Karen Lu

According to our database1, Karen Lu authored at least 20 papers between 1999 and 2013.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
Managing Access to Security Hardware in PC Browsers.
Proceedings of the Workshop on Web Applications and Secure Hardware (WASH'13), 2013

2010
Making Smart Cards Truly Portable.
IEEE Secur. Priv., 2010

Protecting Resource-Constrained Network Devices from Denial-of-Service Attacks.
Proceedings of the 2010 International Conference on Security & Management, 2010

Combining Smart Card Services with a Secure Memory Token.
Proceedings of the 2010 International Conference on Security & Management, 2010

2009
Secure Authentication Through Insecure Systems: An Innovative Approach to Smart Card Login.
Proceedings of the 2009 International Conference on Internet Computing, 2009

A New Secure Communication Framework for Smart Cards.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

2008
A Proxy Agent for Small Network-Enabled Devices.
Proceedings of the 2008 IEEE International Performance, 2008

Communication Security between a Computer and a Hardware Token.
Proceedings of the Third International Conference on Systems, 2008

Attack Detection for Resource-Constrained Network Devices.
Proceedings of the Third International Conference on Systems, 2008

2007
Network smart card review and analysis.
Comput. Networks, 2007

Securing the Internet Through Plug-n-Play Smart Cards.
Proceedings of the 2007 International Conference on Internet Computing, 2007

2006
Multi-stage Packet Filtering in Network Smart Cards.
Proceedings of the Smart Card Research and Advanced Applications, 2006

2005
Network Smart Card: A New Paradigm of Secure Online Transactions.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

From Slave Devices to Active Network Peers.
Proceedings of The 2005 International Conference on Internet Computing, 2005

Firewall at AHDLC Layer.
Proceedings of The 2005 International Conference on Embedded Systems and Applications, 2005

2004
Prevent Online Identity Theft - Using Network Smart Cards for Secure Online Transactions.
Proceedings of the Information Security, 7th International Conference, 2004

Secure Network Card - Implementation of a Standard Network Stack in a Smart Card.
Proceedings of the Smart Card Research and Advanced Applications VI, 2004

2002
Lossless Subdivision-Based Multiresolution Representation of Arbitrary Triangle Meshes Using Kite Trees.
Int. J. Found. Comput. Sci., 2002

2000
Adaptive Visualization for Interactive Geometric Modeling in Geoscience.
Proceedings of the 8-th International Conference in Central Europe on Computer Graphics, 2000

1999
Geometric modeling with a multiresolution representation.
Proceedings of the 11th Canadian Conference on Computational Geometry, 1999


  Loading...