia Liu, Yih-Chun Hu, Mingwei Xu, Jianping Wu:
BGP with BGPsec: Attacks and Countermeasures. IEEE Netw. 33(4): 194-200 (2019) - [j22]Sang-Yoon Chang, Sristi Lakshmi Sravana Kumar, Yih-Chun Hu, Younghee Park:
Power-Positive Networking: Wireless-Charging-Based Networking to Protect Energy against Battery DoS Attacks. ACM Trans. Sens. Networks 15(3): 27:1-27:25 (2019) - [j21]Harshan Jagadeesh
, Yih-Chun Hu:
Convolution Attack on Frequency Hopping by Full-Duplex Radios. IEEE Trans. Veh. Technol. 68(6): 5642-5656 (2019) - [c78]Zhuotao Liu, Yangxi Xiang, Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao
, Bihan Wen
, Yih-Chun Hu:
HyperService: Interoperability and Programmability Across Heterogeneous Blockchains. CCS 2019: 549-566 - [c77]Bo Wu, Ke Xu, Qi Li, Zhuotao Liu, Yih-Chun Hu, Zhichao Zhang, Xinle Du, Bingyang Liu, Shoushou Ren:
SmartCrowd: Decentralized and Automated Incentives for Distributed IoT System Detection. ICDCS 2019: 1106-1116 - [i13]J. Harshan, Yih-Chun Hu:
Convolution Attack on Frequency-Hopping by Full-Duplex Radios. CoRR abs/1903.11261 (2019) - [i12]Zhuotao Liu, Yangxi Xiang, Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao, Bihan Wen, Yih-Chun Hu:
HyperService: Interoperability and Programmability Across Heterogeneous Blockchains. CoRR abs/1908.09343 (2019) - 2018
- [j20]Zhuotao Liu
, Hao Jin, Yih-Chun Hu
, Michael Bailey:
Practical Proactive DDoS-Attack Mitigation via Endpoint-Driven In-Network Traffic Control. IEEE/ACM Trans. Netw. 26(4): 1948-1961 (2018) - [c76]Hao Wu
, Hsu-Chun Hsiao
, Daniele Enrico Asoni
, Simon Scherrer
, Adrian Perrig
, Yih-Chun Hu
:
CLEF: Limiting the Damage Caused by Large Flows in the Internet Core. CANS 2018: 89-108 - [c75]Zhuotao Liu, Kai Chen, Haitao Wu, Shuihai Hu, Yih-Chun Hu, Yi Wang, Gong Zhang:
Enabling Work-Conserving Bandwidth Guarantees for Multi-Tenant Datacenters via Dynamic Tenant-Queue Binding. INFOCOM 2018: 1-9 - [c74]Bo Wu, Ke Xu, Qi Li, Zhuotao Liu, Yih-Chun Hu, Martin J. Reed, Meng Shen, Fan Yang:
Enabling Efficient Source and Path Verification via Probabilistic Packet Marking. IWQoS 2018: 1-10 - [c73]J. Harshan, Yih-Chun Hu:
Cognitive radio from hell: Flipping attack on direct-sequence spread spectrum. WCNC 2018: 1-6 - [c72]Subhash Lakshminarayana, Jabir Shabbir Karachiwala, Sang-Yoon Chang, Girish Revadigar, Sristi Lakshmi Sravana Kumar, David K. Y. Yau, Yih-Chun Hu:
Signal Jamming Attacks Against Communication-Based Train Control: Attack Impact and Countermeasure. WISEC 2018: 160-171 - [i11]J. Harshan, Yih-Chun Hu:
Cognitive Radio from Hell: Flipping Attack on Direct-Sequence Spread Spectrum. CoRR abs/1804.00907 (2018) - [i10]Hao Wu, Hsu-Chun Hsiao, Daniele Enrico Asoni, Simon Scherrer, Adrian Perrig, Yih-Chun Hu:
CLEF: Limiting the Damage Caused by Large Flows in the Internet Core (Technical Report). CoRR abs/1807.05652 (2018) - [i9]Subhash Lakshminarayana, Jabir Shabbir Karachiwala, Sang-Yoon Chang, Girish Revadigar, Sristi Lakshmi Sravana Kumar, David K. Y. Yau, Yih-Chun Hu:
Signal Jamming Attacks Against Communication-Based Train Control: Attack Impact and Countermeasure. CoRR abs/1808.01723 (2018) - 2017
- [j19]Jonathan Ponniah, Yih-Chun Hu, P. R. Kumar:
