Yih-Chun Hu

20002019
If you made any changes in Pure, your changes will be visible here soon.

Research Output 2000 2019

Filter
Conference article
2015

Lightweight source authentication and path validation

Kim, T. H. J., Basescu, C., Jia, L., Lee, S. B., Hu, Y-C. & Perrig, A., Feb 25 2015, In : Computer Communication Review. 44, 4, p. 271-282 12 p.

Research output: Contribution to journalConference article

Authentication
Routers
Scalability
Compliance
2005

Efficient constructions for one-way hash chains

Hu, Y. C., Jakobsson, M. & Perrig, A., Oct 17 2005, In : Lecture Notes in Computer Science. 3531, p. 423-441 19 p.

Research output: Contribution to journalConference article

Hash Chain
Network protocols
Sensor networks
Data storage equipment
Electronic document identification systems
2004

Friends Troubleshooting Network: Towards privacy-preserving, automatic troubleshooting

Wang, H. J., Hu, Y. C., Yuan, C., Zhang, Z. & Wang, Y. M., Dec 1 2004, In : Lecture Notes in Computer Science. 3279, p. 184-194 11 p.

Research output: Contribution to journalConference article

Peer-to-peer Systems
Privacy Preserving
Aggregation
Agglomeration
Privacy Preservation

SPV: Secure path vector routing for securing BGP

Hu, Y-C., Perrig, A. & Sirbu, M., Dec 1 2004, In : Computer Communication Review. 34, 4, p. 179-192 14 p.

Research output: Contribution to journalConference article

Gateways (computer networks)
Routing protocols
Network protocols
Critical infrastructures
Brittleness
2003

Packet leashes: A defense against wormhole attacks in wireless networks

Hu, Y-C., Perrig, A. & Johnson, D. B., Sep 1 2003, In : Proceedings - IEEE INFOCOM. 3, p. 1976-1986 11 p.

Research output: Contribution to journalConference article

Ad hoc networks
Wireless networks
Network routing
Routing protocols
Communication