SNAC Home
[Publications: by Research Areas, Publication Category, Publishing Years]

[Research Projects]

[Testbed and Implementations]
snac

 google scholar  Click here

[Tutorial][Patents][Books][Book Chapters][Journals and Magazines][Journals and Magazines (editorial)][Conferences (full paper)][Conferences (short&poster paper)][Conferences (invited paper)][ePrint][Others]

(Student authors are underlined)

Tutorials [top]

  1. Dijiang Huang, “Moving Target Defense (MTD): A Software Defined Networking (SDN) Approach”, IEEE International Conference on Communications (ICC), Kansas City, 2018 (Abstract)
  2. "Enhancing Cloud Security Through Software Defined Networking Approaches", IEEE International Conference on Cloud Networking (CloudNet) 2012, Paris, Nov 2012 (Abstract)
  3. "Enhancing Cloud Security Through Software Defined Networking Approaches", International Conference on Network and Service Management (CNSM) 2012, Las Vegas, Oct 2012 (Abstract)
  4. "Mobile Cloud Computing", IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, 2012 (Abstract)
  5. "Elliptic Curve Cryptography (ECC) and Pairing Based Cryptography (PBC) and Applications" Communication, Network, and Information Security, UC Berkeley, 2007.

Patents [top]

U.S. Patents:

  1. Dijiang Huang and Zhijie Wang, "Enabling Comparable Data Access Control for Lightweight Mobile Devices in Clouds", U.S. Patent # 9,705,850, Issued on July 11, 2017.
  2. Dijiang Huang, “Systems and Apparatuses for a Secure Mobile Cloud Framework for Mobile Computing and Communication”, U.S. Patent NO. 9,357,331, Issued on May 31, 2016.
  3. Chun-Jen Chung, Pankaj Khatkar, Tianyi Xing, Jeongkeun Lee, and Dijiang Huang, "Selection of a countermeasure” (Based on our original work “Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems”), U.S. Patent NO. 9,160,761, Issue date: October 13, 2015.
  4. Dijiang Huang and Zhibin Zhou, “Methods, Systems, and Apparatuses for Optimal Group Key Management for Secure Multicast Communication”, U.S. Patent NO. 8,837,738, Issue date: September 16, 2014.
    U.S. Provisional Patents:
    1. Oussama Mjihil, Dijiang Huang, and Abdelkrim Haqiq, ‘’Improving Attack Graph Scalability for the Cloud Through SDN-Based Decomposition and Parallel Processing”, M17-251P, filed 6/5/2017
    2. Ankur Chowdhary, Sandeep Pisharody, and Dijiang Huang, “Scalable Attack Graph Partitioning Scheme”, M17-253P, filed 6/6/2017
    3. Ankur Chowdhary, Sandeep Pisharody, Adel Alshamrani, and Dijiang Huang “Countermeasure Selections for Moving Target Defense”, M17-252P, filed 6/6/2017
    4. Adel Alshamrani, Ankur Chowdhary, Sandeep Pisharody, and Dijiang Huang, “Advanced Persistent Threats Detection Through Combining Dynamic and Static Attack”, M17-252P, filed 6/6/2017
    5. Sandeep Pishoardy, Dijiang Huang, and Ankur Chowdhary, “Security Policy Checking for Distributed Software Defined Networking (SDN)”, Provisional patent application # D10-103, filled 7/17/2016.

        Books [top]

        1. Dijiang Huang and Huijun Wu, “Mobile Cloud Computing: Foundations and Service Models”, Morgan Kaufmann Publishers (An imprint of Elsevier Science), Publishing date: September 22, 2017.
          Amazon: https://www.amazon.com/Mobile-Cloud-Computing-Foundations-Service/dp/0128096411
          Elsevier: https://www.elsevier.com/books/mobile-cloud-computing/huang/978-0-12-809641-3 
        2. Dijiang Huang, Ankur Chowdhary, and Sandeep Pishoardy, “Software-Defined Networking And Security: From Thoery to Practice”, CRC Press, expected publishing date: fall of 2018.
        3. Dijiang Huang, Qiuxiang Dong, and Yan Zhu, “Attribute-Based Encryption: From Theory To Practice”, working-in-progress, CRC Press, expected publishing date: first quarter of 2019.

        Book Chapters [top]

        1. Tianyi Xing, Zhenyang Xiong, Dijiang Huang, Deep Medhi, “Cloud Computing Security”, Cloud Services, Networking and Management, (Eds) N. Fonseca and R. Boutaba, IEEE and Wiley, 2014.
        2. Nirav Shah and Dijiang Huang
          DRP: Data Regulation Protocol for Source-End Mitgation of Distributed Denial of Service
          Network Security, Administration and Management: Advancing Technologies and Practices, D. C. Kar and M. R. Syed (Eds), IGI Global, 2010
        3. Dijiang Huang and Zhibin Zhou
          A Secure RFID Access Control Mechanism

          Security in RFID and Sensor Networks, Y. Zhang, P. Kitsos (Eds), Auerbach Publications , CRC Press, Taylor and Francis Group, 2008
        4. Dijiang Huang
          Secure Multi-path Data Delivery in Wireless Sensor Networks
          Wireless and Sensor Networks Security, Z. Jiang, Y. Pan (Eds), Nova Science Publishers, Inc. Fall, 2008.
        5. Deep Medhi and Dijiang Huang
          Secure and Resilient Routing: A Framework for Resilient Network Architectures
          Information Assurance: Dependability and Security in Networked Systems, Y. Qian, D. Tipper, P.Krishnamurthy, and J. Joshi , (Eds.), Morgan Kaufmann Publisher, 2007.