A Clean Slate Approach to Secure Ad Hoc Wireless Networking-Open Unsynchronized Networks. IEEE Trans. Control. Netw. Syst. 4(1): 37-48 (2017) - [j18]Sang-Yoon Chang
, Yih-Chun Hu:
SecureMAC: Securing Wireless Medium Access Control Against Insider Denial-of-Service Attacks. IEEE Trans. Mob. Comput. 16(12): 3527-3540 (2017) - [c71]Taeho Lee, Christos Pappas, Adrian Perrig, Virgil D. Gligor, Yih-Chun Hu:
The Case for In-Network Replay Suppression. AsiaCCS 2017: 862-873 - [c70]Chang-Wu Chen, Sang-Yoon Chang, Yih-Chun Hu, Yen-Wen Chen:
Protecting vehicular networks privacy in the presence of a single adversarial authority. CNS 2017: 1-9 - [c69]J. Harshan, Sang-Yoon Chang, Seungmin Kang, Yih-Chun Hu:
Securing balise-based train control systems using cryptographic random fountains. CNS 2017: 405-410 - [c68]Laurent Chuat, Adrian Perrig, Yih-Chun Hu:
Deadline-Aware Multipath Communication: An Optimization Problem. DSN 2017: 487-498 - [c67]Sang-Yoon Chang, Sristi Lakshmi Sravana Kumar, Yih-Chun Hu:
Cognitive Wireless Charger: Sensing-Based Real-Time Frequency Control For Near-Field Wireless Charging. ICDCS 2017: 2302-2307 - [c66]Sang-Yoon Chang, Sristi Lakshmi Sravana Kumar, Yih-Chun Hu:
Performance of Cognitive Wireless Charger for Near-Field Wireless Charging. ICDCS 2017: 2555-2556 - [c65]Zhuotao Liu, Yushan Liu, Philipp Winter, Prateek Mittal, Yih-Chun Hu:
TorPolice: Towards enforcing service-defined access policies for anonymous communication in the Tor network. ICNP 2017: 1-10 - [c64]J. Harshan, Sang-Yoon Chang, Yih-Chun Hu:
Insider-Attacks on Physical-Layer Group Secret-Key Generation in Wireless Networks. WCNC 2017: 1-6 - [c63]Sang-Yoon Chang, Sristi Lakshmi Sravana Kumar, Bao Anh N. Tran, Sreejaya Viswanathan, Younghee Park, Yih-Chun Hu:
Power-positive networking using wireless charging: protecting energy against battery exhaustion attacks. WISEC 2017: 52-57 - [i8]J. Harshan, Sang-Yoon Chang, Yih-Chun Hu:
Insider-Attacks on Physical-Layer Group Secret-Key Generation in Wireless Networks. CoRR abs/1701.03568 (2017) - [i7]Laurent Chuat, Adrian Perrig, Yih-Chun Hu:
Deadline-Aware Multipath Communication: An Optimization Problem. CoRR abs/1706.05867 (2017) - [i6]Zhuotao Liu, Yushan Liu, Philipp Winter, Prateek Mittal, Yih-Chun Hu:
TorPolice: Towards Enforcing Service-Defined Access Policies in Anonymous Systems. CoRR abs/1708.08162 (2017) - [i5]Zhuotao Liu, Hao Jin, Yih-Chun Hu, Michael Bailey:
MiddlePolice: Fine-Grained Endpoint-Driven In-Network Traffic Control for Proactive DDoS Attack Mitigation. CoRR abs/1709.05710 (2017) - [i4]Zhuotao Liu, Kai Chen, Haitao Wu, Shuihai Hu, Yih-Chun Hu, Yi Wang, Gong Zhang:
Enabling Work-conserving Bandwidth Guarantees for Multi-tenant Datacenters via Dynamic Tenant- eue Binding. CoRR abs/1712.06766 (2017) - 2016
- [j17]Hao Wu, Yih-Chun Hu:
Location Privacy with Randomness Consistency. Proc. Priv. Enhancing Technol. 2016(4): 62-82 (2016) - [j16]Jonathan Ponniah, Yih-Chun Hu, P. R. Kumar:
A System-Theoretic Clean Slate Approach to Provably Secure Ad-Hoc Wireless Networking. IEEE Trans. Control. Netw. Syst. 3(2): 206-217 (2016) - [j15]Sang-Yoon Chang, Yih-Chun Hu, Nicola Laurenti:
SimpleMAC: A Simple Wireless MAC-Layer Countermeasure to Intelligent and Insider Jammers. IEEE/ACM Trans. Netw. 24(2): 1095-1108 (2016) - [c62]Zhuotao Liu, Hao Jin, Yih-Chun Hu, Michael Bailey:
