Kui Ren

According to our database1, Kui Ren authored at least 17 papers between 2003 and 2019.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2016, "For contributions to security and privacy in cloud computing and wireless networks".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Real-Time Privacy-Preserving Data Release Over Vehicle Trajectory.
IEEE Trans. Vehicular Technology, 2019

A Practical Neighbor Discovery Framework for Wireless Sensor Networks.
Sensors, 2019

Lightweight Privacy-Preserving Ensemble Classification for Face Recognition.
IEEE Internet of Things Journal, 2019

One Fault is All it Needs: Breaking Higher-Order Masking with Persistent Fault Analysis.
IACR Cryptology ePrint Archive, 2019

One Fault is All it Needs: Breaking Higher-Order Masking with Persistent Fault Analysis.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2019

Trustworthy Authentication for IoT with Human-and-Environment-in-the-Loop.
Proceedings of the Fourth International Workshop on Social Sensing, 2019

2018
Editorial.
IEEE Trans. Services Computing, 2018

Persistent Fault Analysis on Block Ciphers.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Image Reconstruction in Quantitative Photoacoustic Tomography with the Simplified P2 Approximation.
SIAM J. Imaging Sciences, 2018

Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition.
Frontiers of IT & EE, 2018

Butterfly: Environment-Independent Physical-Layer Authentication for Passive RFID.
IMWUT, 2018

2017
The Dual Role of Smartphones in IoT Security.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

2015
Message from the IPCCC 2015 technical program chairs.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

2008
Transport-Based Imaging in Random Media.
SIAM Journal of Applied Mathematics, 2008

2006
Frequency Domain Optical Tomography Based on the Equation of Radiative Transfer.
SIAM J. Scientific Computing, 2006

2004
Efficient Authenticated Key Agreement Protocol for Dynamic Groups.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

2003
Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient.
Proceedings of the Applied Cryptography and Network Security, 2003


  Loading...