TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks A Liu, P Ning 2008 International Conference on Information Processing in Sensor Networks …, 2008 | 1220 | 2008 |
Randomized differential DSSS: Jamming-resistant wireless broadcast communication Y Liu, P Ning, H Dai, A Liu 2010 Proceedings IEEE INFOCOM, 1-9, 2010 | 262 | 2010 |
TinySeRSync: secure and resilient time synchronization in wireless sensor networks K Sun, P Ning, C Wang Proceedings of the 13th ACM conference on Computer and communications …, 2006 | 256 | 2006 |
Mitigating DoS attacks against broadcast authentication in wireless sensor networks P Ning, A Liu, W Du ACM Transactions on Sensor Networks (TOSN) 4 (1), 1-35, 2008 | 208 | 2008 |
Seluge: Secure and dos-resistant code dissemination in wireless sensor networks S Hyun, P Ning, A Liu, W Du 2008 International Conference on Information Processing in Sensor Networks …, 2008 | 180 | 2008 |
Attack-resistant location estimation in wireless sensor networks D Liu, P Ning, A Liu, C Wang, WK Du ACM Transactions on Information and System Security (TISSEC) 11 (4), 1-39, 2008 | 171 | 2008 |
TinyECC: Elliptic curve cryptography for sensor networks (version 0.3) A Liu http://discovery. csc. csu. edu/software/TinyECC/, 2007 | 76 | 2007 |
TinyECC: Elliptic curve cryptography for sensor networks A Liu, P Ning Cyber Defense Laboratory, 2006 | 75 | 2006 |
USD-FH: Jamming-resistant wireless communication using frequency hopping with uncoordinated seed disclosure A Liu, P Ning, H Dai, Y Liu The 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems …, 2010 | 60 | 2010 |
Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure A Liu, P Ning, H Dai, Y Liu, C Wang Proceedings of the 26th Annual Computer Security Applications Conference …, 2010 | 56 | 2010 |
Cluster-based minimum mean square estimation for secure and resilient localization in wireless sensor networks C Wang, A Liu, P Ning International Conference on Wireless Algorithms, Systems and Applications …, 2007 | 37 | 2007 |
Trust-zone-based end-to-end security A Liu, B Venkataram, P Peng, B Kasman, K Patel US Patent 10,193,700, 2019 | 34 | 2019 |
Securing network access in wireless sensor networks K Sun, A Liu, R Xu, P Ning, D Maughan Proceedings of the second ACM conference on Wireless network security, 261-268, 2009 | 29 | 2009 |
Lightweight remote image management for secure code dissemination in wireless sensor networks A Liu, P Ning, C Wang IEEE INFOCOM 2009, 1242-1250, 2009 | 21 | 2009 |
Over the air provisioning of industrial wireless devices using elliptic curve cryptography D Chen, M Nixon, T Lin, S Han, X Zhu, A Mok, R Xu, J Deng, A Liu 2011 IEEE International Conference on Computer Science and Automation …, 2011 | 20 | 2011 |
Secure and DoS-resistant code dissemination in wireless sensor networks using Seluge A Liu, YH Oh, P Ning 2008 International Conference on Information Processing in Sensor Networks …, 2008 | 14 | 2008 |
Antenna mode switching for full-duplex destination-based jamming secure transmission Y Li, R Zhao, L Fan, A Liu IEEE Access 6, 9442-9453, 2018 | 11 | 2018 |
Mitigating wireless jamming attacks via channel migration S Hyun, P Ning, A Liu 2011 31st International Conference on Distributed Computing Systems …, 2011 | 10 | 2011 |
Wireless sensor network security A Liu, M Kim, LB Oliveira, H Tan International Journal of Distributed Sensor Networks 9 (1), 362385, 2013 | 8 | 2013 |
Mitigating DOS attacks against signature-based broadcast authentication in wireless sensor networks P Ning, A Liu, W Du North Carolina State University. Dept. of Computer Science, 2005 | 4 | 2005 |