Publications

Export (9) results:[Tagged][XML][BibTex]
Sort by:[Year][Title][Type][Author]
Filters: author is Chiang  [Clear All Filters]
X
Xu, D., Huang, J., Dwoskin, J., Chiang, M., Lee, R.B., "Re-examining Probabilistic Versus Deterministic Key Management", Proceedings of the 2007 IEEE International Symposium on Information Theory (ISIT), Nice, France, pp. 2586-2590, June 2007. Abstract Tagged XML BibTex
T
Lan, T., Lin, X., Chiang, M., Lee, R.B., "Stability and benefits of suboptimal utility maximization", IEEE/ACM Transactions on Networking, vol. 19, issue 4, 2011  . Abstract Tagged XML BibTex
Lan, T., Lee, R.B., Chiang, M., "Multi-path Key Establishment Against REM Attacks in Wireless Ad Hoc Networks", IEEE Global Communications Conference (GLOBECOM 2009), Honolulu, Hawaii, USA, Nov/Dec 2009. Abstract Tagged XML BibTex
Lan, T., Lin, X., Chiang, M., Lee, R.B., "How Bad is Suboptimal Rate Allocation?", Proceedings of the 27th. Conference on Computer Communications, IEEE (INFOCOM ’08), pp. 951-959, April 13-18 2008. Tagged XML BibTex
Lan, T., Lin, X., Chiang, M., Lee, R.B., "Stability and Benefits of Suboptimal Utility Maximization", submitted to IEEE Transactions on Networking, Nov. 4. Tagged XML BibTex
Lan, T., Lee, R.B., Chiang, M., Multi-path Key Establishment under Byzantine Attacks in Wireless Ad Hoc Networks, , 2008  . Tagged XML BibTex
Lan, T., Lee, R.B., Chiang, M., Reliable and Secure Distributed Storage of Critical Information, , 2008  . Tagged XML BibTex
D
Xu, D., Dwoskin, J., Huang, J., Lan, T., Lee, R.B., , M.C., "Key management in wireless ad hoc networks", Theoretical Aspects of Distributed Computing in Sensor Networks, 2010  . Abstract Tagged XML BibTex
Dwoskin, J., Xu, D., Huang, J., Chiang, M., Lee, R.B., "Secure Key Management Architecture Against Sensor-node Fabrication Attacks", IEEE GlobeCom 2007, Washington, DC, November 2007. Abstract Tagged XML BibTex