Thomas Y. C. Woo

According to our database1, Thomas Y. C. Woo authored at least 32 papers between 1991 and 2009.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2009
On the detection of signaling DoS attacks on 3G/WiMax wireless networks.
Comput. Networks, 2009

2007
On the Detection of Signaling DoS Attacks on 3G Wireless Networks.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

2006
A survivable DoS-resistant overlay network.
Comput. Networks, 2006

Design and Evaluation of a Fast and Robust Worm Detection Algorithm.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

Separating control software from routers.
Proceedings of the First International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2006), 2006

2005
ECHOS - enhanced capacity 802.11 hotspots.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

2004
Topics in wireless security.
IEEE Wirel. Commun., 2004

Trading Resiliency for Security: Model and Algorithms.
Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP 2004), 2004

2003
On securely enabling intermediary-based services and performance enhancements for wireless mobile users.
Proceedings of the 2003 ACM Workshop on Wireless Security, 2003

2000
A Modular Approach to Packet Classification: Algorithms and Results.
Proceedings of the Proceedings IEEE INFOCOM 2000, 2000

1999
Next-generation wireless data services: architecture and experience.
IEEE Wirel. Commun., 1999

Application of compaction technique to optimizing wireless email transfer.
Proceedings of the 1999 IEEE Wireless Communications and Networking Conference, 1999

Cache-Based Compaction: A New Technique for Optimizing Web Transfer.
Proceedings of the Proceedings IEEE INFOCOM '99, 1999

1998
Experiences with Network-Based User Agents for Mobile Applications.
Mob. Networks Appl., 1998

Providing Internet services to mobile phones: a case study with email.
Proceedings of the 9th IEEE International Symposium on Personal, 1998

Update and Search Algorithms for Wireless Two-Way Messaging: Design and Performance.
Proceedings of the Proceedings IEEE INFOCOM '98, The Conference on Computer Communications, Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies, Gateway to the 21st Century, San Francisco, CA, USA, March 29, 1998

Designing a Distributed Authorization Service.
Proceedings of the Proceedings IEEE INFOCOM '98, The Conference on Computer Communications, Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies, Gateway to the 21st Century, San Francisco, CA, USA, March 29, 1998

1997
Pigeon: A Wireless Two-Way Messaging System.
IEEE J. Sel. Areas Commun., 1997

A Flow-Based Approach to Datagram Security.
Proceedings of the ACM SIGCOMM 1997 Conference on Applications, 1997

User Agents and Flexible Messages: A New Approach to Wireless Two-Way Messaging.
Proceedings of the 1997 International Conference on Network Protocols (ICNP '97), 1997

1994
A Lesson on Authentication Protocol Design.
ACM SIGOPS Oper. Syst. Rev., 1994

SNP: An Interface for Secure Network Programming.
Proceedings of the USENIX Summer 1994 Technical Conference, 1994

Design, verification and implementation of an authentication protocol.
Proceedings of the 1994 International Conference on Network Protocols, 1994

1993
Authorizations in Distributed Systems: A New Approach.
J. Comput. Secur., 1993

A semantic model for authentication protocols.
Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, 1993

Verifying authentication protocols: methodology and example.
Proceedings of the 1993 International Conference on Network Protocols, 1993

A Framework for Distributed Authorization.
Proceedings of the CCS '93, 1993

1992
Authentification for Distributed Systems.
Computer, 1992

Authorization in distributed systems: a formal approach.
Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992

Answer Sets in General Nonmonotonic Reasoning (Preliminary Report).
Proceedings of the 3rd International Conference on Principles of Knowledge Representation and Reasoning (KR'92). Cambridge, 1992

1991
Applying a Theory of Modules and Interfaces to Security Verification.
Proceedings of the 1991 IEEE Symposium on Security and Privacy, 1991

UNITY to UC: A Case Study in the Derivation of Parallel Programs.
Proceedings of the Research Directions in High-Level Parallel Programming Languages, 1991


  Loading...