Author: Feng Zhu

Publications

Publication period start: 2011
Number of co-authors: 6

Co-authors

Number of publications with favourite co-authors
Wei Zhu
2
Matt W. Mutka
4
Lionel M. Ni
4

Productive Colleagues

Most productive colleagues in number of publications
Wei Zhu
4
Matt W. Mutka
14
Lionel M. Ni
15

Publications

Zhu, Feng, Zhu, Wei (2010): Secure and Private Service Discovery in Pervasive Computing Environments. In IJAPUC, 2 (3) pp. 46-59. https://dx.doi.org/10.4018/japuc.2010070104

Zhu, Feng, Mutka, Matt W., Ni, Lionel M. (2003): Splendor: A Secure, Private, and Location-Aware Service Discovery Protocol Supporting Mobi. In: PerCom03 - Proceedings of the First IEEE International Conference on Pervasive Computing and Communications March 23-26, 2003, Fort Worth, Texas, USA. pp. 235-242. https://csdl.computer.org/comp/proceedings/percom/2003/1893/00/18930235abs.htm

Zhu, Feng, Mutka, Matt W., Ni, Lionel M. (2004): PrudentExposure: A Private and User-centric Service Discovery Protocol. In: PerCom 2004 - Proceedings of the Second IEEE International Conference on Pervasive Computing and Communications 14-17 March, 2004, Orlando, FL, USA. pp. 329-340. https://csdl.computer.org/comp/proceedings/percom/2004/2090/00/20900329abs.htm

Zhu, Feng, Mutka, Matt W., Ni, Lionel M. (2006): The Master Key: A Private Authentication Approach for Pervasive Computing Environments. In: PerCom 2006 - 4th IEEE International Conference on Pervasive Computing and Communications 13-17 March, 2006, Pisa, Italy. pp. 212-221. https://doi.ieeecomputersociety.org/10.1109/PERCOM.2006.47

Zhu, Feng, Zhu, Wei, Mutka, Matt W., Ni, Lionel M. (2005): Expose or Not? A Progressive Exposure Approach for Service Discovery in Pervasive Computin. In: PerCom 2005 - 3rd IEEE International Conference on Pervasive Computing and Communications 8-12 March, 2005, Kauai Island, HI, USA. pp. 225-234. https://doi.ieeecomputersociety.org/10.1109/PERCOM.2005.20

Zhu, Feng, Carpenter, Sandra, Kulkarni, Ajinkya, Kolimi, Swapna (2011): Reciprocity attacks. In: Proceedings of the 2011 Symposium on Usable Privacy and Security , 2011, . pp. 9. https://dx.doi.org/10.1145/2078827.2078839