Peng Ning Coauthor index DBLP Vis pubzone.org

List of publications from the DBLP Bibliography Server - FAQ
Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

DBLP keys2009
86Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMichael Backes, Peng Ning: Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings Springer 2009
85Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYao Liu, Michael K. Reiter, Peng Ning: False data injection attacks against state estimation in electric power grids. ACM Conference on Computer and Communications Security 2009: 21-32
84Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLZhi Wang, Xuxian Jiang, Weidong Cui, Peng Ning: Countering kernel rootkits with lightweight hook protection. ACM Conference on Computer and Communications Security 2009: 545-554
83Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAttila Altay Yavuz, Peng Ning: BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems. ACSAC 2009: 219-228
82Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAhmed M. Azab, Peng Ning, Emre Can Sezer, Xiaolan Zhang: HIMA: A Hypervisor-Based Integrity Measurement Agent. ACSAC 2009: 461-470
81Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLChongkyung Kil, Emre Can Sezer, Ahmed M. Azab, Peng Ning, Xiaolan Zhang: Remote attestation to dynamic system properties: Towards providing complete system integrity evidence. DSN 2009: 115-124
80Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAn Liu, Peng Ning, Chun Wang: Lightweight Remote Image Management for Secure Code Dissemination in Wireless Sensor Networks. INFOCOM 2009: 1242-1250
79Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLKun Sun, An Liu, Roger Xu, Peng Ning, W. Douglas Maughan: Securing network access in wireless sensor networks. WISEC 2009: 261-268
2008
78no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Ning, Paul F. Syverson, Somesh Jha: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008 ACM 2008
77Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAn Liu, Peng Ning: TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks. IPSN 2008: 245-256
76Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLSangwon Hyun, Peng Ning, An Liu, Wenliang Du: Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks. IPSN 2008: 445-456
75Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAn Liu, Young-Hyun Oh, Peng Ning: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks Using Seluge. IPSN 2008: 561-562
74Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLQi Dong, Donggang Liu, Peng Ning: Pre-authentication filters: providing dos resistance for signature-based broadcast authentication in sensor networks. WISEC 2008: 2-12
73Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLQing Zhang, Ting Yu, Peng Ning: A Framework for Identifying Compromised Nodes in Wireless Sensor Networks. ACM Trans. Inf. Syst. Secur. 11(3): (2008)
72Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDonggang Liu, Peng Ning, An Liu, Cliff Wang, Wenliang Du: Attack-Resistant Location Estimation in Wireless Sensor Networks. ACM Trans. Inf. Syst. Secur. 11(4): (2008)
71Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Ning, An Liu, Wenliang Du: Mitigating DoS attacks against broadcast authentication in wireless sensor networks. TOSN 4(1): (2008)
70Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDonggang Liu, Peng Ning, Wenliang Du: Group-based key predistribution for wireless sensor networks. TOSN 4(2): (2008)
2007
69no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Ning, Sabrina De Capitani di Vimercati, Paul F. Syverson: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007 ACM 2007
68no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Ning, Ting Yu: Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, WPES 2007, Alexandria, VA, USA, October 29, 2007 ACM 2007
67no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Ning, Vijay Atluri: Proceedings of the 2007 ACM workshop on Computer Security Architecture, CSAW 2007, Fairfax, VA, USA, November 2, 2007 ACM 2007
66no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Ning, Vijay Atluri, Virgil D. Gligor, Heiko Mantel: Proceedings of the 2007 ACM workshop on Formal methods in security engineering, FMSE 2007, Fairfax, VA, USA, November 2, 2007 ACM 2007
65no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Ning, Vijay Atluri, Shouhuai Xu, Moti Yung: Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007, Alexandria, VA, USA, November 2, 2007 ACM 2007
64no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Ning, Ernesto Damiani, Seth Proctor: Proceedings of the 4th ACM Workshop On Secure Web Services, SWS 2007, Fairfax, VA, USA, November 2, 2007 ACM 2007
63Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLEmre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu: Memsherlock: an automated debugger for unknown memory corruption vulnerabilities. ACM Conference on Computer and Communications Security 2007: 562-572
62Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLChongkyung Kil, Emre Can Sezer, Peng Ning, Xiaolan Zhang: Automated Security Debugging Using Program Structural Constraints. ACSAC 2007: 453-462
61Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLQinghua Zhang, Douglas S. Reeves, Peng Ning, S. Purushothaman Iyer: Analyzing network traffic to detect self-decrypting exploit code. ASIACCS 2007: 4-12
60Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPan Wang, Peng Ning, Douglas S. Reeves: A k-anonymous communication protocol for overlay networks. ASIACCS 2007: 45-56
59Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYoung June Pyun, Young Hee Park, Xinyuan Wang, Douglas S. Reeves, Peng Ning: Tracing Traffic through Intermediate Hosts that Repacketize Flows. INFOCOM 2007: 634-642
58Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRonghua Wang, Wenliang Du, Peng Ning: Containing denial-of-service attacks in broadcast authentication in sensor networks. MobiHoc 2007: 71-79
57Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLTong Zhou, Romit Roy Choudhury, Peng Ning, Krishnendu Chakrabarty: Privacy-Preserving Detection of Sybil Attacks in Vehicular Ad Hoc Networks. MobiQuitous 2007: 1-8
56Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLSencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning: Interleaved hop-by-hop authentication against false data injection attacks in sensor networks. TOSN 3(3): (2007)
2006
55no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Ning, Sihan Qing, Ninghui Li: Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings Springer 2006
54Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLKun Sun, Peng Ning, Cliff Wang: TinySeRSync: secure and resilient time synchronization in wireless sensor networks. ACM Conference on Computer and Communications Security 2006: 264-277
53Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLKun Sun, Pai Peng, Peng Ning, Cliff Wang: Secure Distributed Cluster Formation in Wireless Sensor Networks. ACSAC 2006: 131-140
52Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLChongkyung Kil, Jinsuk Jun, Christopher Bookholt, Jun Xu, Peng Ning: Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software. ACSAC 2006: 339-348
51Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPai Peng, Peng Ning, Douglas S. Reeves: On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques. IEEE Symposium on Security and Privacy 2006: 334-349
50Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYan Zhai, Peng Ning, Jun Xu: Integrating IDS Alert Correlation and OS-Level Dependency Tracking. ISI 2006: 272-284
49Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLKun Sun, Peng Ning, Cliff Wang: Secure and resilient clock synchronization in wireless sensor networks. IEEE Journal on Selected Areas in Communications 24(2): 395-408 (2006)
48Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWenliang Du, Lei Fang, Peng Ning: LAD: Localization anomaly detection for wireless sensor networks. J. Parallel Distrib. Comput. 66(7): 874-886 (2006)
2005
47no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLVijay Atluri, Peng Ning, Wenliang Du: Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2005, Alexandria, VA, USA, November 7, 2005 ACM 2005
46Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Christopher Bookholt: Automatic diagnosis and response to memory corruption vulnerabilities. ACM Conference on Computer and Communications Security 2005: 223-234
45Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDingbang Xu, Peng Ning: Privacy-Preserving Alert Correlation: A Concept Hierarchy Based Approach. ACSAC 2005: 537-546
44Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDonggang Liu, Peng Ning, Wenliang Du: Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks. ICDCS 2005: 609-619
43Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPai Peng, Peng Ning, Douglas S. Reeves, Xinyuan Wang: Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets. ICDCS Workshops 2005: 107-113
42Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLQinghua Zhang, Pan Wang, Douglas S. Reeves, Peng Ning: Defending against Sybil Attacks in Sensor Networks. ICDCS Workshops 2005: 185-191
41Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPan Wang, Peng Ning, Douglas S. Reeves: Network Access Control for Mobile Ad-Hoc Networks. ICICS 2005: 350-362
40Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLei Fang, Wenliang Du, Peng Ning: A beacon-less location discovery scheme for wireless sensor networks. INFOCOM 2005: 161-171
39Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWenliang Du, Lei Fang, Peng Ning: LAD: Localization Anomaly Detection forWireless Sensor Networks. IPDPS 2005
38Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDonggang Liu, Peng Ning, Wenliang Du: Attack-resistant location estimation in sensor networks. IPSN 2005: 99-106
37Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWenliang Du, Ronghua Wang, Peng Ning: An efficient scheme for authenticating public keys in sensor networks. MobiHoc 2005: 58-67
36Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDonggang Liu, Peng Ning, Sencun Zhu, Sushil Jajodia: Practical Broadcast Authentication in Sensor Networks. MobiQuitous 2005: 118-132
35Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPan Wang, Douglas S. Reeves, Peng Ning: Secure Address Auto-con.guration for Mobile Ad Hoc Networks. MobiQuitous 2005: 519-522
34Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDonggang Liu, Peng Ning, Wenliang Du: Group-based key pre-distribution in wireless sensor networks. Workshop on Wireless Security 2005: 11-20
33Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDonggang Liu, Peng Ning, Rongfang Li: Establishing pairwise keys in distributed sensor networks. ACM Trans. Inf. Syst. Secur. 8(1): 41-77 (2005)
32Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Ning, Kun Sun: How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols. Ad Hoc Networks 3(6): 795-819 (2005)
31Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLKun Sun, Peng Ning, Cliff Wang: Fault-Tolerant Cluster-Wise Clock Synchronization for Wireless Sensor Networks. IEEE Trans. Dependable Sec. Comput. 2(3): 177-189 (2005)
30Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDonggang Liu, Peng Ning: Improving key predistribution with deployment knowledge in static sensor networks. TOSN 1(2): 204-239 (2005)
2004
29Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDingbang Xu, Peng Ning: Alert Correlation through Triggering Events and Common Resources. ACSAC 2004: 360-369
28Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeves: Reasoning About Complementary Intrusion Evidence. ACSAC 2004: 39-48
27Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLQinglin Jiang, Douglas S. Reeves, Peng Ning: Improving Robustness of PGP Keyrings by Conflict Detection. CT-RSA 2004: 194-207
26Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLSencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning: An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. IEEE Symposium on Security and Privacy 2004: 259-271
25Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPan Wang, Peng Ning, Douglas S. Reeves: Storage-Efficient Stateless Group Key Revocation. ISC 2004: 25-38
24Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLQinglin Jiang, Douglas S. Reeves, Peng Ning: Certificate Recommendations to Improve the Robustness of Web of Trust. ISC 2004: 292-303
23Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Ning, Dingbang Xu, Christopher G. Healey, Robert St. Amant: Building Attack Scenarios through Integration of Complementary Alert Correlation Method. NDSS 2004
22Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDonggang Liu, Peng Ning: Multilevel µTESLA: Broadcast authentication for distributed sensor networks. ACM Trans. Embedded Comput. Syst. 3(4): 800-836 (2004)
21Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Ning, Yun Cui, Douglas S. Reeves, Dingbang Xu: Techniques and tools for analyzing intrusion alerts. ACM Trans. Inf. Syst. Secur. 7(2): 274-318 (2004)
20Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Ning, Dingbang Xu: Hypothesizing and reasoning about attacks missed by intrusion detection systems. ACM Trans. Inf. Syst. Secur. 7(4): 591-627 (2004)
2003
19Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Ning, Dingbang Xu: Learning attack strategies from intrusion alerts. ACM Conference on Computer and Communications Security 2003: 200-209
18Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDonggang Liu, Peng Ning, Kun Sun: Efficient self-healing group key distribution with revocation capability. ACM Conference on Computer and Communications Security 2003: 231-240
17Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDonggang Liu, Peng Ning: Establishing pairwise keys in distributed sensor networks. ACM Conference on Computer and Communications Security 2003: 52-61
16no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Ning, Dingbang Xu: Adapting Query Optimization Techniques for Efficient Alert Correlation. DBSec 2003: 75-88
15no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Ning, Kun Sun: How to Misuse AODV: A Case Study of Insiider Attacks against Mobile Ad-hoc Routing Protocols. IAW 2003: 60-67
14Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDonggang Liu, Peng Ning: Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks. NDSS 2003
13Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDonggang Liu, Peng Ning: Location-based pairwise key establishments for static sensor networks. SASN 2003: 72-82
12no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYingjiu Li, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia: Discovering calendar-based temporal association rules. Data Knowl. Eng. 44(2): 193-218 (2003)
2002
11Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Ning, Yun Cui, Douglas S. Reeves: Constructing attack scenarios through correlation of intrusion alerts. ACM Conference on Computer and Communications Security 2002: 245-254
10Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Ning, Yun Cui, Douglas S. Reeves: Analyzing Intensive Intrusion Alerts via Correlation. RAID 2002: 74-94
9no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Ning, Xiaoyang Sean Wang, Sushil Jajodia: An Algebraic Representation of Calendars. Ann. Math. Artif. Intell. 36(1-2): 5-38 (2002)
8Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Ning, Sushil Jajodia, Xiaoyang Sean Wang: Design and implementation of a decentralized prototype system for detecting distributed attacks. Computer Communications 25(15): 1374-1391 (2002)
2001
7Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Ning, Yiqun Lisa Yin: Efficient Software Implementation for Finite Field Multiplication in Normal Basis. ICICS 2001: 177-188
6Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYingjiu Li, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia: Discovering Calendar-based Temporal Association Rules. TIME 2001: 111-118
5Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Ning, Sushil Jajodia, Xiaoyang Sean Wang: Abstraction-based intrusion detection in distributed environments. ACM Trans. Inf. Syst. Secur. 4(4): 407-452 (2001)
4Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Liu, Peng Ning, Sushil Jajodia: Avoiding loss of fairness owing to failures in fair data exchange systems. Decision Support Systems 31(3): 337-350 (2001)
2000
3Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Liu, Peng Ning, Sushil Jajodia: Avoiding Loss of Fairness Owing to Process Crashes in Fair Data Exchange Protocols. DSN 2000: 631-640
2no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJiahai Yang, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia: CARDS: A Distributed System for Detecting Coordinated Attacks. SEC 2000: 171-180
1Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeng Ning, Xiaoyang Sean Wang, Sushil Jajodia: Modeling requests among cooperating intrusion detection systems. Computer Communications 23(17): 1702-1715 (2000)

Coauthor Index

1Robert St. Amant [23]
2Vijayalakshmi Atluri (Vijay Atluri) [47] [65] [66] [67]
3Ahmed M. Azab [81] [82]
4Michael Backes [86]
5Christopher Bookholt [46] [52]
6Krishnendu Chakrabarty [57]
7Romit Roy Choudhury [57]
8Weidong Cui [84]
9Yun Cui [10] [11] [21]
10Ernesto Damiani [64]
11Qi Dong [74]
12Wenliang Du [34] [37] [38] [39] [40] [44] [47] [48] [58] [70] [71] [72] [76]
13Lei Fang [39] [40] [48]
14Virgil D. Gligor [66]
15Christopher G. Healey [23]
16Sangwon Hyun [76]
17Purush Iyer [28]
18S. Purushothaman Iyer (S. Purushothaman) [61]
19Sushil Jajodia [1] [2] [3] [4] [5] [6] [8] [9] [12] [26] [36] [56]
20Somesh Jha [78]
21Qinglin Jiang [24] [27]
22Xuxian Jiang [84]
23Jinsuk Jun [52]
24Chongkyung Kil [46] [52] [62] [63] [81]
25Ninghui Li [55]
26Rongfang Li [33]
27Yingjiu Li [6] [12]
28An Liu [71] [72] [75] [76] [77] [79] [80]
29Donggang Liu [13] [14] [17] [18] [22] [30] [33] [34] [36] [38] [44] [70] [72] [74]
30Peng Liu [3] [4]
31Yao Liu [85]
32Heiko Mantel [66]
33W. Douglas Maughan [79]
34Young-Hyun Oh [75]
35Young Hee Park [59]
36Pai Peng [43] [51] [53]
37Seth Proctor [64]
38Young June Pyun [59]
39Sihan Qing [55]
40Douglas S. Reeves [10] [11] [21] [24] [25] [27] [28] [35] [41] [42] [43] [51] [59] [60] [61]
41Michael K. Reiter [85]
42Sanjeev Setia [26] [56]
43Emre Can Sezer [62] [63] [81] [82]
44Kun Sun [15] [18] [31] [32] [49] [53] [54] [79]
45Paul F. Syverson [69] [78]
46Sabrina De Capitani di Vimercati [69]
47Chun Wang [80]
48Cliff Wang [31] [49] [53] [54] [72]
49Pan Wang [25] [35] [41] [42] [60]
50Ronghua Wang [37] [58]
51Xiaoyang Sean Wang [1] [2] [5] [6] [8] [9] [12]
52Xinyuan Wang [43] [59]
53Zhi Wang [84]
54Dingbang Xu [16] [19] [20] [21] [23] [29] [45]
55Jun Xu [46] [50] [52] [63]
56Roger Xu [79]
57Shouhuai Xu [65]
58Jiahai Yang [2]
59Attila Altay Yavuz [83]
60Yiqun Lisa Yin [7]
61Ting Yu [68] [73]
62Moti Yung (Mordechai M. Yung) [65]
63Yan Zhai [28] [46] [50]
64Qing Zhang [73]
65Qinghua Zhang [42] [61]
66Xiaolan Zhang (Xiaolan (Catherine) Zhang) [62] [81] [82]
67Tong Zhou [57]
68Sencun Zhu [26] [36] [56]

Colors in the list of coauthors

Copyright © Sun Mar 14 22:39:24 2010 by Michael Ley (ley@uni-trier.de)