Chin-Tser Huang
Chin-Tser Huang
Professor of Computer Science and Engineering, University of South Carolina
Verified email at
Cited by
Cited by
Security issues in privacy and key management protocols of IEEE 802.16
S Xu, M Matthews, CT Huang
Proceedings of the 44th annual Southeast regional conference, 113-118, 2006
A secure address resolution protocol
MG Gouda, CT Huang
Computer Networks 41 (1), 57-71, 2003
Attacks on PKM protocols of IEEE 802.16 and its later versions
S Xu, CT Huang
2006 3rd International Symposium on Wireless Communication Systems, 185-189, 2006
Chinese remainder theorem based group key management
X Zheng, CT Huang, M Matthews
Proceedings of the 45th annual southeast regional conference, 266-271, 2007
Wavelet-based real time detection of network traffic anomalies
CT Huang, S Thareja, YJ Shin
2006 Securecomm and Workshops, 1-7, 2006
Responding to security issues in WiMAX networks
CT Huang, JM Chang
IT Professional 10 (5), 15-21, 2008
A computational approach for examining the roots and spreading patterns of fake news: Evolution tree analysis
SM Jang, T Geng, JYQ Li, R Xia, CT Huang, H Kim, J Tang
Computers in Human Behavior 84, 103-113, 2018
A moving-target defense strategy for cloud-based services with heterogeneous and dynamic attack surfaces
W Peng, F Li, CT Huang, X Zou
2014 IEEE International Conference on Communications (ICC), 804-809, 2014
Hop integrity in computer networks
MG Gouda, EN Elnozahy, CT Huang, TM McGuire
IEEE/ACM Transactions on Networking 10 (3), 308-319, 2002
A secure cookie protocol
AX Liu, JM Kovacs, CT Huang, MG Gouda
Proceedings. 14th International Conference on Computer Communications and …, 2005
Smart urban surveillance using fog computing
N Chen, Y Chen, S Song, CT Huang, X Ye
2016 IEEE/ACM Symposium on Edge Computing (SEC), 95-96, 2016
A hierarchical framework for secure and scalable ehr sharing and access control in multi-cloud
J Huang, M Sharaf, CT Huang
2012 41st International Conference on Parallel Processing Workshops, 279-287, 2012
Multi-dimensional credentialing using veiled certificates
JH Gerdes Jr, J Kalvenes, CT Huang
US Patent 8,468,355, 2013
Look-ahead routing and message scheduling in delay-tolerant networks
Y Xian, CT Huang, J Cobb
Computer Communications 34 (18), 2184-2194, 2011
GISolve: A grid-based problem solving environment for computationally intensive geographic information analysis
S Wang, MP Armstrong, J Ni, Y Liu
CLADE 2005. Proceedings Challenges of Large Applications in Distributed …, 2005
Modeling and analysis of IEEE 802.16 PKM Protocols using CasperFDR
S Xu, CT Huang, MM Matthews
2008 IEEE International Symposium on Wireless Communication Systems, 653-657, 2008
Using anomaly detection based techniques to detect HTTP-based botnet C&C traffic
MN Sakib, CT Huang
2016 IEEE International Conference on Communications (ICC), 1-6, 2016
Key trees and the security of interval multicast
MG Gouda, CT Huang, EN Elnozahy
Proceedings 22nd International Conference on Distributed Computing Systems …, 2002
Fast and secure mobility for IEEE 802.16 e broadband wireless networks
CK Chang, CT Huang
2007 International Conference on Parallel Processing Workshops (ICPPW 2007 …, 2007
Smart city surveillance in fog computing
N Chen, Y Chen, X Ye, H Ling, S Song, CT Huang
Advances in mobile cloud computing and big data in the 5G era, 203-226, 2017
The system can't perform the operation now. Try again later.
Articles 1–20