        Journals, Magazines, and Letters [top]

        1. Adel Alshamran,Sowmya Myneni,Ankur Chowdhary, and Dijiang Huang
          A Survey of Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities
          IEEE Survey and Tutorials, 2019
        2. Yan Zhu, Ruyun Yu, E. Chen, and Dijiang Huang
          Dual-mode broadcast encryption
          Science China Information Sciences, 2018.
        3. Yan Zhu, Guohua Gan, Ruiqi Guo, and Dijiang Huang
          PHE: An Efficient Tracing and Revoking for Traitors in Cloud File Syncing-and-Sharing
          IEEE Transactions on Cloud Computing, Volume 6, Issue 4, Pages 1110-1124, Oct-Dec, 2018.
        4. Safaa Mahrach, Iman EL MIR, Abdelkrim HAQIQ,  and Dijiang Huang
          SDN-based SYN Flooding Defense in Cloud
          Journal of Information Assurance & Security, Vol. 13, Issue 1, pages 30-39, 2018.
        5. Oussama Mjihil, Hamid Taramit, Abdelkrim Haqiq, and Dijiang Huang, "Beyond Dynamic Programming: Performance Evaluation and Enhancement of Multi-tenant Cloud Infrastructures." Journal of Information Assurance & Security, Vol. 13, Issue 1, pages 21-29, 2018.
        6. Zhijie Wang and Dijiang Huang
          Privacy-Preserving Mobile Crowd Sensing in Ad Hoc Networks
          Elsevier Ad Hoc Networks, Pages 14-26, Volume 73, NO. 1, May 2018.
        7. Bo Li, Yijian Pei, Hao Wu, Dijiang Huang
          MADM-based smart parking guidance algorithm
          PLOS one, Issue 12, NO. 12, 2017.
        8. Jin B. Hong, Dong Seong Kim, Chun-Jen Chung, and Dijiang Huang
          A Survey on the Usability and Practical Applications of Graphical Security Models
          Computer Science Review, Elsevier, Jun 2017
        9. Yin Zhang, Min Chen, Dijiang Huang, Di Wu, Yong Li
          iDoctor: Personalized and Professionalized Medical Recommendations Based on Hybrid Matrix Factorization
          Elsevier Future Generation Computer Systems, Pages 30-35, Volume 66 Issue C, January 2017. This paper was selected by Elsevier Article Selection Celebrating Computer Science Research in China (https://www.elsevier.com/physical-sciences/computer-science/article-selection-celebrating-computer-science-research-in-china)
        10. Sandeep Pisharody, Janakarajan Natarajan, Ankur ChowdharyAbdullah Alshalan, and Dijiang Huang
          Brew: A Security Policy Analysis Framework for Distributed SDN-Based Cloud Environments
          IEEE Transactions on Dependable and Secure Computing, 2017.
        11. Bing Li, Zhijie Wang, and Dijiang Huang
          Attribute-based Access Control for ICN Naming Scheme
          IEEE Transactions on Dependable and Secure Computing, 2016
        12. Abdullah AlshalanSandeep Pisharody, and Dijiang Huang
          A Survey of Mobile VPN Technologies
          IEEE Communications Surveys and Tutorials, Vol PP, Issue 99, November 2015.
        13. Zhijie Wang, Dijiang Huang, Yan Zhu, Bing Li, and Chun-Jen Chung,
          Efficient Attribute-Based Comparable Data Access Control
          IEEE Transactions on Computers, Vol 64, Issue 12, Pages 3430-3443, February 2015.
        14. Huijun Wu, Dijiang Huang, and Yan Zhu
          Establishing a personal on-demand execution environment for mobile cloud applications
          Springer Journal on Mobile Networks and Applications (MONET), Vol 20, NO. 3, pp. 297–307, June, 2015.
        15. Yan Zhu, Dijiang Huang, Xin Wang, and Changjun Hu
          From RBAC to ABAC: Constructing Flexible Data Access Control for Cloud Storage Services
          IEEE Transactions on Service Computing, Vol 8, Issue 4, pages 601-616, Oct 2015
        16. Shingo Ata, Dijiang Huang, Xuan Liu, Akira Wada, Tianyi Xing, Parikshit Juluri, Chun-Jen Chung, Yasuhiro Sato, Deep Medhi
          SeRViTR: A Framework, Implementation, and a Testbed for a Trustworthy Future Internet
          Computer Networks, vol 63, No. 22, April 2014.
        17. Yang Qin, Dijiang Huang, and Bing Li
          STARS: A Statistical Traffic Pattern Discovery System for MANETs
          IEEE Transactions on Dependable and Secure Computing (TDSC),  vol 11, issue 2, pages 181-192, March-April, 2014.
        18. Le Xu, Dijiang Huang, and Wei-Tek Tsai
          Cloud-Based Virtual Laboratory for Network Security Education
          IEEE Transactions on Education, vol 57, issue 3, pages 145-150, October 17, 2013.
        19. Zhibin Zhou, Dijiang Huang, and Zhijie Wang
          Efficient Privacy-Preserving Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption
          IEEE Transactions on Computers, Vol 64, Issue 1, pages 126-138, October 8, 2013.
        20. Dijiang Huang, Tianyi Xing, and Huijun Wu
          Mobile Cloud Computing Service Models: A User-Centric Approach
          IEEE Networks, Vol 27, Issue 5, Pages 6-11, Sep/Oct, 2013.
        21. Hongbin Liang, Tianyi Xing, Lin X. Cai, Dijiang Huang, Daiyuan Peng and Yan Liu
          Adaptive Computing Resource Allocation for Mobile Cloud Computing
