2012
31A coverage-aware clustering protocol for wireless sensor networks. Bang Wang, Hock-Beng Lim, Di Ma. Computer Networks (56): 1599-1611 (2012). Web SearchBibTeXDownload
30Secure and efficient constructions of hash, MAC and PRF for mobile devices. Yan Zhu, Shan-Biao Wang, Di Ma, Hongxin Hu, Gail-Joon Ahn. GLOBECOM 2012, 949-954. Web SearchBibTeXDownload
29Secure Collaborative Integrity Verification for Hybrid Cloud Environments. Yan Zhu, Shan-Biao Wang, Hongxin Hu, Gail-Joon Ahn, Di Ma. Int. J. Cooperative Inf. Syst. (21): 165-198 (2012). Web SearchBibTeXDownload
28Self-healing in unattended wireless sensor networks. Roberto Di Pietro, Di Ma, Claudio Soriente, Gene Tsudik. TOSN (9): 7 (2012). Web SearchBibTeXDownload
27Broadcast based on layered diffusion in wireless ad hoc and sensor networks. Bang Wang, Hock-Beng Lim, Di Ma. Wireless Communications and Mobile Computing (12): 99-115 (2012). Web SearchBibTeXDownload
2011
26MR-DBSCAN: An Efficient Parallel Density-Based Clustering Algorithm Using MapReduce. Yaobin He, Haoyu Tan, Wuman Luo, Huajian Mao, Di Ma, Shengzhong Feng, Jianping Fan. ICPADS 2011, 473-480. Web SearchBibTeXDownload
2010
25A Soldier Health Monitoring System for Military Applications. Hock-Beng Lim, Di Ma, Bang Wang, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Kenneth L. Watkin. BSN 2010, 246-249. Web SearchBibTeXDownload
24A lower bound on expected localization error in wireless sensor network. Di Ma, Meng Joo Er, Hock-Beng Lim, Bang Wang. ICARCV 2010, 96-103. Web SearchBibTeXDownload
23IRRES: Intrusion-Resilient Remote Email Storage. Di Ma, Gene Tsudik. ICDCS Workshops 2010, 72-76. Web SearchBibTeXDownload
22A novel approach toward source-to-sink distance estimation in wireless sensor networks. Di Ma, Meng Joo Er, Bang Wang, Hock-Beng Lim. IEEE Communications Letters (14): 384-386 (2010). Web SearchBibTeXDownload
21Security and privacy in emerging wireless networks. Di Ma, Gene Tsudik. IEEE Wireless Commun. (17): 12-21 (2010). Web SearchBibTeXDownload
20A Coverage-Aware Clustering Protocol for Wireless Sensor Networks. Bang Wang, Hock-Beng Lim, Di Ma, Daiqin Yang. MSN 2010, 85-90. Web SearchBibTeXDownload
19The hop count shift problem and its impacts on protocol design in wireless ad hoc networks. Bang Wang, Hock-Beng Lim, Di Ma, Cheng Fu. Telecommunication Systems (44): 49-60 (2010). Web SearchBibTeXDownload
2009
18A survey of movement strategies for improving network coverage in wireless sensor networks. Bang Wang, Hock-Beng Lim, Di Ma. Computer Communications (32): 1427-1436 (2009). Web SearchBibTeXDownload
17An application of host identity tags to DKIM for identifying signers. Di Ma, Xiaodong Li, Wei Wang, Wei Mao. ICHIT 2009, 138-142. Web SearchBibTeXDownload
16New adversary and new threats: security in unattended sensor networks. Di Ma, Claudio Soriente, Gene Tsudik. IEEE Network (23): 43-48 (2009). Web SearchBibTeXDownload
15A new approach to secure logging. Di Ma, Gene Tsudik. TOS (5) (2009). Web SearchBibTeXDownload
2008
14A New Approach to Secure Logging. Di Ma, Gene Tsudik. DBSec 2008, 48-63. Web SearchBibTeXDownload
13DISH: Distributed Self-Healing in Unattended Sensor Networks. Di Ma, Gene Tsudik. IACR Cryptology ePrint Archive (2008): 158 (2008). Web SearchBibTeXDownload
12A Middleware Services Simulation Platform for Wireless Sensor Networks. Hock-Beng Lim, Bang Wang, Cheng Fu, Arpan Phull, Di Ma. ICDCS Workshops 2008, 168-173. Web SearchBibTeXDownload
11A comprehensive study of Kalman filter and extended Kalman filter for target tracking in Wireless Sensor Networks. Di Ma, Meng Joo Er, Hock-Beng Lim. SMC 2008, 2792-2797. Web SearchBibTeXDownload
10POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks. Roberto Di Pietro, Di Ma, Claudio Soriente, Gene Tsudik. SRDS 2008, 185-194. Web SearchBibTeXDownload
9DISH: Distributed Self-Healing. Di Ma, Gene Tsudik. SSS 2008, 47-62. Web SearchBibTeXDownload
2007
8Forward-Secure Sequential Aggregate Authentication. Di Ma, Gene Tsudik. IACR Cryptology ePrint Archive (2007): 52 (2007). Web SearchBibTeXDownload
7Extended Abstract: Forward-Secure Sequential Aggregate Authentication. Di Ma, Gene Tsudik. IEEE Symposium on Security and Privacy 2007, 86-91. Web SearchBibTeXDownload
6Flexible Access Control to JPEG 2000 Image Code-Streams. Yongdong Wu, Di Ma, Robert H. Deng. IEEE Transactions on Multimedia (9): 1314-1324 (2007). Web SearchBibTeXDownload
2005
5Authenticating Query Results in Data Publishing. Di Ma, Robert H. Deng, HweeHwa Pang, Jianying Zhou. ICICS 2005, 376-388. Web SearchBibTeXDownload
4Scalable trusted online dissemination of JPEG2000 images. Robert H. Deng, Di Ma, Weizhong Shao, Yongdong Wu. Multimedia Syst. (11): 60-67 (2005). Web SearchBibTeXDownload
2004
3Dynamic Access Control for Multi-privileged Group Communications. Di Ma, Robert H. Deng, Yongdong Wu, Tieyan Li. ICICS 2004, 508-519. Web SearchBibTeXDownload
2Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN. Tieyan Li, Yongdong Wu, Di Ma, Huafei Zhu, Robert H. Deng. ICICS 2004, 79-91. Web SearchBibTeXDownload
1Progressive protection of jpeg2000 codestreams. Yongdong Wu, Di Ma, Robert H. Deng. ICIP 2004, 3447-3450. Web SearchBibTeXDownload
from DBLP and Google Scholar
Developed by the Database Group at the University of Wisconsin and Yahoo! Research