Yee Wei Law
TitleCited byYear
Survey and benchmark of block ciphers for wireless sensor networks
YW Law, J Doumen, P Hartel
ACM Transactions on Sensor Networks (TOSN) 2 (1), 65-93, 2006
KLEIN: a new family of lightweight block ciphers
Z Gong, S Nikova, YW Law
International Workshop on Radio Frequency Identification: Security and …, 2011
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols
YW Law, M Palaniswami, LV Hoesel, J Doumen, P Hartel, P Havinga
ACM Transactions on Sensor Networks (TOSN) 5 (1), 6, 2009
LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks.
R Di Pietro, LV Mancini, YW Law, S Etalle, PJM Havinga
ICPP Workshops, 397-, 2003
Enhanced LTE-advanced random-access mechanism for massive machine-to-machine (M2M) communications
A Lo, YW Law, M Jacobsson, M Kucharzak
27th World Wireless Research Forum (WWRF) Meeting, 1-5, 2011
Link-layer jamming attacks on S-MAC
YW Law, P Hartel, J den Hartog, P Havinga
Proceeedings of the Second European Workshop on Wireless Sensor Networks …, 2005
Assessing security in energy-efficient sensor networks
YW Law, S Etalle, PH Hartel
IFIP International Information Security Conference, 459-463, 2003
A cellular-centric service architecture for machine-to-machine (M2M) communications
A Lo, YW Law, M Jacobsson
IEEE wireless communications 20 (5), 143-151, 2013
LicenseScript: A novel digital rights language and its semantics
CN Chong, R Corin, S Etalle, P Hartel, W Jonker, YW Law
Proceedings Third International Conference on WEB Delivering of Music, 122-129, 2003
WAKE: Key management scheme for wide-area measurement systems in smart grid
YW Law, M Palaniswami, G Kounga, A Lo
IEEE Communications Magazine 51 (1), 34-41, 2013
A formally verified decentralized key management architecture for wireless sensor networks
YW Law, R Corin, S Etalle, PH Hartel
IFIP International Conference on Personal Wireless Communications, 27-39, 2003
How to secure a wireless sensor network
YW Law, PJM Havinga
2005 International Conference on Intelligent Sensors, Sensor Networks and …, 2005
Benchmarking block ciphers for wireless sensor networks
YW Law, J Doumen, P Hartel
2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE …, 2004
The sixth visual object tracking vot2018 challenge results
M Kristan, A Leonardis, J Matas, M Felsberg, R Pflugfelder, ...
Proceedings of the European Conference on Computer Vision (ECCV), 0-0, 2018
Security games for risk minimization in automatic generation control
YW Law, T Alpcan, M Palaniswami
IEEE Transactions on Power Systems 30 (1), 223-232, 2014
Demand response architectures and load management algorithms for energy-efficient power grids: a survey
YW Law, T Alpcan, VCS Lee, A Lo, S Marusic, M Palaniswami
2012 Seventh International Conference on Knowledge, Information and …, 2012
Secure rateless deluge: Pollution-resistant reprogramming and data dissemination for wireless sensor networks
YW Law, Y Zhang, J Jin, M Palaniswami, P Havinga
EURASIP Journal on Wireless Communications and Networking 2011, 5, 2011
Enhancing responsiveness and scalability for OpenFlow networks via control-message quenching
T Luo, HP Tan, PC Quan, YW Law, J Jin
2012 International conference on ICT convergence (ICTC), 348-353, 2012
Energy-efficient data acquisition by adaptive sampling for wireless sensor networks
YW Law, S Chatterjea, J Jin, T Hanselmann, M Palaniswami
Proceedings of the 2009 International Conference on Wireless Communications …, 2009
Kalwen: A new practical and interoperable key management scheme for body sensor networks
YW Law, G Moniava, Z Gong, P Hartel, M Palaniswami
Security and communication networks 4 (11), 1309-1329, 2011
The system can't perform the operation now. Try again later.
Articles 1–20