          International Journal of Distributed Sensor Networks, vol 2013.
        22. Chun-Jen Chung, Pankaj Khatkar, Tianyi Xing, Jeongkeun Lee, and Dijiang Huang,
          NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
          IEEE Transactions on Dependable and Secure Computing (TDSC), Special Issue on Cloud Computing Assessment,  Vol. 10 NO. 4, pages 198-211, July-Aug 2013.
        23. Le Xu, Dijiang Huang, Wei-Tek Tsai, and Robert K. Atkinson
          V-Lab: A Mobile, Cloud-Based Virtual Laboratory Platform for Hands-On Networking Courses
          International Journal of Cyber Behavior, Psychology and Learning (IJCBPL), Vol 2, Issue 3, pages 73-85, 2012.
        24. Hongbin Liang, Lin X. Cai, Dijiang Huang, Xuemin (Sherman) Shen, and Daiyuan Peng
          An SMDP-based Service Model for Inter-domain Resource Allocation in Mobile Cloud Networks
          IEEE Transactions on Vehicular Technology, Vol. 61, NO. 5, pages 2222-2232, 2012.
        25. Zhibin Zhou and Dijiang Huang
          Gradual Identity Exposure Using Attribute-Based Encryption
          International Journal of Information Privacy, Security and Integrity (IJIPSI), Vol. 1, No. 2/3, 2012.
        26. Dijiang Huang
          Mobile Cloud Computing
          IEEE COMSOC Multimedia Communications Technical Committee (MMTC) E-Letter, Vol. 6, No. 10, Pages 27-31, October 2011.
        27. Dijiang Huang, Satyajayant Misra, Guoliang Xue, and Mayank Verma
          PACP: An Efficient Pseudonymous Authentication Based Conditional Privacy Protocol for VANETs
          IEEE Transactions on Intelligent Transportations, Vol 12, Issue 3, pages 736-746, Sep., 2011
        28. Dijiang Huang, Wei-Tek Tsai, Yi-hsin Tseng
          Policy Management for Secure Data Access Control in Vehicular Networks
          Springer Journal of Network and Systems Management (JNSM), Vol. 19, No. 4, pages 448-471, 2011
        29. Dijiang Huang, Xiaoyan Hong, and Mario Gerla
          Situation-Aware Trust Architecture for Vehicular Networks
          IEEE Communications Magazine, Volume 48, Issue 11, pages 128-135, 2010
        30. Dijiang Huang and Vinayak Kandiah
          Low-latency Mix using Split and Merge Operations
          The Third Special Issue on Security and Management, Journal of Network and Systems Management (JNSM), Volume 18, Number 3, Pages 244-264, September, 2010.
        31. Sean A. Williams and Dijiang Huang
          Group force mobility model and its obstacle avoidance capability
          Journal of the International Academy of Astronautics, Acta Astronautica, Volume 65, Issues 7-8, Pages 949-957, October-November 2009.
        32. Dijiang Huang and Mayank Verma
          ASPE: Attribute Based Secure Policy Enforcement for Data Access Control in Vehicular Ad Hoc Networks
          Ad Hoc Networks Journal (Special Issue of Privacy & Security in WSNs), Issue 8, pages 1526-1535, 2009.
        33. Hao Li, Jian Huang, Philip Sweany, and Dijiang Huang,
          FPGA Implementations of Elliptic Curve Cryptography and Tate Pairing over a Binary Field
          Journal of Systems Architecture, Vol 54, Issue 12, Pages 1077-1088, Dec, 2008.
        34. Dijiang Huang
          Unlinkability Measure for IEEE 802.11 based MANETs
          IEEE Transactions on Wireless Communications, Vol. 7, NO. 2, Pages, 1025-1034, Feb, 2008.
        35. Dijiang Huang and Deep Medhi
          A Secure Group Key Management Scheme for Hierarchical Mobile Ad-hoc Networks
          Ad Hoc Networks Journal, Vol. 6 NO. 4, Pages 560-577, Feb, 2008.
        36. Zhibin Zhou, Dijiang Huang
          Computing Cryptographic Pairing in Sensors
          ACM SIGBED Review, Special Issue on the RTSS Forum on Deeply Embedded Real-Time Computing,  Vol. 5, NO. 1, Jan, 2008.
        37. Dijiang Huang, Manish Mehta, Appie van de Liefvoort, and Deep Medhi
          Modeling Pairwise Key Establishment for Random Key Predistribution in Large-scale Sensor Networks
          IEEE/ACM Transactions on Networking, Vol 15, Issue 5, Pages 1204-1215, Oct. 2007.
        38. Dijiang Huang and Deep Medhi
          Secure Pairwise Key Establishment in Large-scale Sensor Networks: an Area Partitioning and Multi-group Key Predistribution Approach
          ACM Transactions on Sensor Networks, Vol 3, Issue 3, NO. 16, Aug. 2007.
        39. Dijiang Huang
          Pseudonym-Based Cryptography for Anonymous Communications in Mobile Ad-hoc Networks
          Special Issue on Cryptography in Networks, Int. J. Security and Networks, Vol. 2, NOs. 3/4, pages 272-283, 2007.
        40. Dijiang Huang, Qing Cao, Amit Sinha, Marc Schniederjans, Cory Beard, Lein Harn, and Deep Medhi
          New architecture for Intra-domain network security issues
          Communications of the ACM
          , Vol 49 , Issue 11, Pages: 64 - 72, Nov. 2006.
        41. Dijiang Huang and Deep Medhi
          A Key-chain Based Keying Scheme for Many-to-Many Secure Group Communication

