Dijiang Huang
Location-aware key management scheme for wireless sensor networks
D Huang, M Mehta, D Medhi, L Harn
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor …, 2004
NICE: Network intrusion detection and countermeasure selection in virtual network systems
CJ Chung, P Khatkar, T Xing, J Lee, D Huang
IEEE transactions on dependable and secure computing 10 (4), 198-211, 2013
Efficient and secure data storage operations for mobile cloud computing
Z Zhou, D Huang
2012 8th international conference on network and service management (cnsm …, 2012
MobiCloud: building secure cloud framework for mobile computing and communication
D Huang, X Zhang, M Kang, J Luo
2010 fifth IEEE international symposium on service oriented system …, 2010
PACP: An efficient pseudonymous authentication-based conditional privacy protocol for VANETs
D Huang, S Misra, M Verma, G Xue
IEEE Transactions on Intelligent Transportation Systems 12 (3), 736-746, 2011
Mobile cloud computing
D Huang
IEEE COMSOC Multimedia Communications Technical Committee (MMTC) E-Letter 6 …, 2011
iDoctor: Personalized and professionalized medical recommendations based on hybrid matrix factorization
Y Zhang, M Chen, D Huang, D Wu, Y Li
Future Generation Computer Systems 66, 30-35, 2017
Snortflow: A openflow-based intrusion prevention system in cloud environment
T Xing, D Huang, L Xu, CJ Chung, P Khatkar
2013 second GENI research and educational experiment workshop, 89-92, 2013
Secure data processing framework for mobile cloud computing
D Huang, Z Zhou, L Xu, T Xing, Y Zhong
2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2011
ASPE: Attribute-based secure policy enforcement in vehicular ad hoc networks
D Huang, M Verma
Ad Hoc Networks 7 (8), 1526-1535, 2009
An SMDP-based service model for interdomain resource allocation in mobile cloud networks
H Liang, LX Cai, D Huang, X Shen, D Peng
IEEE transactions on vehicular technology 61 (5), 2222-2232, 2012
Efficient privacy-preserving ciphertext-policy attribute based-encryption and broadcast encryption
Z Zhou, D Huang, Z Wang
IEEE Transactions on Computers 64 (1), 126-138, 2013
Cloud-based virtual laboratory for network security education
L Xu, D Huang, WT Tsai
IEEE Transactions on Education 57 (3), 145-150, 2013
On efficient ciphertext-policy attribute based encryption and broadcast encryption
Z Zhou, D Huang
Proceedings of the 17th ACM conference on Computer and communications …, 2010
Secure, selective group broadcast in vehicular networks using dynamic attribute based encryption
N Chen, M Gerla, D Huang, X Hong
2010 The 9th IFIP Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc …, 2010
Mobile cloud computing service models: a user-centric approach
D Huang, T Xing, H Wu
IEEE network 27 (5), 6-11, 2013
Towards temporal access control in cloud computing
Y Zhu, H Hu, GJ Ahn, D Huang, S Wang
2012 Proceedings IEEE INFOCOM, 2576-2580, 2012
A Secure RFID Access Control Mechanism
D Huang, Z Zhou
Security in RFID and Sensor Networks, 237, 2009
Resource allocation for security services in mobile cloud computing
H Liang, D Huang, LX Cai, X Shen, D Peng
2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2011
Overview on image quality assessment methods
GY Jiang, DJ Huang, X Wang, M Yu
Journal of Electronics & Information Technology 32 (1), 219-226, 2010
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20