Preserving source location privacy in monitoring-based wireless sensor networks Y Xi, L Schwiebert, W Shi Proceedings 20th IEEE International Parallel & Distributed Processing …, 2006 | 271 | 2006 |
Enforcing privacy using symmetric random key-set in vehicular networks Y Xi, K Sha, W Shi, L Schwiebert, T Zhang Eighth International Symposium on Autonomous Decentralized Systems (ISADS'07 …, 2007 | 131 | 2007 |
Adaptive privacy-preserving authentication in vehicular networks K Sha, Y Xi, W Shi, L Schwiebert, T Zhang 2006 First International Conference on Communications and Networking in …, 2006 | 110 | 2006 |
Privacy preserving shortest path routing with an application to navigation Y Xi, L Schwiebert, W Shi Pervasive and Mobile Computing 13, 142-149, 2014 | 47 | 2014 |
Probabilistic adaptive anonymous authentication in vehicular networks Y Xi, KW Sha, WS Shi, L Schwiebert, T Zhang Journal of Computer Science and Technology 23, 916-928, 2008 | 34 | 2008 |
Preserving privacy in monitoring-based wireless sensor networks Y Xi, L Schwiebert, W Shi Proceedings of the 2nd International Workshop on Security in Systems and …, 2006 | 26 | 2006 |
Mobile anonymity of dynamic groups in vehicular networks Y Xi, W Shi, L Schwiebert Security and Communication Networks 1 (3), 219-231, 2008 | 16 | 2008 |
Adaptive congestion control for hotspot management in structured peer-to-peer systems AM Bosneag, Y Xi, X Li, M Brockmeyer IEEE International Symposium on Cluster Computing and the Grid, 2004. CCGrid …, 2004 | 6 | 2004 |
Location Privacy in Emerging Network-Based Applications Y Xi | 5 | 2012 |
暂缺 Y Xi, KW Sha, WS Shi, L Schwiebert, T Zhang 计算机科学技术学报 23 (6), 916-928, 2008 | | 2008 |
You have access to this document through your prepaid file cabinet downloads included with your subscription. Adaptive Privacy-Preserving Authentication in Vehicular Networks K Sha, Y Xi, W Shi, L Schwiebert, T Zhang 1st International ICST Workshop on Vehicle Communications and Applications, 2007 | | 2007 |