          ACM Transactions on Information and System Security (TISSEC), Vol 7, NO. 4, Pages 523-552, Nov. 2004.

        Journals, Magazines, and Letters (Editorial Article) [top]

        1. Alexey Vinel, Xiaomin Ma, and Dijiang Huang
          Reliable and Secure VANETs [Guest Editorial]
          IEEE Transactions on Dependable and Secure Computing, Vol. 13, NO. 1, 2015.
        2. Xiaoming Fu, Stefano Secci, Dijiang Huang, and Rittwik Jana,
          Mobile Cloud Computing [Guest Editorial]
          IEEE Communications Magazine, Volume 53, Number 3, Pages 61-62, 2015

        Conferences and Workshops (full paper) [top]

        1. Ankur Chowdhary, Adel Alshamrani, and Dijiang Huang, “SUPC: SDN enabled Universal Policy Checking in Cloud Network”, In proceedings of International Conference on Computing, Networking and Communications (ICNC): Communications and Information Security Symposium - Communications and Information Security, 2019
        2. Ankur Chowdhary and Dijiang Huang, “SDN based Network Function Parallelism in Cloud”, In proceedings of International Conference on Computing, Networking and Communications (ICNC): Communications and Information Security Symposium - Communications and Information Security, 2019.
        3. Ankur Chowdhary, Sailik Sengupta, Adel Alshamrani, Dijiang Huang, and Abdulhakim Sabur
          Adaptive MTD Security using Markov Game Modeling”, In proceedings of International Conference on Computing
          Networking and Communications (ICNC): Communications and Information Security Symposium - Communications and Information Security, 2019
        4. Sailik Sengupta, Ankur Chowdhary, Dijiang Huang, and Subbarao Kambhampati
          Moving Target Defense for the Placement of Intrusion Detection Systems in the Cloud
          in Proceedings of GameSec, 2018.
        5. Adel Alshamrani, Ankur Chowdhary, Dijiang Huang, Sowmya Myneni, and Qussama Mjihil
          Combining Dynamic and Static Attack Information for Attack Tracing and Event Correlation
          in proceedings of IEEE Globalcom, Communication Information and System Security (CISS) Symposium, 2018.
        6. Jim Luo, Qiuxiang Dong, Dijiang Huang, and Myong Kang
          Attribute Based Encryption for Information Sharing on Tactical Mobile Networks
          IEEE Milcom, 2018.
        7. Mirza M. S. Maswood, Md M. I. Mamun, Dijiang Huang, and Deep Medhi,
          A Sliding Window Based Monitoring Scheme to Detect and Prevent DDoS Attack in Data Center Networks in a Dynamic Traffic Environment
          in proceedings of 39th Sarnoof Symposium, 2018
        8. Yuli Deng, Duo Lu, Chun-Jen Chung, Dijiang Huang, and Zhen Zeng
          Personalized Learning in a Virtual Hands-on Lab Platform for Computer Science Education
          in proceedings of IEEE Frontiers in Education Conference (FIE), 2018
        9. Zhen Zeng, Yuli Deng, IHan Hsiao, Dijiang Huang, and Chun-Jen Chung
          Improving student learning performance in a virtual hands-on lab system in cybersecurity education
          in proceedings of IEEE Frontiers in Education Conference (FIE), 2018
        10. Qiuxiang Dong, Dijiang Huang, Jim Luo, Myong Kang
          Achieving Fine-Grained Access Control with Discretionary User Revocation over Cloud Data
          in proceedings of the 4th IEEE Workshop on Security and Privacy in the Cloud (SPC), in conjunction with IEEE CNS, 2018
        11. Duo Lu and Dijiang Huang
          Multifactor User Authentication with In-Air-Handwriting and Hand Geometry
          in Proceedings of the 11th IAPR International Conference on Biometrics (ICB), 2018.
        12. Adel Alshamrani, Sayantan Guha, Sandeep Pisharody, Ankur Chowdhary, and Dijiang Huang
          Fault Tolerant Controller Placement in Distributed SDN Environments
          in Proceedings of IEEE ICC Communications QoS, Reliability, and Modeling Symposium, 2018.
        13. Abdullah Alshalan and Dijiang Huang
          Prompt Lightweight VPN Session Resumption for Rapid Client Mobility and MTD Enablement for VPN Servers
          in Proceedings of IEEE ICC Communication and Information Systems Security Symposium, 2018.
        14. Oussama Mjihil, Dijiang Huang, and Abdelkrim Haqiq
          Improving Attack Graph Scalability for the Cloud Through SDN-Based Decomposition and Parallel Processing
          in proceedings of the International Symposium on Ubiquitous Networking, Springer, 2017.
        15. Oussama Mjihil, Hamid Taramit, Abdelkrim Haqiq, and Dijiang Huang
          Optimized Security as a Service Platforms via Stochastic Modeling and Dynamic Programming
          In proceedings of the International Conference on Innovations in Bio-Inspired Computing and Applications. 2017.
        16. Ankur Chowdhary, Vaibhav Hemant Dixit, Naveen Tiwari, Sukhwa Kyung, Dijiang Huang, and Gail-Joon Ahn
          Science DMZ: SDN based Secured Cloud Testbed
          Demo, IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), 2017.
        17. Adel Alshamrani, Ankur Chowdhary, Sandeep Pisharody, Duo Lu, and Dijiang Huang
          A Defense System for Defeating DDoS Attacks in SDN based Networks
          in Proceedings of International Symposium on Mobility Management and Wireless Access (MobiWac), 2017
        18. Duo Lu and Dijiang Huang
          A Data Driven In-Air-Handwriting Biometric Authentication System
          in Proceedings of the International Joint Conference on Biometrics (IJCB), 2017.
        19. Iman El Mir, Ankur Chowdhary, Dijiang Huang, Sandeep Pisharody, Dong Seong Kim and Abdelkrim Haqiq
          Software Defined Stochastic Model for Moving Target Defense
          in Proceedings of Third International Afro-European Conference for Industrial Advancement (AECIA), 2016.
        20. Ankur Chowdhary, Sandeep Pisharody, Dijiang Huang
          SDN based scalable MTD solution in Cloud Network
          in Proceedings of the ACM Moving Target Defense (MTD) Workshop, in conjunction with ACM CCS, 2016.
        21. Sandeep Pisharody, Ankur Chowdhary, Dijiang Huang
          Security Policy Checking in Distributed SDN based Clouds
          in Proceedings of the IEEE Conference on Communications and Network Security (CNS), 2016.
        22. Duo Lu, Zhichao Li, Dijiang Huang, Xianglong Lu, Yuli Deng, Ankur Chowdhary, and Bing Li
