Publications

Export (9) results:[Tagged][XML][BibTex]
Sort by:[Year][Title][Type][Author]
Filters: author is Chiang  [Clear All Filters]
2011
Lan, T., Lin, X., Chiang, M., Lee, R.B., "Stability and benefits of suboptimal utility maximization", IEEE/ACM Transactions on Networking, vol. 19, issue 4, 2011  . Abstract Tagged XML BibTex
2010
Xu, D., Dwoskin, J., Huang, J., Lan, T., Lee, R.B., , M.C., "Key management in wireless ad hoc networks", Theoretical Aspects of Distributed Computing in Sensor Networks, 2010  . Abstract Tagged XML BibTex
2009
Lan, T., Lee, R.B., Chiang, M., "Multi-path Key Establishment Against REM Attacks in Wireless Ad Hoc Networks", IEEE Global Communications Conference (GLOBECOM 2009), Honolulu, Hawaii, USA, Nov/Dec 2009. Abstract Tagged XML BibTex
2008
Lan, T., Lin, X., Chiang, M., Lee, R.B., "Stability and Benefits of Suboptimal Utility Maximization", submitted to IEEE Transactions on Networking, Nov. 4. Tagged XML BibTex
Lan, T., Lin, X., Chiang, M., Lee, R.B., "How Bad is Suboptimal Rate Allocation?", Proceedings of the 27th. Conference on Computer Communications, IEEE (INFOCOM ’08), pp. 951-959, April 13-18 2008. Tagged XML BibTex
Lan, T., Lee, R.B., Chiang, M., Multi-path Key Establishment under Byzantine Attacks in Wireless Ad Hoc Networks, , 2008  . Tagged XML BibTex
Lan, T., Lee, R.B., Chiang, M., Reliable and Secure Distributed Storage of Critical Information, , 2008  . Tagged XML BibTex
2007
Dwoskin, J., Xu, D., Huang, J., Chiang, M., Lee, R.B., "Secure Key Management Architecture Against Sensor-node Fabrication Attacks", IEEE GlobeCom 2007, Washington, DC, November 2007. Abstract Tagged XML BibTex
Xu, D., Huang, J., Dwoskin, J., Chiang, M., Lee, R.B., "Re-examining Probabilistic Versus Deterministic Key Management", Proceedings of the 2007 IEEE International Symposium on Information Theory (ISIT), Nice, France, pp. 2586-2590, June 2007. Abstract Tagged XML BibTex