Celia Li

According to our database1, Celia Li authored at least 18 papers between 2004 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Secure Sharing of Data for Dynamic Group in Public Cloud.
Int. J. Netw. Secur., 2020

Design of Key Management Protocols for Internet of Things.
Int. J. Netw. Secur., 2020

2018
Secure and Efficient Authentication Protocol for Power System Computer Networks.
Int. J. Netw. Secur., 2018

A Lightweight Authentication Protocol in Smart Grid.
Int. J. Netw. Secur., 2018

A Group Key Management Protocol for Mobile Devices.
Proceedings of the Nineteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2018

(WIP) Authenticated Key Management Protocols for Internet of Things.
Proceedings of the 2018 IEEE International Congress on Internet of Things, 2018

A Novice Group Sharing Method for Public Cloud.
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018

2013
Efficient authentication for fast handover in wireless mesh networks.
Comput. Secur., 2013

2012
Efficient Group Key Management in Wireless LANs.
Proceedings of the Third FTRA International Conference on Mobile, 2012

2011
Secure Routing for Wireless Mesh Networks.
Int. J. Netw. Secur., 2011

Fast authentication for mobility support in wireless mesh networks.
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011

2010
SEAODV: A Security Enhanced AODV Routing Protocol for Wireless Mesh Networks.
Trans. Comput. Sci., 2010

Fast authentication for mobile clients in wireless mesh networks.
Proceedings of the 23rd Canadian Conference on Electrical and Computer Engineering, 2010

2008
Location-based design for secure and efficient wireless sensor networks.
Comput. Networks, 2008

2007
Key management for role hierarchy in distributed systems.
J. Netw. Comput. Appl., 2007

Group key management in wireless mesh networks.
Proceedings of the 4th International ICST Conference on Heterogeneous Networking for Quality, 2007

2004
An XML-Based Administration Method on Role-Based Access Control in Distributed Systems.
Int. J. Comput. Their Appl., 2004

Access control in a hierarchy using one-way hash functions.
Comput. Secur., 2004


  Loading...