Yih-Chun Hu
Yih-Chun Hu
Associate Professor of Electrical and Computer Engineering, University of Illinois
Verified email at - Homepage
Cited by
Cited by
A performance comparison of multi-hop wireless ad hoc network routing protocols
J Broch, DA Maltz, DB Johnson, YC Hu, J Jetcheva
Proceedings of the 4th annual ACM/IEEE international conference on Mobile …, 1998
The dynamic source routing protocol (DSR) for mobile ad hoc networks for IPv4
D Johnson, YC Hu, DA Maltz
RFC 4728, 2007
Packet leashes: a defense against wormhole attacks in wireless networks
YC Hu, A Perrig, DB Johnson
IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE …, 2003
Ariadne: A secure on-demand routing protocol for ad hoc networks
YC Hu, A Perrig, DB Johnson
Wireless networks 11 (1), 21-38, 2005
SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
YC Hu, DB Johnson, A Perrig
Ad hoc networks 1 (1), 175-192, 2003
Rushing attacks and defense in wireless ad hoc network routing protocols
YC Hu, A Perrig, DB Johnson
Proceedings of the 2nd ACM workshop on Wireless security, 30-40, 2003
A survey of secure wireless ad hoc routing
H Yih-Chun, A Perrig
IEEE Security & Privacy 2 (3), 28-39, 2004
Caching strategies in on-demand routing protocols for wireless ad hoc networks
YC Hu, DB Johnson
Proceedings of the 6th annual international conference on Mobile computing …, 2000
SPV: Secure path vector routing for securing BGP
YC Hu, A Perrig, M Sirbu
Proceedings of the 2004 conference on Applications, technologies …, 2004
Portcullis: Protecting connection setup from denial-of-capability attacks
B Parno, D Wendlandt, E Shi, A Perrig, B Maggs, YC Hu
ACM SIGCOMM Computer Communication Review 37 (4), 289-300, 2007
Wormhole detection in wireless ad hoc networks
YC Hu, A Perrig, DB Johnson
Department of Computer Science, Rice University, Tech. Rep. TR01-384, 2002
A simple protocol for multicast and broadcast in mobile ad hoc networks
J Jetcheva
Internet Draft: draft-ietf-manetsimple-mbcast-01. txt, 2001
Preserving location privacy in wireless LANs
T Jiang, HJ Wang, YC Hu
Proceedings of the 5th international conference on Mobile systems …, 2007
Efficient Security Mechanisms for Routing Protocolsa.
YC Hu, A Perrig, DB Johnson
Ndss, 2003
The dynamic source routing protocol for multi-hop wireless ad hoc networks
DB Johnson
Ad hoc networking, 139-172, 2001
Design and evaluation of a metropolitan area multitier wireless ad hoc network architecture
JG Jetcheva, YC Hu, S PalChaudhuri, A Kumar, S David, B Johnson
Security certificate revocation list distribution for VANET
KP Laberteaux, JJ Haas, YC Hu
Proceedings of the fifth ACM international workshop on VehiculAr Inter …, 2008
Cross-layer jamming detection and mitigation in wireless broadcast networks
JT Chiang, YC Hu
IEEE/ACM Transactions on networking 19 (1), 286-298, 2010
Efficient constructions for one-way hash chains
YC Hu, M Jakobsson, A Perrig
International Conference on Applied Cryptography and Network Security, 423-441, 2005
Design and analysis of a lightweight certificate revocation mechanism for VANET
JJ Haas, YC Hu, KP Laberteaux
Proceedings of the sixth ACM international workshop on VehiculAr …, 2009
The system can't perform the operation now. Try again later.
Articles 1–20