Yih-Chun Hu

20002019
If you made any changes in Pure, your changes will be visible here soon.

Research Output 2000 2019

Filter
Conference article

Efficient constructions for one-way hash chains

Hu, Y. C., Jakobsson, M. & Perrig, A., Oct 17 2005, In : Lecture Notes in Computer Science. 3531, p. 423-441 19 p.

Research output: Contribution to journalConference article

Hash Chain
Network protocols
Sensor networks
Data storage equipment
Electronic document identification systems

Friends Troubleshooting Network: Towards privacy-preserving, automatic troubleshooting

Wang, H. J., Hu, Y. C., Yuan, C., Zhang, Z. & Wang, Y. M., Dec 1 2004, In : Lecture Notes in Computer Science. 3279, p. 184-194 11 p.

Research output: Contribution to journalConference article

Peer-to-peer Systems
Privacy Preserving
Aggregation
Agglomeration
Privacy Preservation

Lightweight source authentication and path validation

Kim, T. H. J., Basescu, C., Jia, L., Lee, S. B., Hu, Y. C. & Perrig, A., Feb 25 2015, In : Computer Communication Review. 44, 4, p. 271-282 12 p.

Research output: Contribution to journalConference article

Authentication
Routers
Scalability
Compliance

Packet leashes: A defense against wormhole attacks in wireless networks

Hu, Y. C., Perrig, A. & Johnson, D. B., Sep 1 2003, In : Proceedings - IEEE INFOCOM. 3, p. 1976-1986 11 p.

Research output: Contribution to journalConference article

Ad hoc networks
Wireless networks
Network routing
Routing protocols
Communication

SPV: Secure path vector routing for securing BGP

Hu, Y. C., Perrig, A. & Sirbu, M., Dec 1 2004, In : Computer Communication Review. 34, 4, p. 179-192 14 p.

Research output: Contribution to journalConference article

Gateways (computer networks)
Routing protocols
Network protocols
Critical infrastructures
Brittleness