Chin-Tser Huang
Chin-Tser Huang
Professor of Computer Science and Engineering, University of South Carolina
Verified email at cec.sc.edu
TitleCited byYear
Security issues in privacy and key management protocols of IEEE 802.16
S Xu, M Matthews, CT Huang
Proceedings of the 44th annual Southeast regional conference, 113-118, 2006
1392006
A secure address resolution protocol
MG Gouda, CT Huang
Computer Networks 41 (1), 57-71, 2003
1072003
Attacks on PKM protocols of IEEE 802.16 and its later versions
S Xu, CT Huang
2006 3rd International Symposium on Wireless Communication Systems, 185-189, 2006
932006
Wavelet-based real time detection of network traffic anomalies
CT Huang, S Thareja, YJ Shin
2006 Securecomm and Workshops, 1-7, 2006
722006
Chinese remainder theorem based group key management
X Zheng, CT Huang, M Matthews
Proceedings of the 45th annual southeast regional conference, 266-271, 2007
672007
Responding to security issues in WiMAX networks
CT Huang, JM Chang
IT Professional 10 (5), 15-21, 2008
642008
Hop integrity in computer networks
MG Gouda, EN Elnozahy, CT Huang, TM McGuire
IEEE/ACM Transactions on Networking 10 (3), 308-319, 2002
612002
A secure cookie protocol
AX Liu, JM Kovacs, CT Huang, MG Gouda
Proceedings. 14th International Conference on Computer Communications and …, 2005
572005
A moving-target defense strategy for cloud-based services with heterogeneous and dynamic attack surfaces
W Peng, F Li, CT Huang, X Zou
2014 IEEE International Conference on Communications (ICC), 804-809, 2014
452014
Smart urban surveillance using fog computing
N Chen, Y Chen, S Song, CT Huang, X Ye
2016 IEEE/ACM Symposium on Edge Computing (SEC), 95-96, 2016
372016
A hierarchical framework for secure and scalable ehr sharing and access control in multi-cloud
J Huang, M Sharaf, CT Huang
2012 41st International Conference on Parallel Processing Workshops, 279-287, 2012
362012
Look-ahead routing and message scheduling in delay-tolerant networks
Y Xian, CT Huang, J Cobb
Computer Communications 34 (18), 2184-2194, 2011
362011
Multi-dimensional credentialing using veiled certificates
JH Gerdes Jr, J Kalvenes, CT Huang
US Patent 8,468,355, 2013
302013
A computational approach for examining the roots and spreading patterns of fake news: Evolution tree analysis
SM Jang, T Geng, JYQ Li, R Xia, CT Huang, H Kim, J Tang
Computers in Human Behavior 84, 103-113, 2018
282018
Modeling and analysis of IEEE 802.16 PKM Protocols using CasperFDR
S Xu, CT Huang, MM Matthews
2008 IEEE International Symposium on Wireless Communication Systems, 653-657, 2008
282008
Key trees and the security of interval multicast
MG Gouda, CT Huang, EN Elnozahy
Proceedings 22nd International Conference on Distributed Computing Systems …, 2002
282002
Fast and secure mobility for IEEE 802.16 e broadband wireless networks
CK Chang, CT Huang
2007 International Conference on Parallel Processing Workshops (ICPPW 2007 …, 2007
262007
Secure mutual authentication protocols for mobile multi-hop relay WiMAX networks against rogue base/relay stations
J Huang, CT Huang
2011 IEEE International Conference on Communications (ICC), 1-5, 2011
242011
Improving transmission efficiency of large sequence alignment/map (SAM) files
MN Sakib, J Tang, WJ Zheng, CT Huang
PloS one 6 (12), e28251, 2011
222011
Efficient and secure multicast in wirelessman: A cross-layer design
CT Huang, M Matthews, M Ginley, X Zheng, C Chen, JM Chang
Udruga za komunikacijske i informacijske tehnologije, Fakultet …, 2007
212007
The system can't perform the operation now. Try again later.
Articles 1–20