上海交通大学计算机科学与工程系,上海交通大学计算机科学与工程系(CSE)

Journal papers:

[1]Yuanyuan Zhang, Dawu Gu and Juanru Li, “Exploiting unidirectional links for key establishment protocols in heterogeneous sensor networks,” Computer Communications, Elsevier Publication, vol.31, pp. 2959-2971, Aug. 2008.

[2]Yuanyuan Zhang, Dawu Gu, Fangyong Hou, Mengqi Zeng and Tao Cheng, “Architecture Support for Memory Confidentiality and Integrity in Embedded Systems,” International Journal of Distributed Sensor Networks, Taylor & Francis, vol.5, Jan. 2009.

[3]Yuanyuan Zhang and Marine Minier, “How Network Coding System Constrains Packet Pollution Attacks in Wireless Sensor Networks,” to appear in International Journal of Grid and Utility Computing.

[4]Yuanyuan Zhang and Marine Minier, “Selective Forwarding Attacks Against Data and ACK Flows in Network Coding and Countermeasures,” Journal of Computer Networks and Communications, Taylor & Francis, vol.2012, Article ID 184783, 2012. doi:10.1155/2012/184783.

Conference papers:

[1]Y. Zhang, and M. Minier, “How Network Coding System Constrains Packet Pollution Attacks in Wireless Sensor Networks,” in the 6th International Conference on Network and System Security(NSS2012), Wuyishan, Fujian, China, Nov.2012.

[2]Y. Zhang, W. Znaidi, C. Lauradoux, and M. Minier, “Flooding attacks against network coding and countermeasures,” in the 5th International Conference on Network and System Security(NSS2011), Milan, Italy, Sep.2011.

[3]Yuanyuan Zhang and Junzhong Gu, “Using counter cache coherence to improve memory encryptions performance in multiprocessor systems,” in the 8th FTRA International Conference on Secure and Trust Computing, Data Management and Applications(STA2011), Loutraki, Greece, June.2011.

[4]Yuanyuan Zhang, Dawu Gu and Bart Preneel, “Reliable key establishment scheme exploiting unidirectional links in wireless sensor networks,” in the 2008 IEEE/IFIP International Conference On Embedded and Ubiquitous Computing (EUC2008), Shanghai, China, Dec.2008.

[5]Yuanyuan Zhang, Dawu Gu, “PWKEP: a pair-wise key establishment protocol for sensor networks providing provable security,” the 4th IEEE International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM2008), Dalian, China, Oct. 2008.

[6]Yuanyuan Zhang, Dawu Gu, Fangyong Hou, Mengqi Zeng and Tao Cheng, “Architecture support for memory confidentiality and integrity in embedded systems,” in the International Symposium on Computer and Sensor Networks and Systems (ISCSNS2008), Zhengzhou, China, Apr. 2008.

[7]Mengqi Zeng, Fangyong Hou, Dawu Gu, Yuanyuan Zhang and NingNan Song. “Efficient Authenticated Encryption for Hybrid Hard Drives Based on GCM,” in the International Conference on High Performance Computing and Communications (HPCC 2008), IEEE Computer Society, 964-970. Dalian, China, Sep.2008.

[8]Yuanyuan Zhang, Dawu Gu, “Performance analysis of pair-wise key establishment protocols for sensor networks,” in the 3rd IEEE International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM2007), Shanghai, China, Sep.2007.

[9]Chuanhe Huang, Yuanyuan Zhang, and Xiaohua Jia, “An on-demand clustering mechanism for hierarchical routing protocol in ad hoc networks,” in the 2nd IEEE International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM2006), Wuhan, China, Sep.2006.

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值