Follow
Yong Xi
Yong Xi
Wayne State University
Verified email at amazon.com
Title
Cited by
Cited by
Year
Preserving source location privacy in monitoring-based wireless sensor networks
Y Xi, L Schwiebert, W Shi
Proceedings 20th IEEE International Parallel & Distributed Processing …, 2006
2702006
Enforcing privacy using symmetric random key-set in vehicular networks
Y Xi, K Sha, W Shi, L Schwiebert, T Zhang
Eighth International Symposium on Autonomous Decentralized Systems (ISADS'07 …, 2007
1292007
Adaptive privacy-preserving authentication in vehicular networks
K Sha, Y Xi, W Shi, L Schwiebert, T Zhang
2006 First International Conference on Communications and Networking in …, 2006
1092006
Privacy preserving shortest path routing with an application to navigation
Y Xi, L Schwiebert, W Shi
Pervasive and Mobile Computing 13, 142-149, 2014
452014
Probabilistic adaptive anonymous authentication in vehicular networks
Y Xi, KW Sha, WS Shi, L Schwiebert, T Zhang
Journal of Computer Science and Technology 23, 916-928, 2008
332008
Preserving privacy in monitoring-based wireless sensor networks
Y Xi, L Schwiebert, W Shi
Proceedings of the 2nd International Workshop on Security in Systems and …, 2006
262006
Mobile anonymity of dynamic groups in vehicular networks
Y Xi, W Shi, L Schwiebert
Security and Communication Networks 1 (3), 219-231, 2008
162008
Adaptive congestion control for hotspot management in structured peer-to-peer systems
AM Bosneag, Y Xi, X Li, M Brockmeyer
IEEE International Symposium on Cluster Computing and the Grid, 2004. CCGrid …, 2004
62004
Location Privacy in Emerging Network-Based Applications
Y Xi
52012
暂缺
Y Xi, KW Sha, WS Shi, L Schwiebert, T Zhang
计算机科学技术学报 23 (6), 916-928, 2008
2008
You have access to this document through your prepaid file cabinet downloads included with your subscription. Adaptive Privacy-Preserving Authentication in Vehicular Networks
K Sha, Y Xi, W Shi, L Schwiebert, T Zhang
1st International ICST Workshop on Vehicle Communications and Applications, 2007
2007
The system can't perform the operation now. Try again later.
Articles 1–11