Biming Tian

According to our database1, Biming Tian authored at least 22 papers between 2008 and 2013.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
A hierarchical pea-based anomaly detection model.
Proceedings of the International Conference on Computing, Networking and Communications, 2013

2012
Cognitive radio network security: A survey.
J. Netw. Comput. Appl., 2012

Towards enhanced key management in multi-phase ZigBee network architecture.
Comput. Commun., 2012

Erratum: Self-Healing Key Distribution Schemes for Wireless Networks: A Survey.
Comput. J., 2012

Histogram-Based Online Anomaly Detection in Hierarchical Wireless Sensor Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012

2011
Anomaly detection in wireless sensor networks: A survey.
J. Netw. Comput. Appl., 2011

A mutual-healing key distribution scheme in wireless sensor networks.
J. Netw. Comput. Appl., 2011

Self-Healing Key Distribution Schemes for Wireless Networks: A Survey.
Comput. J., 2011

Highly Efficient Distance-Based Anomaly Detection through Univariate with PCA in Wireless Sensor Networks.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Generalized hash-binary-tree based self-healing key distribution with implicit authentication.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

A Combinational Approach for Trust Establishment in Cognitive Radio Networks.
Proceedings of the International Conference on Complex, 2011

2010
An Efficient Self-Healing Key Distribution Scheme with Constant-Size Personal Keys for Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2010

A Key Management Protocol for Multiphase Hierarchical Wireless Sensor Networks.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

Trust-Based Authentication for Secure Communication in Cognitive Radio Networks.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

2009
Efficient threshold self-healing key distribution with sponsorization for infrastructureless wireless networks.
IEEE Trans. Wirel. Commun., 2009

Secure web services using two-way authentication and three-party key establishment for service delivery.
J. Syst. Archit., 2009

A Key Management Scheme for Heterogeneous Sensor Networks Using Keyed-Hash Chain.
Proceedings of the MSN 2009, 2009

An Authenticated Self-Healing Key Distribution Scheme Based on Bilinear Pairings.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

2008
A Self-healing Key Distribution Scheme with Novel Properties.
Int. J. Netw. Secur., 2008

A self-healing key distribution scheme based on vector space secret sharing and one way hash chains.
Proceedings of the 9th IEEE International Symposium on a World of Wireless, 2008

An Efficient Self-Healing Key Distribution Scheme.
Proceedings of the NTMS 2008, 2008

A Self-Healing and Mutual-Healing Key Distribution Scheme Using Bilinear Pairings for Wireless Networks.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008


  Loading...