Kewei Sha

According to our database1, Kewei Sha authored at least 38 papers between 2004 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
TMO: Time Domain Outsourcing Attribute-Based Encryption Scheme for Data Acquisition in Edge Computing.
IEEE Access, 2019

2018
On security challenges and open issues in Internet of Things.
Future Generation Comp. Syst., 2018

Cluster-Aware Kronecker Supported Data Collection for Sensory Data.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Transaction-Based Flow Rule Conflict Detection and Resolution in SDN.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Efficient Conditional Privacy-Preserving Authentication Scheme Using Revocation Messages for VANET.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Patient Identification Based on Wrist Activity Data.
Proceedings of the Third IEEE/ACM International Conference on Connected Health: Applications, 2018

2017
A Secure and Efficient Framework to Read Isolated Smart Grid Devices.
IEEE Trans. Smart Grid, 2017

Cluster-Based Quality-Aware Adaptive Data Compression for Streaming Data.
J. Data and Information Quality, 2017

EdgeSec: Design of an Edge Layer Security Service to Enhance IoT Security.
Proceedings of the 1st IEEE International Conference on Fog and Edge Computing, 2017

An Overview of Access Control Mechanisms for Internet of Things.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

An Efficient Identity-Based Privacy-Preserving Authentication Scheme for VANETs.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2017

Exercise Evaluation Using Wrist Sensors.
Proceedings of the Second IEEE/ACM International Conference on Connected Health: Applications, 2017

2016
Guest Editorial: Special Issue on Cognitive, Cellular and Mobile Networks.
EAI Endorsed Trans. Wireless Spectrum, 2016

CrowdBlueNet: Maximizing Crowd Data Collection Using Bluetooth Ad Hoc Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

Design and implementation of a multi-facet hierarchical cybersecurity education framework.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

QAAC: Quality-Assured Adaptive Data Compression for Sensor Data.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

2015
Data Quality Challenges in Cyber-Physical Systems.
J. Data and Information Quality, 2015

REMEDY: Remote exercise monitoring using an evaluative data sensing system for cancer.
Proceedings of the 17th International Conference on E-health Networking, 2015

2014
One-time symmetric key based cloud supported secure smart meter reading.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

Lightweight construction of the information potential field in wireless sensor networks.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

2013
Slight Homomorphic Signature for Access Controlling in Cloud Computing.
Wireless Personal Communications, 2013

Editorial: Special Issue in Privacy, Security and Trust for Mobile Systems.
Wireless Personal Communications, 2013

Multipath Routing Techniques in Wireless Sensor Networks: A Survey.
Wireless Personal Communications, 2013

2010
: Role-Differentiated Cooperative Deceptive Data Detection and Filtering in VANETs.
IEEE Trans. Vehicular Technology, 2010

Sleep-Wakeup Algorithms for Virtual Barriers of Wireless Sensor Networks in 3D Space.
Proceedings of the Sixth International Conference on Mobile Ad-hoc and Sensor Networks, 2010

On Sweep Coverage with Minimum Mobile Sensors.
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010

2009
Asymmetry-aware link layer services in wireless sensor networks.
J. Embedded Computing, 2009

Post abstract: Role-based deceptive detection and filtering in WSNs.
Proceedings of the 8th International Conference on Information Processing in Sensor Networks, 2009

2008
Consistency-driven data quality management of networked sensor systems.
J. Parallel Distrib. Comput., 2008

Probabilistic Adaptive Anonymous Authentication in Vehicular Networks.
J. Comput. Sci. Technol., 2008

Data Quality and Failures Characterization of Sensing Data in Environmental Applications.
Proceedings of the Collaborative Computing: Networking, 2008

2007
Enforcing Privacy Using Symmetric Random Key-Set in Vehicular Networks.
Proceedings of the International Symposium on Autonomous Decentralized Systems (ISADS 2007), 2007

Modeling Data Consistency in Wireless Sensor Networks.
Proceedings of the 27th International Conference on Distributed Computing Systems Workshops (ICDCS 2007 Workshops), 2007

2006
WEAR: a balanced, fault-tolerant, energy-aware routing protocol in WSNs.
IJSNet, 2006

On the Effects of Consistency in Data Operations in Wireless Sensor Networks.
Proceedings of the 12th International Conference on Parallel and Distributed Systems, 2006

2005
Asymmetry-Aware Link Quality Services in Wireless Sensor Networks.
Proceedings of the Embedded and Ubiquitous Computing, 2005

2004
Revisiting the lifetime of wireless sensor networks.
Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, 2004

QueryAgent: A General Query Processing Tool for Sensor Networks.
Proceedings of the 33rd International Conference on Parallel Processing Workshops (ICPP 2004 Workshops), 2004


  Loading...