          VC-bots: A Vehicular Cloud Computing Testbed with Mobile Robots
          in Proceedings of ACM MobiHoc Workshop on Internet of Vehicles and Vehicles of Internet (IoV-VoI), 2016.
        23. Abdullah Alshalan, Sandeep Pisharody, and Dijiang Huang
          MobiVPN: A Mobile VPN Providing Persistency To Applications
          in Proceedings of 2016 International Conference on Computing, Networking and Communications Wireless Networks (ICNC), 2016.
        24. Jin Hong, Chun-Jen Chung, Dijiang Huang, Dongseong Kim
          Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
          in Proceedings of the First International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2015.
        25. Jin Hong, Chun-Jen Chung, Dijiang Huang, Dongseong Kim
          Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
          in Proceedings of the First International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2015.
        26. Chun-Jen Chung, Tianyi Xing, Dijiang Huang, Deep Medhi, and Kishor Trivedi,
          SeReNe: On Establishing Secure and Resilient Networking Services for an SDN-based Multi-Tenant Datacenter Environment
          in Proceedings of the Workshop on Dependability Issues on SDN and NFV (DISN), 2015.
        27. Min Chen, Yixue Hao, Yong Li, Di Wu, and Dijiang Huang,
          LIVES: Learning through Interactive Video and Emotion-aware System
          ACM MobiHoc, Demo, 2015.
        28. Huijun Wu and Dijiang Huang
          POEM: On Establishing A Personal On-demand Execution Environment for Mobile Cloud Applications
          in Proceedings of the IEEE 4th  International Conference on Mobile Services (IEEE MS), pages 41-48, 2015.
        29. Huijun Wu and Dijiang Huang
          MoSeC: Mobile-Cloud Service Composition
          in Proceedings of 3rd International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2015.
        30. Huijun Wu and Dijiang Huang
          Modeling Multi-factor Multi-site Risk-based Offloading for Mobile Cloud Computing
          in Proceedings of 10th International Conference on Network and Service Management (CNSM), 2014.
        31. Bing Li, Dijiang Huang, and Zhijie Wang
          Refining Traffic Information for Analysis using Evidence Theory
          in Proceedings of Milcom, 2014.
        32. Zhijie Wang, Bing Li, and Dijiang Huang,
          Towards Anonymous Group Setup across Multiple Domains
          in Proceedings of Milcom, 2014.
        33. Bing Li, Ashwin Prabhu Verleker, Dijiang Huang, Zhijie Wang, and Yan Zhu
          Attribute-based Access Control for ICN Naming Scheme
          in Proceedings of the IEE Conference on Communications and Network Security (CNS), 2014.
        34. Zhijie Wang, Dijiang Huang, Huijun Wu, Bing Li, and Yuli Deng
          Towards Distributed Privacy-Preserving Mobile Access Control
          in Proceedings of the IEEE Globecom 2014.
        35. Zhijie Wang, Dijiang Huang, Huijun Wu, Bing Li, and Yuli Deng, Ailixier Aikebaier, and  Yuuichi Teranishi
          QoS-Constrained Sensing Task Assignment for Mobile Crowd Sensing
          in Proceedings of the IEEE Globecom 2014.
        36. Yuki Kawai, Yasuhiro Sato, Shingo Ata, Dijiang Huang, Deep Medhi, and Ikuo Oka
          Database Oriented Management for Asynchronous and Consistent Reconfiguration in Software-Defined Networks
          In Proceedings of IEEE/IFIP NOMS, 2014
        37. Chun-Jen Chun, Jingsong Cui, Pankaj Khatkar,  and Dijiang Huang
          Non-intrusive process-based monitoring system to mitigate and prevent VM vulnerability explorations
          In Proceedings of the Collaboratecom 2013.
        38. Huijun Wu, Dijiang Huang, and Samia Bouzefrane
          Making Offloading Decisions Resistant to Network Unavailability for Mobile Cloud Collaboration
          In Proceedings of the Collaboratecom 2013.
        39. Bing Li and Dijiang Huang
          Modeling Anonymous MANET Communications Using Super-nodes
          In Proceedings of Milcom, 2013.
        40. Bing Li, Zhijie Wang, and Dijiang Huang
          An Efficient and Anonymous Attribute-Based Group Setup Scheme
          In Proceedings of the IEEE Globecom 2013.
        41. Yan Zhu, Di Ma, Changjun Hu, and Dijiang Huang
          How to Use Attribute-Based Encryption to Implement Role-based Access Control in the Cloud
          in Proceedings of the International Workshop on Security in Cloud Computing, in conjunction with ASIACCS, 2013.
        42. Tianyi Xing, Dijiang Huang, Le Xu, Chun-Jen Chung, Pankaj Khatkar
          SnortFlow: A OpenFlow-based Intrusion Prevention System in Cloud Environment
          in Proceedings of the Second GENI Research and Educational Experiment Workshop (GREE2013), 2013.
        43. Li Li, Dijiang Huang, Zhidong Shen, and Samia Bouzefrane
          A Cloud based Dual-Root Trust Model for Secure Mobile Online Transactions
          In Proceedings of IEEE WCNC 2013.
        44. Fatiha Houacine, Samia Bouzefrane, Li Li and Dijiang Huang
          MCC-OSGi: A OSGi-based Mobile Cloud Service Model
          In Proceedings of the Eleventh International Symposium on Autonomous Decentralized Systems, (ISADS) 2013.
        45. Zhibin Zhou and Dijiang Huang
          Efficient and Secure Data Storage Operations for Mobile Cloud Computing
          In Proceedings of the 8th International Conference on Network and Service Management (CNSM), 2012
        46. Tianyi Xing, Hongbin Liang, Dijiang Huang, and Lin X. Cai
          Geographic-based Service Request Scheduling Model for Mobile Cloud Computing
          In Proceedings of the 11th IEEE International Conference on Ubiquitous Computing and Communications (IUCC), 2012.
        47. Yang Qin, Dijiang Huang, and Xinwen Zhang
          VehiCloud: Cloud Computing Facilitating Routing In Vehicular Networks
          In Proceedings of the 11th IEEE International Conference on Ubiquitous Computing and Communications (IUCC), 2012.
        48. Dijiang Huang, Sean A. Williams, and Swaroop Shere
          Cheater Detection in Vehicular Networks
          In Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2012.
        49. Le Xu, Dijiang Huang, and Wei-Tek Tsai
          "V-Lab: A Cloud-based Virtual Laboratory Platform for Hands-On Networking Courses