MiddlePolice: Toward Enforcing Destination-Defined Policies in the Middle of the Internet. CCS 2016: 1268-1279 - [c61]Sristi Lakshmi Sravana Kumar, Sang-Yoon Chang, Sreejaya Viswanathan, Yih-Chun Hu:
Demo: Free Data Communication Using Wireless Charging. MobiSys (Companion Volume) 2016: 121 - [c60]Sang-Yoon Chang, Shaoying Cai, Hwajeong Seo, Yih-Chun Hu:
Key Update at Train Stations: Two-Layer Dynamic Key Update Scheme for Secure Train Communications. SecureComm 2016: 125-143 - 2015
- [j14]Jonathan Ponniah, Yih-Chun Hu, P. R. Kumar:
A Clean Slate Approach to Secure Wireless Networking. Found. Trends Netw. 9(1): 1-105 (2015) - [c59]Sang-Yoon Chang, Yih-Chun Hu, Zhuotao Liu:
Securing wireless medium access control against insider denial-of-service attackers. CNS 2015: 370-378 - [c58]Sang-Yoon Chang, Bao Anh N. Tran, Yih-Chun Hu, Douglas L. Jones:
Jamming with Power Boost: Leaky Waveguide Vulnerability in Train Systems. ICPADS 2015: 37-43 - [c57]Sang-Yoon Chang, Jemin Lee, Yih-Chun Hu:
Noah: Keyed Noise Flooding for Wireless Confidentiality. Q2SWinet@MSWiM 2015: 141-148 - [c56]Jonathan Ponniah, Yih-Chun Hu, P. R. Kumar:
A clean slate design for secure wireless ad-hoc networks - Part 1: Closed synchronized networks. WiOpt 2015: 175-182 - [c55]Jonathan Ponniah, Yih-Chun Hu, P. R. Kumar:
A clean slate design for secure wireless ad-hoc networks - Part 2: Open unsynchronized networks. WiOpt 2015: 183-190 - 2014
- [j13]Dongho Kim, Yih-Chun Hu:
A Study on False Channel Condition Reporting Attacks in Wireless Networks. IEEE Trans. Mob. Comput. 13(5): 935-947 (2014) - [c54]Fuyuan Zhang, Limin Jia, Cristina Basescu, Tiffany Hyun-Jin Kim, Yih-Chun Hu, Adrian Perrig:
Mechanized Network Origin and Path Authenticity Proofs. CCS 2014: 346-357 - [c53]Hao Wu, Hsu-Chun Hsiao
, Yih-Chun Hu:
Efficient Large Flow Detection over Arbitrary Windows: An Algorithm Exact Outside an Ambiguity Region. Internet Measurement Conference 2014: 209-222 - [c52]Tiffany Hyun-Jin Kim, Cristina Basescu, Limin Jia, Soo Bum Lee, Yih-Chun Hu, Adrian Perrig:
Lightweight source authentication and path validation. SIGCOMM 2014: 271-282 - 2013
- [c51]Jerry T. Chiang, Yih-Chun Hu, Pulkit Yadav:
Secure cooperative spectrum sensing based on Sybil-resilient clustering. GLOBECOM 2013: 1075-1081 - [c50]Jerry T. Chiang, Yih-Chun Hu:
Did you also hear that? Spectrum sensing using Hermitian inner product. INFOCOM 2013: 2229-2237 - [c49]Jerry T. Chiang, Yih-Chun Hu:
JIM-Beam: Jamming-Resilient Wireless Flooding Based on Spatial Randomness. MILCOM 2013: 464-469 - [c48]Jerry T. Chiang, Yih-Chun Hu:
Diffie's Wireless Phone: Heterodyning-Based Physical-Layer Encryption. MILCOM 2013: 470-475 - [c47]Sang-Yoon Chang, Yih-Chun Hu, Jerry T. Chiang, Soo-Young Chang:
Redundancy offset narrow spectrum: countermeasure for signal-cancellation based jamming. MOBIWAC 2013: 51-58 - [i3]Jonathan Ponniah, Yih-Chun Hu, P. R. Kumar:
A System-Theoretic Clean Slate Approach to Provably Secure Ad Hoc Wireless Networking. CoRR abs/1309.2904 (2013) - 2012
- [j12]Yih-Chun Hu, P. R. Kumar, Jonathan Ponniah:
An orthogonal multiple access coding scheme. Commun. Inf. Syst. 12(1): 41-76 (2012) - [j11]Jerry T. Chiang, Jason J. Haas, Jihyuk Choi, Yih-Chun Hu:
Secure Location Verification Using Simultaneous Multilateration. IEEE Trans. Wirel. Commun. 11(2): 584-591 (2012) - [c46]Jerry T. Chiang, Tianzhu Zhang, Binbin Chen, Yih-Chun Hu:
Load disaggregation using harmonic analysis and regularized optimization. APSIPA 2012: 1-4 - [c45]Farhana Ashraf, Yih-Chun Hu, Robin Hillary Kravets:
Bankrupting the jammer in WSN. MASS 2012: 317-325 - [c44]Sang-Yoon Chang, Yih-Chun Hu, Nicola Laurenti
:
SimpleMAC: a jamming-resilient MAC-layer protocol for wireless channel coordination. MobiCom 2012: 77-88 - [c43]Jerry T. Chiang, Dongho Kim, Yih-Chun Hu:
JIM-beam: using spatial randomness to build jamming-resilient wireless flooding networks. MobiHoc 2012: 255-256 - [c42]Parisa Haghani, Yih-Chun Hu:
Power control for fair dynamic channel reservation in VANETs. SECON 2012: 659-667 - [c41]Sang-Yoon Chang, Yih-Chun Hu, Hans Anderson, Ting Fu, Evelyn Y. L. Huang:
Body Area Network Security: Robust Key Establishment Using Human Body Channel. HealthSec 2012 - [e3]Asis Nasipuri, Yih-Chun Hu, Sanjay Shakkottai:
The Thirteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc '12, Hilton Head, SC, USA, June 11-14, 2012. ACM 2012, ISBN 978-1-4503-1281-3 [contents] - 2011
- [j10]Kyung-Joon Park, Jihyuk Choi, Jennifer C. Hou, Yih-Chun Hu, Hyuk Lim
:
Optimal physical carrier sense in wireless networks. Ad Hoc Networks 9(1): 16-27 (2011) - [j9]Jason J. Haas, Yih-Chun Hu, Kenneth P. Laberteaux:
Efficient Certificate Revocation List Organization and Distribution. IEEE J. Sel. Areas Commun. 29(3): 595-604 (2011) - [j8]Jerry T. Chiang, Yih-Chun Hu:
Cross-layer jamming detection and mitigation in wireless broadcast networks. IEEE/ACM Trans. Netw. 19(1): 286-298 (2011) - [c40]Dongho Kim, Danesh J. Esteki, Yih-Chun Hu, P. R. Kumar:
A Lightweight Deterministic MAC Protocol Using Low Cross-Correlation Sequences. GLOBECOM 2011: 1-6 - [c39]Jihyuk Choi, Sang-Yoon Chang, Diko Ko, Yih-Chun Hu:
Secure MAC-Layer Protocol for Captive Portals in Wireless Hotspots. ICC 2011: 1-5 - [c38]Jason J. Haas, Yih-Chun Hu, Nicola Laurenti
:
Low-cost mitigation of privacy loss due to radiometric identification. Vehicular Ad Hoc Networks 2011: 31-40 - [c37]Farhana Ashraf, Yih-Chun Hu, Robin Kravets:
Demo: bankrupting the jammer. MobiSys 2011: 379-380 - [c36]Farhana Ashraf, Yih-Chun Hu, Robin Kravets:
Bankrupting the jammer. SECON 2011: 149-151 - [c35]Francesco Renna, Nicola Laurenti, Yih-Chun Hu:
The jamming game in an OFDM setting. VALUETOOLS 2011: 496-505 - [c34]Bisheng Liu, Jerry T. Chiang, Jason J. Haas, Yih-Chun Hu:
Short paper: a practical view of "mixing" identities in vehicular networks. WISEC 2011: 157-162 - [i2]Prateek Mittal, Dongho Kim, Yih-Chun Hu, Matthew Caesar:
Towards Deployable DDoS Defense for Web Applications. CoRR abs/1110.1060 (2011) - 2010
- [j7]Jason J. Haas, Yih-Chun Hu, Kenneth P. Laberteaux:
The impact of key assignment on VANET privacy. Secur. Commun. Networks 3(2-3): 233-249 (2010) - [j6]Bisheng Liu, Jerry T. Chiang, Jason J. Haas, Yih-Chun Hu:
Coward attacks in vehicular networks. ACM SIGMOBILE Mob. Comput. Commun. Rev. 14(3): 34-36 (2010) - [c33]Dongho Kim, Jerry T. Chiang, Yih-Chun Hu, Adrian Perrig, P. R. Kumar:
CRAFT: a new secure congestion control architecture. CCS 2010: 705-707 - [c32]Roberto Solis-Robles, Jason J. Haas, Jerry T. Chiang, Yih-Chun Hu, P. R. Kumar:
Secure network-wide clock synchronization in wireless sensor networks. CDC 2010: 5616-5621 - [c31]Jason J. Haas, Yih-Chun Hu:
Communication requirements for crash avoidance. Vehicular Ad Hoc Networks 2010: 1-10 - [c30]Dongho Kim, Yih-Chun Hu:
A Study on False Channel Condition Reporting Attacks in Wireless Networks. SecureComm 2010: 107-124 - [c29]Jihyuk Choi, Jerry T. Chiang, Dongho Kim, Yih-Chun Hu:
Partial Deafness: A Novel Denial-of-Service Attack in 802.11 Networks. SecureComm 2010: 235-252 - [p1]André Weimerskirch, Jason J. Haas, Yih-Chun Hu, Kenneth P. Laberteaux:
Data Security in Vehicular Communication Networks. VANET 2010: 299-363
2000 – 2009
- 2009
- [j5]Qing Li, Meiyuan Zhao, Jesse Walker, Yih-Chun Hu, Adrian Perrig, Wade Trappe:
SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks. Secur. Commun. Networks 2(4): 325-340 (2009) - [c28]Jason J. Haas, Yih-Chun Hu:
Secure Unified Cellular Ad Hoc Network Routing. GLOBECOM 2009: 1-8 - [c27]Jason J. Haas, Yih-Chun Hu, Kenneth P. Laberteaux:
Real-World VANET Security Protocol Performance. GLOBECOM 2009: 1-7 - [c26]Jerry T. Chiang, Jason J. Haas, Yih-Chun Hu, P. R. Kumar, Jihyuk Choi:
Fundamental Limits on Secure Clock Synchronization and Man-In-The-Middle Detection in Fixed Wireless Networks. INFOCOM 2009: 1962-1970 - [c25]Jason J. Haas, Yih-Chun Hu, Kenneth P. Laberteaux:
Design and analysis of a lightweight certificate revocation mechanism for VANET. Vehicular Ad Hoc Networks 2009: 89-98 - [c24]Kyung-Joon Park, Jihyuk Choi, Kyungtae Kang, Yih-Chun Hu:
Malicious or Selfish? Analysis of Carrier Sense Misbehavior in IEEE 802.11 WLAN. QSHINE 2009: 351-362 - [c23]Jerry T. Chiang, Jason J. Haas, Yih-Chun Hu:
Secure and precise location verification using distance bounding and simultaneous multilateration. WISEC 2009: 181-192 - 2008
- [c22]Qing Li, Yih-Chun Hu, Meiyuan Zhao, Adrian Perrig, Jesse Walker, Wade Trappe:
SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks. AsiaCCS 2008: 201-204 - [c21]Jerry T. Chiang, Yih-Chun Hu:
Dynamic Jamming Mitigation for Wireless Broadcast Networks. INFOCOM 2008: 1211-1219 - [c20]Kenneth P. Laberteaux, Jason J. Haas, Yih-Chun Hu:
Security certificate revocation list distribution for vanet. Vehicular Ad Hoc Networks 2008: 88-89 - [e2]Varsha K. Sadekar, Paolo Santi, Yih-Chun Hu, Martin Mauve:
Proceedings of the Fifth International Workshop on Vehicular Ad Hoc Networks, VANET 2008, San Francisco, California, USA, September 15, 2008. ACM 2008, ISBN 978-1-60558-191-0 [contents] - 2007
- [c19]Jerry T. Chiang, Yih-Chun Hu:
Cross-layer jamming detection and mitigation in wireless broadcast networks. MobiCom 2007: 346-349 - [c18]Tao Jiang, Helen J. Wang, Yih-Chun Hu:
Preserving location privacy in wireless lans. MobiSys 2007: 246-257 - [c17]Bryan Parno, Dan Wendlandt, Elaine Shi, Adrian Perrig, Bruce M. Maggs, Yih-Chun Hu:
Portcullis: protecting connection setup from denial-of-capability attacks. SIGCOMM 2007: 289-300 - [e1]Wieland Holfelder, Paolo Santi, Yih-Chun Hu, Jean-Pierre Hubaux:
Proceedings of the Fourth International Workshop on Vehicular Ad Hoc Networks, VANET 2007, Montréal, Québec, Canada, September 10, 2007. ACM 2007, ISBN 978-1-59593-739-1 [contents] - [i1]David B. Johnson, Yih-Chun Hu, David A. Maltz:
The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4. RFC 4728: 1-107 (2007) - 2006
- [j4]Yih-Chun Hu, Adrian Perrig, David B. Johnson:
Wormhole attacks in wireless networks. IEEE J. Sel. Areas Commun. 24(2): 370-380 (2006) - [c16]Yih-Chun Hu, David A. McGrew, Adrian Perrig, Brian Weis, Dan Wendlandt:
(R)Evolutionary Bootstrapping of a Global PKI for Securing BGP. HotNets 2006 - 2005
- [j3]Yih-Chun Hu, Adrian Perrig, David B. Johnson:
Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. Wirel. Networks 11(1-2): 21-38 (2005) - [c15]Yih-Chun Hu, Markus Jakobsson, Adrian Perrig:
Efficient Constructions for One-Way Hash Chains. ACNS 2005: 423-441 - 2004
- [j2]Yih-Chun Hu, Adrian Perrig:
A Survey of Secure Wireless Ad Hoc Routing. IEEE Secur. Priv. 2(3): 28-39 (2004) - [c14]Yih-Chun Hu, David B. Johnson:
Exploiting Congestion Information in Network and Higher Layer Protocols in Multihop Wireless Ad Hoc Networks. ICDCS 2004: 301-310 - [c13]Helen J. Wang, Yih-Chun Hu, Chun Yuan, Zheng Zhang, Yi-Min Wang:
Friends Troubleshooting Network: Towards Privacy-Preserving, Automatic Troubleshooting. IPTPS 2004: 184-194 - [c12]Yih-Chun Hu, David B. Johnson:
Securing quality-of-service route discovery in on-demand routing for ad hoc networks. SASN 2004: 106-117 - [c11]Yih-Chun Hu, Adrian Perrig, Marvin A. Sirbu
:
SPV: secure path vector routing for securing BGP. SIGCOMM 2004: 179-192 - 2003
- [j1]Yih-Chun Hu, David B. Johnson, Adrian Perrig:
SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Networks 1(1): 175-192 (2003) - [c10]Yih-Chun Hu, Adrian Perrig, David B. Johnson:
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks. INFOCOM 2003: 1976-1986 - [c9]Yih-Chun Hu, Adrian Perrig, David B. Johnson:
Efficient Security Mechanisms for Routing Protocolsa. NDSS 2003 - [c8]Jorjeta G. Jetcheva, Yih-Chun Hu, Santashil PalChaudhuri, Amit Kumar Saha, David B. Johnson:
Design and Evaluation of a Metropolitan Area Multitier Wireless Ad Hoc Network Architecture. WMCSA 2003: 32-43 - [c7]Yih-Chun Hu, Adrian Perrig, David B. Johnson:
Rushing attacks and defense in wireless ad hoc network routing protocols. Workshop on Wireless Security 2003: 30-40 - 2002
- [c6]Yih-Chun Hu, Adrian Perrig, David B. Johnson:
Ariadne: a secure on-demand routing protocol for ad hoc networks. MobiCom 2002: 12-23 - [c5]Yih-Chun Hu, David B. Johnson:
Ensuring cache freshness in on-demand ad hoc network routing protocols. POMC 2002: 25-30 - [c4]Yih-Chun Hu, David B. Johnson, Adrian Perrig:
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks. WMCSA 2002: 3-13 - 2001
- [c3]Yih-Chun Hu, David B. Johnson:
Implicit source routes for on-demand ad hoc network routing. MobiHoc 2001: 1-10 - 2000
- [c2]Yih-Chun Hu, David B. Johnson:
Caching strategies in on-demand routing protocols for wireless ad hoc networks. MobiCom 2000: 231-242
1990 – 1999
- 1998
- [c1]Josh Broch, David A. Maltz, David B. Johnson, Yih-Chun Hu, Jorjeta G. Jetcheva:
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. MobiCom 1998: 85-97