Seguir
Leszek T. Lilien
Título
Citado por
Citado por
Año
The concept of opportunistic networks and their research challenges in privacy and security
L Lilien, ZH Kamal, V Bhuse, A Gupta
Mobile and wireless network security and privacy, 85-117, 2007
2012007
An entity-centric approach for privacy and identity management in cloud computing
P Angin, B Bhargava, R Ranchal, N Singh, M Linderman, LB Othmane, ...
2010 29th IEEE symposium on reliable distributed systems, 177-183, 2010
1982010
Pervasive Trust
B Bhargava, L Lilien, A Rosenthal, M Winslett
Intelligent Systems, IEEE 19 (5), 74-77, 2004
173*2004
Protection of identity information in cloud computing without trusted third party
R Ranchal, B Bhargava, LB Othmane, L Lilien, A Kim, M Kang, ...
2010 29th IEEE symposium on reliable distributed systems, 368-372, 2010
1412010
Opportunistic networks for emergency applications and their standard implementation framework
L Lilien, A Gupta, Z Yang
2007 IEEE International Performance, Computing, and Communications …, 2007
952007
A scheme for privacy-preserving data dissemination
L Lilien, B Bhargava
IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and …, 2006
792006
Protecting privacy of sensitive data dissemination using active bundles
LB Othmane, L Lilien
2009 World Congress on Privacy, Security, Trust and the Management of e …, 2009
702009
DPDSN: Detection of packet-dropping attacks for wireless sensor networks
V Bhuse, A Gupta, L Lilien
Proc. Fourth Trusted Internet Workshop 107, 2005
612005
Extending wireless sensor network lifetime in the LEACH-SM protocol by spare selection
BA Bakr, L Lilien
2011 Fifth International Conference on Innovative Mobile and Internet …, 2011
522011
Opportunistic networks: Challenges in specializing the P2P paradigm
L Lilien, ZH Kamal, A Gupta
17th International Workshop on Database and Expert Systems Applications …, 2006
482006
A simulation study of ad hoc networking of UAVs with opportunistic resource utilization networks
LT Lilien, L Ben Othmane, P Angin, A DeCarlo, RM Salih, B Bhargava
Journal of Network and Computer Applications 38, 3-15, 2014
442014
Extending lifetime of wireless Sensor networks by management of spare nodes
BA Bakr, LT Lilien
Procedia Computer Science 34, 493-498, 2014
402014
A quantitative comparison of energy consumption and WSN lifetime for LEACH and LEACH-SM
BA Bakr, L Lilien
2011 31st International Conference on Distributed Computing Systems …, 2011
402011
Adaptive techniques for distributed query optimization
C Yu, L Lilien, K Guh, H Templeton, D Brill, A Chen
1986 IEEE Second International Conference on Data Engineering, 86-93, 1986
351986
Differentiating Security from Privacy in Internet of Things: A Survey of Selected Threats and Controls
A Al-Gburi, A Al-Hasnawi, L Lilien
Computer and Network Security Essentials, 153-172, 2018
322018
Opportunistic resource utilization networks—A new paradigm for specialized ad hoc networks
L Lilien, A Gupta, ZE Kamal, Z Yang
Computers & electrical engineering 36 (2), 328-340, 2010
312010
Trading privacy for trust in online interactions
L Lilien, B Bhargava
Idea Group, 2008
31*2008
Privacy and trust in online interactions
L Lilien, B Bhargava
Online Consumer Protection: Theories of Human Relativism, Information …, 2008
312008
LEACH-SM: A protocol for extending wireless sensor network lifetime by management of spare nodes
BA Bakr, L Lilien
2011 International Symposium of Modeling and Optimization of Mobile, Ad Hoc …, 2011
302011
Autonomous transaction processing using data dependency in mobile environments
IY Chung, B Bhargava, M Mahoui, L Lilien
Distributed Computing Systems, 2003. FTDCS 2003. Proceedings. The Ninth IEEE …, 2003
272003
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20