          In Proceedings of the 17th Annual Conference on Innovation and Technology in Computer Science Education (ITiCSE), 2012.
        50. Xuan Liu, Akira Wada, Tianyi Xing, Parikshit Juluri, Yasuhiro Sato, Shingo Ata2, Dijiang Huang, and Deep Medhi
          SeRViTR: A Framework for Trust and Policy Management for A Secure Internet and Its Proof-of-Concept Implementation
          In Proceedings of the 4th IEEE/IFIP International Workshop on Management of the Future Internet (ManFI), 2012.
        51. Tianyi Xing, Xuan Liu, Chun-Jen Chung, Akira Wada, Shingo Ata, Dijiang Huang, and Deep Medhi
          Constructing Virtual Networking Environment in a Geo-Distributed Programmable Layer-2 Networking Environment (G-PLaNE)
          In Proceedings of the the ICC Workshop on the Network of the Future, 2012
        52. Vijayakrishnan Nagarajan and Dijiang Huang
          Secure Web Referral Service
          In Proceedings of the International Conference on Information Networking (ICOIN), 2012.
        53. Samia Bouzefrane, Pierre Paradinas, and Dijiang Huang
          An OSGi-based Service Oriented Architecture for Android Platforms
          In Proceedings of the 23rd International Conference on Software & Systems Engineering and their Applications (ICSSEA), 2011.
        54. Dijiang Huang, Zhibin Zhou, Le Xu, Tianyi Xing, and Yunji Zhong
          Secure Data Processing Framework for Mobile Cloud Computing
          In Proceedings of IEEE INFOCOM's Workshop on Cloud Computing, 2011.
        55. Hongbin Liang, Dijiang Huang, Lin X. Cai, Xuemin (Sherman) Shen, Daiyuan Peng
          Resource Allocation for Security Services in Mobile Cloud Computing
          In Proceedings of the IEEE INFOCOM's Workshop on Machine-to-Machine Communications and Networking (M2MCN), 2011
        56. Yang Qin and Dijiang Huang,
          Least Squares Disclosure Attack in Mobile Ad Hoc Networks
          In Proceedings of the IEEE International Conference on Communications (ICC), Japan, 2011.
        57. Dijiang Huang
          Anonymous Certification Services
          In Proceedings of the Communication & Information System Security Symposium, IEEE Globecom 2010.
        58. Dijiang Huang and Vetri Arasan
          On Measuring Email-based Social Network Trust
          In Proceedings of the Communication & Information System Security Symposium, IEEE Globecom 2010.
        59. Dijiang Huang, Shingo Ata, and Deep Medhi
          Establishing Secure Virtual Trust Routing And Provisioning Domains For Future Internet
          In Proceedings of the Next Generation Networking Symposium, IEEE Globecom 2010.
        60. Dijiang Huang, Swaroop Shere, Soyoung Ahn,
          Dynamic Highway Congestion Detection And Prediction Based On Shock Waves
          In Proceedings of the ACM VANET (in conjunction of ACM Mobicom), 2010
        61. Dijiang Huang, Vetri Arasan
          Email-based Social Network Trust
          In Proceedings of the Symposium on Social Intelligence and Networking (SIN), SocialCom, pages 363-370, 2010
        62. Dijiang Huang, Zhibin Zhou, Yan Zhu
          Gradual Identity Exposure Using Attribute-Based Encryption
          In Proceedings of the Second IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT), pages 881-888, 2010.
        63. Nanxi Chen, Mario Gerla, Dijiang Huang, and Xiaoyan Hong
          Secure, Selective Group Broadcast in Vehicular Networks using Dynamic Attribute Based Encryption
          Accepted to appear in The 9th IFIP Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net), 2010.
        64. Dijiang Huang, Utkarsh Agarwal
          Countering Repacketization Watermarking Attacks on Tor Network
          The International Conference on Applied Cryptography and Network Security (ACNS), 2010.
        65. Nirav Shah and Dijiang Huang
          A-WEOR: Communication Privacy Protection for Wireless Mesh Networks using Encoded Opportunistic Routing
          In Proceedings of the Scond International Workshop on CARier-grade wireless MEsh Networks (CARMEN), in conjunction with IEEE Infocom, 2010.
        66. Dijiang Huang, Zhibin Zhou, Xiaoyan Hong, Mario Gerla
          Establishing Email-based Social Network Trust for Vehicular Networks
          In Proceedings of IEEE CCNC, Special Session on Social Networking, pages 1-5, 2010
        67. Vijayakrishnan Nagaraja, Vetri Arasan, and Dijiang Huang
          Using Power Hopping to Counter MAC Spoof Attacks in WLAN
          In Proceedings of IEEE CCNC, pages 1-5, 2010
        68. Sushma Myneni and Dijiang Huang
          IEEE 802.11 Wireless LAN Control Frame Protection
          In Proceedings of IEEE CCNC, pages 1-5, 2010.
        69. Yang Qin and Dijiang Huang
          A Statistical Traffic Pattern Discovery System for MANETs
          In Proceedings of Milcom, pages 1-7, 2009.
        70. Dijiang Huang
          Secure Multi-path Data Delivery in Sensor Networks
          In Proceedings of Milcom, pages 1-7, 2009.
        71. Mukesh Jagasia and Dijiang Huang
          Distributed Data-theft Detection in Wireless Sensor Networks
          In Proceedings of IEEE Globecom, AHSN, pages 1-6, 2009.
        72. Harsh Kapoor and Dijiang Huang
          Secret-sharing based secure communication protocols for passive RFIDs
          In Proceedings of IEEE Globecom, CISS, pages 1-6,2009.
        73. Dijiang Huang and Harsh Kapoor
          Towards lightweight secure communication protocols for passive RFIDs
          In Proceedings of the 6th IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), pages 1-9, 2009.
        74. Dijiang Huang
          On An Information Theoretic Approach to Model Anonymous MANET Communications
          In Proceedings of the IEEE International Symposium on Information Theory (ISIT), pages 1629-1633, 2009.
        75. Satyajayant Misra, Mayank Verma, Dijiang Huang, Guoliang Xue
          SEAS: A Secure and Efficient Anonymity Scheme for Low-Cost RFID tags
          In Proceedings of the IEEE ICC, Wireless Networking, pages 1-6, 2009.
        76. Mayank Verma and Dijiang Huang
          Secure Group Communication in VANETs
          In Proccedings of IEEE Intelligent Vehicular Communications System (ICVS), pages 1-5, 2009.
        77. Yang Qin, Yin Yin, Dijiang Huang, and Nirav Shah
          A Comparative Study of Anonymous 802.11 Protocols

