何道敬的出版著作

如题所述

第1个回答  2016-06-03

论文
[1] Daojing He*, S. Chan, Y. Zhang, and H. Yang. Lightweight and confidential data discovery and dissemination for wireless body area networks. IEEE Journal of Biomedical and Health Informatics, Accepted and to appear, DOI: 10.1109/JBHI.2013.2293620, 2013.
[2] Daojing He*, S. Chan, Y. Zhang, C. Wu, and B. Wang. How effective are the prevailing attack-defense models for cyber security anyway?. IEEE Intelligent Systems, Accepted and to appear, 2013.
[3] Daojing He*. An enhanced public key infrastructure to secure smart grid wireless communication networks. IEEE Network, Accepted and to appear (SCI, IF: 2.853)
[4] Daojing He*, S. Chan, S. Tang, and M. Guizani. Secure Data Discovery and Dissemination based on Hash Tree for Wireless Sensor Networks. IEEE Transactions on Wireless Communications, vol. 12, no. 9, pp. 4638-4646, Sept. 2013.
[5] Daojing He*. A set of novel and lightweight systems to secure wireless medical sensor networks. IEEE Journal of Biomedical and Health Informatics, Accepted and to appear, 2013. (SCI, IF: 1.707)
[6] Daojing He*, C. Chen, S. Chan, J. Bu, and P. Zhang. Secure and lightweight network admission and transmission protocol for body sensor networks. IEEE Journal of Biomedical and Health Informatics, vol. 17, no. 3, pp. 664-674, May 2013. (SCI, IF: 1.707) Secure and lightweight network admission.pdf
[7] Daojing He*, C. Chen, S. Chan, and J. Bu. . Handauth: Efficient handover authentication with conditional privacy for wireless networks. IEEE Transactions on Computers (TC), vol. 62, no. 3, pp. 616-622, March 2013. (SCI, IF: 1.822) Handauth.pdf
[8] Daojing He*, C. Chen, S. Chan, J. Bu, and Y. Zhang. Security and efficiency in roaming services for wireless networks: challenges, approaches and prospects. IEEE Communications Magazine, vol. 51, no. 2, pp. 142-150, Feb. 2013. (SCI, IF: 3.785
[9] Daojing He*, C. Chen, S. Chan, and J. Bu.. SDRP: A secure and distributed reprogramming protocol for wireless sensor networks. IEEE Transactions on Industrial Electronics (TIE), vol. 59, no. 11, pp. 4155-4163, Nov. 2012. (SCI, IF: 5.16)
[10]Daojing He*, C. Chen, S. Chan, J. Bu, and A. V. Vasilakos. A distributed trust evaluation model and its application scenarios to medical sensor networks. IEEE Transactions on Information Technology in Biomedicine (TITB), vol. 16, no. 6 pp. 1164-1175, Nov. 2012. (SCI, IF: 1.707)
[11] Daojing He*, C. Chen, S. Chan, J. Bu, and L. Yang. Security analysis and improvement of a secure and distributed reprogramming protocol for wireless sensor networks. IEEE Transactions on Industrial Electronics (TIE), Accepted and to appear, Sept. 2012, DOI 10.1109/TIE.2012.2218562. (SCI, IF: 5.16)
[12] Daojing He*, C. Chen, S. Chan, Y. Zhang, J. Bu and M. Guizani. Secure service provision in smart grid communications. IEEE Communications Magazine, vol. 50, no. 8, pp. 53-61, August 2012. (SCI, IF: 3.785)
[13] Daojing He*, C. Chen, S. Chan, J. Bu, and A. V. Vasilakos. ReTrust: Attack-resistant and lightweight trust management for medical sensor network. IEEE Transactions on Information Technology in Biomedicine (TITB), vol. 16, no. 4, pp. 623-632, July 2012. (SCI, IF: 1.707)
[14] Daojing He*, J. Bu, S. Chan, and C. Chen. Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions. IEEE Transactions on Wireless Communications (IEEE TWC). vol. 11, no. 1, pp. 48-53, 2012.
[15] Daojing He*, C. Chen, S. Chan, and J. Bu.. DiCode: DoS-resistant and distributed code dissemination in wireless sensor networks. IEEE Transactions on Wireless Communications (TWC). vol. 11, no. 5 pp. 1946-1956, May 2012. (SCI, IF: 2.586)
[16] Daojing He*, J. Bu, S. Zhu, S. Chan, and C. Chen.. Distributed access control with privacy support in wireless sensor networks. IEEE Transactions on Wireless Communications (TWC). vol. 10, no. 10, pp. 3472-3481, Oct. 2011. (SCI, IF: 2.586)
[17] Daojing He*, J. Bu, S. Chan, C. Chen, and M. Yin. Privacy-preserving universal authentication protocol for wireless communications. IEEE Transactions on Wireless Communications (TWC), vol. 10, no. 2, pp. 431-436, Feb. 2011. (SCI, IF: 2.586)
[18] Daojing He*, L. Cui, H. Huang, and M. Ma. Design and verification of enhanced secure localization scheme in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems(TPDS), vol. 20, no. 7, pp. 1050–1058, July 2009. (SCI, IF: 1.733)
[19]Daojing He* and Sammy Chan.Small Data Dissemination for Wireless Sensor Networks: the Security Aspect.IEEE Wireless Communications Magazine (SCI, IF: 3.74), Accepted and to appear, 2014.
[20] Daojing He* and Sammy Chan.Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks.IEEE Transactions on Parallel and Distributed Systems (SCI, IF: 1.733), to appear, 2014.

相似回答
大家正在搜