Wenhui Hu
Wenhui Hu
Verified email at oracle.com
Cited by
Cited by
Cross-layer enhanced source location privacy in sensor networks
M Shao, W Hu, S Zhu, G Cao, S Krishnamurth, T La Porta
2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and …, 2009
Duet: library integrity verification for android applications
W Hu, D Octeau, PD McDaniel, P Liu
Proceedings of the 2014 ACM conference on Security and privacy in wireless …, 2014
Compromise-resilient anti-jamming for wireless sensor networks
X Jiang, W Hu, S Zhu, G Cao
International conference on information and communications security, 140-154, 2010
Compromise-resilient anti-jamming communication in wireless sensor networks
X Jiang, W Hu, S Zhu, G Cao
Wireless Networks 17 (6), 1513-1527, 2011
Third-party library security management for mobile applications
W Hu
Improvement on OTP authentication and a possession-based authentication framework
S Zhao, W Hu
International Journal of Multimedia Intelligence and Security 3 (2), 187-203, 2018
Fast Solutions for AP-to-AP Handoffs
W Hu, D Forsberg
NordSec 2006, 2006
The system can't perform the operation now. Try again later.
Articles 1–7