Leszek T. Lilien
Cited by
Cited by
The concept of opportunistic networks and their research challenges in privacy and security
L Lilien, ZH Kamal, V Bhuse, A Gupta
Mobile and wireless network security and privacy, 85-117, 2007
Opportunistic Networks: The Concept and Research Challenges in Privacy and Security
L Lilien, ZH Kamal, V Bhuse, A Gupta
International Workshop on Research Challenges in Security and Privacy for …, 2006
An entity-centric approach for privacy and identity management in cloud computing
P Angin, B Bhargava, R Ranchal, N Singh, M Linderman, LB Othmane, ...
2010 29th IEEE symposium on reliable distributed systems, 177-183, 2010
Pervasive Trust
B Bhargava, L Lilien, A Rosenthal, M Winslett
Intelligent Systems, IEEE 19 (5), 74-77, 2004
Protection of identity information in cloud computing without trusted third party
R Ranchal, B Bhargava, LB Othmane, L Lilien, A Kim, M Kang, ...
2010 29th IEEE symposium on reliable distributed systems, 368-372, 2010
Opportunistic networks for emergency applications and their standard implementation framework
L Lilien, A Gupta, Z Yang
2007 IEEE International Performance, Computing, and Communications …, 2007
A scheme for privacy-preserving data dissemination
L Lilien, B Bhargava
IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and …, 2006
Protecting privacy of sensitive data dissemination using active bundles
LB Othmane, L Lilien
2009 World Congress on Privacy, Security, Trust and the Management of e …, 2009
DPDSN: Detection of packet-dropping attacks for wireless sensor networks
V Bhuse, A Gupta, L Lilien
Proc. Fourth Trusted Internet Workshop 107, 2005
Extending wireless sensor network lifetime in the LEACH-SM protocol by spare selection
BA Bakr, L Lilien
2011 Fifth International Conference on Innovative Mobile and Internet …, 2011
Opportunistic networks: Challenges in specializing the P2P paradigm
L Lilien, ZH Kamal, A Gupta
17th International Workshop on Database and Expert Systems Applications …, 2006
A quantitative comparison of energy consumption and WSN lifetime for LEACH and LEACH-SM
BA Bakr, L Lilien
2011 31st International Conference on Distributed Computing Systems …, 2011
A simulation study of ad hoc networking of UAVs with opportunistic resource utilization networks
LT Lilien, L Ben Othmane, P Angin, A DeCarlo, RM Salih, B Bhargava
Journal of Network and Computer Applications 38, 3-15, 2014
Extending lifetime of wireless Sensor networks by management of spare nodes
BA Bakr, LT Lilien
Procedia Computer Science 34, 493-498, 2014
Opportunistic resource utilization networks—A new paradigm for specialized ad hoc networks
L Lilien, A Gupta, ZE Kamal, Z Yang
Computers & electrical engineering 36 (2), 328-340, 2010
Adaptive techniques for distributed query optimization
C Yu, L Lilien, K Guh, H Templeton, D Brill, A Chen
1986 IEEE Second International Conference on Data Engineering, 86-93, 1986
Trading privacy for trust in online interactions
L Lilien, B Bhargava
Idea Group, 2008
Privacy and trust in online interactions
L Lilien, B Bhargava
Online Consumer Protection: Theories of Human Relativism, Information …, 2008
Differentiating Security from Privacy in Internet of Things: A Survey of Selected Threats and Controls
A Al-Gburi, A Al-Hasnawi, L Lilien
Computer and Network Security Essentials, 153-172, 2018
Autonomous transaction processing using data dependency in mobile environments
IY Chung, B Bhargava, M Mahoui, L Lilien
Distributed Computing Systems, 2003. FTDCS 2003. Proceedings. The Ninth IEEE …, 2003
The system can't perform the operation now. Try again later.
Articles 1–20