          In Proceedings of IEEE Military Communications Conference (MILCOM), pages 1-7, 2008.
        78. Xiaoyan Hong, Dijiang Huang, Mario Gerla, Zhen Cao
          SAT: Building New Trust Architecture for Vehicular Networks
          In Proceedings of the 3rd ACM International Workshop on Mobility in the Evolving Internet Architecture (ACM MobiArch), pages 31-36, 2008.
        79. Vinayak Kandiah, Dijiang Huang, and Harsh Kapoor
          C-Mix: A lightweight Anonymous Routing Approach
          Information Hiding (IH), Lecture Notes in Computer Science, vol. 5284 LNCS, pages 294-308, 2008.
        80. Yang Qin, Dijiang Huang, and Vinayak Kandiah
          OLAR: On-demand Lightweight Anonymous Routing in MANETs
          In Proceedings of The Fourth International Conference on Mobile Computing and Ubiquitous Networking (ICMU), pages 72-79, 2008. (Best paper award)
        81. Dijiang Huang and Yang Qin
          An Information Theoretic Approach for MANET Unlinkability Measure
          In Proceedings of The Fourth International Conference on Mobile Computing and Ubiquitous Networking (ICMU), pages 132-139, 2008.
        82. Zhibin Zhou and Dijiang Huang
          SRK: A Distributed RFID Data Access Control Mechanism
          In Proceedings of the IEEE International Conference on Communications (ICC), pages 2854 - 2858, 2008.
        83. Dijiang Huang, Vinayak Kandiah, and Mayank Verma
          Privacy Preservation Services: Challenges and Solutions
          In Proceedings of ACM Symposium on Applied Computing (SAC), Computer Security Track, pages 2110-2115, 2008.
        84. Zhibin Zhou and Dijiang Huang
          RFID Keeper: An RFID Data Access Control Mechanism
          In Proceedings of IEEE Globecom, pages 4570-4574, 2007.
        85. Archana Ramachandran, Zhibin Zhou, and Dijiang Huang
          Computing Cryptographic Algorithms in Portable and Embedded Devices
          In Proceedings of the IEEE International Conference on Portable Information Devices (PORTABLE), pages 1-7, 2007.
        86. Dijiang Huang, Mayank Verma, Archana Ramachandran, and Zhibin Zhou
          A Distributed ePedigree Architecture
          In Proceedings of the 11th International Workshop on Future Trends of Distributed Computing Systems (FTDCS 2007), pages 220-227, Mar. 2007.
        87. Dijiang Huang
          On Measuring Anonymity for Wireless Mobile Ad-hoc Networks
          In Proceedings of the 2nd IEEE International Workshop on Performance and Management of Wireless and Mobile Networks (P2MNet), pages 779-786, Nov. 2006.
        88. Sean. A. Williams and Dijiang Huang
          Group Force Mobility Models and Their Obstacle Avoidance Capability
          In Proceedings of the AIAA 57th International Astronautical Congress (IAC 2006), vol. 4, pp. 2759–2766, 2006.
        89. Dijiang Huang
          Traffic Analysis-based Unlinkability Measure for IEEE 802.11b-based Communication Systems
          In Proceedings of the ACM Workshop on Wireless Security (WiSe, in conjunction with ACM MobiCom), Pages 65-74, Sep. 2006.
        90. Dijiang Huang and Hao Li
          Admissibility and Anonymity Based Cryptography and Its Implementation in Embedded Devices
          In Proceedings of Work-in-Progress Session IEEE Real-Time and Embedded Technology and Applications Symposium
          , pages 53-56, Apr., 2006.
        91. Sean Williams and Dijiang Huang
          A group force mobility model
          In Proceedings of the 9th Communications and Networking Simulation Symposium, pages 333-340, Apr. 2006.
        92. Dijiang Huang, Amit Sinha, and Deep Medhi
          On Providing Confidentiality in Link State Routing Protocol
          In Proceedings of the IEEE Consumer Communications and Networking Conference, pages 671-675, Jan. 2006.
        93. Dijiang Huang
          An Identity-Based Blind Key Generation and Signature Scheme
          In Proceedings of the Conference on Information Security and Cryptology (CISC), pages 65-73, Dec. 2005.
        94. Gaurav Agrawal, Dijiang Huang, and Deep Medhi
          Network Protection Design for Reliable MPLS Networks
          In Proceedings of the 5th International Workshop on Design of Reliable Communication Networks (DRCN2005), pages, 481-486, Oct. 2005.
        95. Dijiang Huang and Deep Medhi
          A Byzantine Resilient Multi-path Key Establishment Scheme and Its Robustness Analysis for Sensor Networks
          In Proceedings of the 5th IEEE International Workshop on Algorithms for Wireless, Mobile, Ad Hoc and Sensor Networks (IEEE WMAN, in conjunction with IPDPS), pages 240b, Apr. 2005.
        96. Dijiang Huang, Manish Mehta, and Deep Medhi
          Source Routing Based Pairwise Key Establishment Protocol for Sensor Networks
          In Proceedings of the 24th IEEE International Performance Computing and Communications Conference, pages 177 - 183. Apr. 2005.
        97. Dijiang Huang, Amit Sinha, and Deep Medhi
          A Key Distribution Scheme for Double Authentication in Link State Routing Protocol
          In Proceedings of the 24th IEEE International Performance Computing and Communications Conference, pages 19 - 24., Apr. 2005.
        98. Manish Mehta, Dijiang Huang, and Lein Harn
          RINK-RKP: A Scheme for Key Predistribution and Shared-Key Discovery in Sensor Networks
          In Proceedings of the 24th IEEE International Performance Computing and Communications Conference, pages 193-197, Apr. 2005.
        99. Dijiang Huang
          Using Delaunay Triangulation to Construct Obstacle Detour Mobility Model
          In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), pages 1644-1649, Vol. 3, Mar. 2005.
        100. Dijiang Huang, Manish Mehta, Deep Medhi, and Lein Harn
          Location-aware Key Management Scheme for Wireless Sensor Networks
          In Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '04, in conjunction with ACM CCS2004), pages 29-42, Oct. 2004.
        101. Dijiang Huang and Qing Cao,
          Constructing Realistic Mobility Model: A New Framework
          In Proceedings of the 35th Annual Meeting of the Decision Sciences institute (DSI), Nov. 2004. Boston, Massachusetts.
        102. Dijiang Huang,
          Secure Link State Routing Protocol: A Framework
          Doctoral Symposium, International Conference on Distributed Computing System (ICDCS), Providence, RI, May 19-22, 2003.
        103. Dijiang Huang, Deep Medhi, Cory Beard, and Lein Harn
          Trust Analysis of Link State Network Routing
          In Proceedings of the 2nd International Workshop on Trusted Internet (TIW), Hyderabad, India, December 17, 2003.
        104. Dijiang Huang, Amit Sinha, and Deep Medhi
          A Double Authentication Scheme To Detect Impersonation Attack In Link State Routing Protocols

