C. Edward Chow

Orcid: 0000-0002-6870-2952

According to our database1, C. Edward Chow authored at least 50 papers between 1981 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Lightweight and Identifier-Oblivious Engine for Cryptocurrency Networking Anomaly Detection.
IEEE Trans. Dependable Secur. Comput., 2023

2022
Robust P2P networking connectivity estimation engine for permissionless Bitcoin cryptocurrency.
Comput. Networks, 2022

2021
DAMAC: A Delay-Aware MAC Protocol for Ad Hoc Underwater Acoustic Sensor Networks.
Sensors, 2021

Robust P2P Connectivity Estimation for Permissionless Bitcoin Network.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

2020
Experiments with Clifford Geometric Algebra Applied to Cryptography.
Proceedings of the Joint 11th International Conference on Soft Computing and Intelligent Systems and 21st International Symposium on Advanced Intelligent Systems, 2020

Optimizing Social Welfare for Task Offloading in Mobile Edge Computing.
Proceedings of the 2020 IFIP Networking Conference, 2020

Homomorphic Data Concealment Powered by Clifford Geometric Algebra.
Proceedings of the Advances in Computer Graphics, 2020

2019
A New Approach Towards Fully Homomorphic Encryption Over Geometric Algebra.
Proceedings of the 10th IEEE Annual Ubiquitous Computing, 2019

Fully Homomorphic Key Update and Key Exchange Over Exterior Product Spaces For Cloud Computing Applications.
Proceedings of the 24th IEEE Pacific Rim International Symposium on Dependable Computing, 2019

Homomorphic Image Processing Over Geometric Product Spaces and Finite P-Adic Arithmetic.
Proceedings of the 2019 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2019

2018
UFAP: Ultra-fast handoff authentication protocol for wireless mesh networks.
Proceedings of the 2018 Wireless Days, 2018

OTMEN: Offloading Traffic Monitoring to Edge Nodes in Software-Defined Datacenter Networks.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

Towards understanding application performance and system behavior with the full dynticks feature.
Proceedings of the IEEE 8th Annual Computing and Communication Workshop and Conference, 2018

2017
Automated U.S Diplomatic Cables Security Classification: Topic Model Pruning vs. Classification Based on Clusters.
CoRR, 2017

A Framework for SDN Network Evaluation.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2017

Portable SDN Testbed Prototype.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2017

Cyber anonymity based on software-defined networking and Onion Routing (SOR).
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

R2D2: Right place, right path data delivery.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

SDN data path confidence analysis.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

SDN On-The-Go (OTG) physical testbed.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

2016
Automated big text security classification.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

Pathseer: a centralized tracer of packet trajectories in software-defined datacenter networks.
Proceedings of the 2016 Principles, Systems and Applications of IP Telecommunications, 2016

Automated big security text pruning and classification.
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016

2014
A framework for large-scale modeling and simulation of attacks on an OpenFlow network.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

2013
N-Cloud: Improving performance and security in cloud storage.
Proceedings of the IEEE 14th International Conference on High Performance Switching and Routing, 2013

2010
HTEE: An HMAC based Tamper Evident Encryption.
Proceedings of the SECRYPT 2010, 2010

Efficient Asymmetric IPSec for Secure iSCSI.
Proceedings of the SECRYPT 2010, 2010

2006
An integrated approach with feedback control for robust Web QoS design.
Comput. Commun., 2006

2005
Two-Tier Resource Allocation for Slowdown Differentiation on Server Clusters.
Proceedings of the 34th International Conference on Parallel Processing (ICPP 2005), 2005

Secure Information Sharing Using Attribute Certificates and Role Based Access Control.
Proceedings of The 2005 International Conference on Security and Management, 2005

2004
An Adaptive Process Allocation Strategy for Proportional Responsiveness Differentiation on Web Servers.
Proceedings of the IEEE International Conference on Web Services (ICWS'04), 2004

Secure collective defense system.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

An Exercise in Constructing Secure Mobile Ad hoc Network (SMANET).
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

2003
Enhance Features and Performance of a Linux-based Content Switch.
Proceedings of the 21st IASTED International Multi-Conference on Applied Informatics (AI 2003), 2003

LSWS: A Linux-based Secure Web Switch.
Proceedings of the 21st IASTED International Multi-Conference on Applied Informatics (AI 2003), 2003

Design of an Autonomous Anti-DDoS (A2D2) Network.
Proceedings of the 21st IASTED International Multi-Conference on Applied Informatics (AI 2003), 2003

2001
An Algorithm for Available Bandwidth Measurement.
Proceedings of the Networking, 2001

1998
Enhance Network Security with Dynamic Packet Filter.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1998), 1998

1995
Resource allocation for multiparty connections.
J. Syst. Softw., 1995

1992
Resource Allocation Protocol for Multiparty Connections in Broadband Networks.
Proceedings of the Protocols for High-Speed Networks III, 1992

Two Multiparty Connection Establishment Procedures For Broadband ISDN.
Proceedings of the Network Without Bounds: Network Operations and Management Symposium, 1992

1991
On Multicast Path Finding Algorithms.
Proceedings of the Proceedings IEEE INFOCOM '91, 1991

1990
Achieving Multimedia Communications on a Heterogeneous Network.
IEEE J. Sel. Areas Commun., 1990

1988
PROSPEC: An Interactive Programming Environment for Designing and Verifying Communication Protocols.
IEEE Trans. Software Eng., 1988

1987
Multimode Interaction in a Telecommunications Testbed: The Case of Memory Dialing.
Proceedings of the Cognitive Engeineering in the Design of Human-Computer Interaction and Expert Systems, 1987

1985
A Discipline for Constructing Multiphase Communication Protocols
ACM Trans. Comput. Syst., 1985

1984
An exercise in constructing multi-phase communication protocols.
Comput. Commun. Rev., 1984

On the Decidability of Livelock Detection in Networks of Communicating Finite State Machines.
Proceedings of the Protocol Specification, 1984

On Constructing Multi-Phase Communication Protocols.
Proceedings of the Protocol Specification, 1984

1981
An Approach to Memory Testing, Diagnostics and Analysis.
Proceedings of the Proceedings International Test Conference 1981, 1981


  Loading...