          In Proceedings of the IEEE International Conference on Communications (ICC), pages 1723 - 1727, Vol. 3, May. 2003.
        Conferences and Workshops (poster and short papers) [top]
        1. Zhen Zeng, Yuli Deng, I-Han Hsiao, and Dijiang Huang
          Understanding Students’ Engagement behavior in Virtual Hands-on Lab: Findings from a Computer Network Security Course
          ACM SIGCSE, Poster, 2018
        2. Yuli Deng, Zhen Zeng and Dijiang Huang
          ThoTh Lab: A Web-Based, Virtualized, Adaptive Learning Platform for Cybersecurity Hands-on Projects
          in Proceedings of the Thirteenth Annual ACM International Computing Education Research (ICER) conference, Poster, 2017.
        3. Zhen Zeng, Yuli Deng, I-Han Hsiao, Dijiang Huang and Chun-Jen Chung
          Understanding students’ engagement behavior in virtual hands-on lab
          in Proceedings of the Thirteenth Annual ACM International Computing Education Research (ICER) conference, Poster, 2017.
        4. Zhen Zeng, Yuli Deng, I-Han Hsiao, Dijiang Huang and Chun-Jen Chung
          Predicting learning outcome in virtual hands-on lab system: The role of student attitude
          in Proceedings of the Thirteenth Annual ACM International Computing Education Research (ICER) conference, Poster, 2017.
        5. Qiuxiang Dong and Dijiang Huang
          Privacy-preserving Matchmaking in Geosocial Networks with Untrusted Servers
          in Proceedings of the 37th IEEE International Conference on Distributed Computing systems (ICDCS), Poster, 2017.
        6. Yuli Deng, Dijiang Huang, and Chun-Jen Chung
          Adaptive Learning Framework in ThoTh Lab, a Virtual E-Learning Platform for CS Hands-on Projects
          Poster, SIGCSE 2017.
        7. Tianyi Xing, Zhengyang Xiong, Dijiang Huang, and Deep Medhi
          SDNIPS: Enabling the Software Defined Network Based Intrusion Prevention System in Clouds
          in Proceedings of 10th International Conference on Network and Service Management (CNSM), (poster) 2014.
        8. Akira Wada, Yasuhiro Sato, Xuan Liu, Tianyi Xing, Shingo Ata, Deep Medhi, Dijiang Huang, and Ikuo Oka
          A Behavior based Policy Management for Adaptive Trustworthiness Assignment in Future Network
          In Proceedings of IFIP/IEEE International Symposium on Integrated Network Management,  Poster, IM'2013.
        9. Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Dijiang Huang, and Shanbiao Wang
          Towards Temporal Access Control in Cloud Computing
          In Proceedings of the the 31st IEEE International Conference on Computer Communications (INFOCOM), mini conference, 2012.
        10. Tianyi Xing, Dijiang Huang, Deep Medhi, and Shingo Ata
          MobiCloud: a Geo-distributed Mobile Cloud Computing Platform
          In Proceedings of the 8th International Conference on Network and Service Management (CNSM), short paper, 2012.
        11. Zhibin Zhou and Dijiang Huang
          An Optimal Key Distribution Scheme for Multicast Group Communication
          In Proceedings of IEEE Conference on Computer Communications (Infocom, mini conference), pages 1-5, 2010.
        12. Zhibin Zhou, Dijiang Huang
          On Efficient Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption
          Poster, 17th ACM Conference on Computer and Communications Security (CCS), 2010.
        13. Zhibin Zhou and Dijiang Huang
          Constructing Efficient Attribute-Based Broadcast Encryption
          In Proceedings of IEEE Conference on Computer Communications (Infocom, poster) 2010.
        Conferences and Workshops (invited papers) [top]
        1. Ankur Chowdhary, Adel Alshamrani, and Dijiang Huang
          MTD Analysis and evaluation framework in Software Defined Network (MASON)
          in Proceedings of the ACM SDN/NFV Security Workshop, 2018 (Invited)
        2. Duo Lu, Dijiang Huang, Andrew Walenstein, and  Deep Medhi
          A Secure Microservice Framework for IoT
          in Proceedings of IEEE Service Oriented Software Engineering (SOSE), 2017 (Invited Paper).
        3. Ankur Chowdhary, Sandeep Pisharody, Adel Alshamrani, and Dijiang Huang
          Dynamic Game based Security framework in SDN-enabled Cloud Networking Environments
          in Proceedings of the ACM International Workshop on Security in Software Defined Networks and Network Function Virtualization (SDN-NFV Sec'17), 2017 (Invited Paper).
        4. Le XuVijayakrishnan Nagarajan, Dijiang Huang, and Wei-Tek Tsai,
          Secure Web Referral Services for Mobile Cloud Computing
          IEEE International Symposium on Mobile Cloud, Computing, and Service Engineering (IEEE MobileCloud)
          , invited, 2013.
        5. Hongbin Liang, Dijiang Huang, Daiyuan Peng
          On Economic Mobile Cloud Computing Model
          In Proceedings of the International Workshop on Mobile Computing and Clouds (MobiCloud in conjunction with MobiCASE), (invited paper), 2010.
        6. Dijiang Huang, Xinwen Zhang, Myong Kang, and Jim Luo
          MobiCloud: Building Secure Mobile Cloud Framework for Mobile Computing and Communication
          In Proceedings of the 5th IEEE International Symposium on Service-Oriented System Engineering (SOSE), pages 27-34, (invited), 2010.
        ePrint Publications [top]
        1. Duo Lu and Dijiang Huang, “FMCode: A 3D In-the-Air Finger Motion Based User Login Framework for Gesture Interface”, arXiv.org eprint https://arxiv.org/abs/1808.00130, August 1, 2018.
        2. Duo Lu and Dijiang Huang, “FMHash: Deep Hashing of In-Air-Handwriting for User Identification”, arXiv.org eprint https://arxiv.org/abs/1806.03574, June 10, 2018
        3. Jay Aikat, Ilya Baldin, Mark Berman, Joe Breen, Richard Brooks, Prasad Calyam, Jeff Chase, Wallace Chase, Russ Clark, Chip Elliott, Jim Griffioen, Dijiang Huang, Julio Ibarra, Tom Lehman, Inder Monga, Abrahim Matta, Christos Papadopoulos, Mike Reiter, Dipankar Raychaudhuri, Glenn Ricart, Robert Ricci, Paul Ruth, Ivan Seskar, Jerry Sobieski, and Kobus Van der Merwe, “The Future of CISE Distributed Research Infrastructure”, arXiv.org eprint https://arxiv.org/abs/1803.09886, March 27, 2018
        4. Weijia Wang, Zhijie Wang, Bing Li, Qiuxiang Dong, Dijiang Huang, “IR-CP-ABE: Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Flexible Secure Group-Based Communication”, https://eprint.iacr.org/2017/1100, 2017
        5. Qiuxiang Dong, Dijiang Huang, Jim Luo, Myong Kang, “HIR-CP-ABE: Hierarchical Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Secure and Flexible Data Sharing”, https://eprint.iacr.org/2017/1101, 2017
        6. Q Dong, D Huang, J Luo, M Kang, “ID-HABE: Incorporating ID-based Revocation, Delegation, and Authority Hierarchy into Attribute-Based Encryption”, https://eprint.iacr.org/2017/1102, 2017
        7. Zhibin Zhou and Dijiang Huang, “Efficient and Secure Data Storage Operations for Mobile Cloud Computing”, https://eprint.iacr.org/2011/185, 2011
        8. Zhibin Zhou and Dijiang Huang, “On Efficient Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption”, https://eprint.iacr.org/2010/395, 2010
        9. Zhibin Zhou and Dijiang Huang, “Optimal Multicast Group Communication”, https://eprint.iacr.org/2009/010, 2009

        Others [top]

        1. Dijiang Huang
          ThoTh Lab: Personalized Learning for Cybersecurity Education
          Showcase at Reimagine Education  Conference, 2017. (ThoTh Lab project won the Reimagine Education Bronze Award in Engineering/IT Discipline). See http://www.reimagine-education.com/awards/reimagine-education-2016-honours-list/
        2. PhD Dissertation, "Many-to-Many Secure Group Communication and Its Applications,"
          Computer Science and Electrical Engineering Department, University of Missouri-Kansas City, December 2004.
          Adviser: Professor Deep Medhi
        Copyright 2018