​
Login / Signup
Song Han
ORCID
Publication Activity (10 Years)
Years Active: 2003-2023
Publications (10 Years): 1
Top Topics
Secret Key
Mutual Authentication
Lightweight
Rfid Technology
Top Venues
CoRR
Comput. Syst. Sci. Eng.
</>
Publications
</>
Hanrui Wang
,
Pengyu Liu
,
Bochen Tan
,
Yilian Liu
,
Jiaqi Gu
,
David Z. Pan
,
Jason Cong
,
Umut Acar
,
Song Han
FPQA-C: A Compilation Framework for Field Programmable Qubit Array.
CoRR
(2023)
Song Han
,
Tharam S. Dillon
,
Vidy Potdar
,
Elizabeth Chang
RFID mutual authentication protocols for tags and readers with and without a server.
Comput. Syst. Sci. Eng.
28 (2) (2013)
Sazia Parvin
,
Song Han
,
Zia ur Rehman
,
Mohammad Abdullah Al Faruque
,
Farookh Khadeer Hussain
A New Identity-Based Group Signature Scheme Based on Knapsack ECC.
IMIS
(2012)
Biming Tian
,
Song Han
,
Sazia Parvin
,
Jiankun Hu
,
Sajal K. Das
Erratum: Self-Healing Key Distribution Schemes for Wireless Networks: A Survey.
Comput. J.
55 (4) (2012)
Sazia Parvin
,
Farookh Khadeer Hussain
,
Omar Khadeer Hussain
,
Song Han
,
Biming Tian
,
Elizabeth Chang
Cognitive radio network security: A survey.
J. Netw. Comput. Appl.
35 (6) (2012)
Biming Tian
,
Song Han
,
Liu Liu
,
Saghar Khadem
,
Sazia Parvin
Towards enhanced key management in multi-phase ZigBee network architecture.
Comput. Commun.
35 (5) (2012)
Sazia Parvin
,
Song Han
,
Farookh Khadeer Hussain
,
Biming Tian
A Combinational Approach for Trust Establishment in Cognitive Radio Networks.
CISIS
(2011)
Miao Xie
,
Song Han
,
Biming Tian
,
Sazia Parvin
Anomaly detection in wireless sensor networks: A survey.
J. Netw. Comput. Appl.
34 (4) (2011)
Biming Tian
,
Song Han
,
Sazia Parvin
,
Jiankun Hu
,
Sajal K. Das
Self-Healing Key Distribution Schemes for Wireless Networks: A Survey.
Comput. J.
54 (4) (2011)
Biming Tian
,
Song Han
,
Sazia Parvin
,
Miao Xie
Generalized hash-binary-tree based self-healing key distribution with implicit authentication.
IWCMC
(2011)
Sazia Parvin
,
Farookh Khadeer Hussain
,
Song Han
,
Omar Khadeer Hussain
Trust-Based Spectrum Sharing for Cognitive Radio Networks.
J. Interconnect. Networks
12 (3) (2011)
Miao Xie
,
Song Han
,
Biming Tian
Highly Efficient Distance-Based Anomaly Detection through Univariate with PCA in Wireless Sensor Networks.
TrustCom
(2011)
Biming Tian
,
Song Han
,
Jiankun Hu
,
Tharam S. Dillon
A mutual-healing key distribution scheme in wireless sensor networks.
J. Netw. Comput. Appl.
34 (1) (2011)
Song Han
,
Biming Tian
,
Yuting Zhang
,
Jiankun Hu
An Efficient Self-Healing Key Distribution Scheme with Constant-Size Personal Keys for Wireless Sensor Networks.
ICC
(2010)
Irfan Syamsuddin
,
Tharam S. Dillon
,
Elizabeth Chang
,
Song Han
A Survey of RFID Authentication Protocols Based on Hash-Chain Method
CoRR
(2010)
Sazia Parvin
,
Song Han
,
Biming Tian
,
Farookh Khadeer Hussain
Trust-Based Authentication for Secure Communication in Cognitive Radio Networks.
EUC
(2010)
Sazia Parvin
,
Song Han
,
Li Gao
,
Farookh Khadeer Hussain
,
Elizabeth Chang
Towards Trust Establishment for Spectrum Selection in Cognitive Radio Networks.
AINA
(2010)
Sazia Parvin
,
Song Han
,
Farookh Khadeer Hussain
,
Mohammad Abdullah Al Faruque
Trust based security for cognitive radio networks.
iiWAS
(2010)
Li Gao
,
Elizabeth Chang
,
Sazia Parvin
,
Song Han
,
Tharam S. Dillon
A Secure Key Management Model for Wireless Mesh Networks.
AINA
(2010)
Biming Tian
,
Song Han
,
Sazia Parvin
,
Tharam S. Dillon
A Key Management Protocol for Multiphase Hierarchical Wireless Sensor Networks.
EUC
(2010)
Biming Tian
,
Elizabeth Chang
,
Tharam S. Dillon
,
Song Han
,
Farookh Khadeer Hussain
An Authenticated Self-Healing Key Distribution Scheme Based on Bilinear Pairings.
CCNC
(2009)
Song Han
,
Tharam S. Dillon
,
Elizabeth Chang
,
Biming Tian
Secure web services using two-way authentication and three-party key establishment for service delivery.
J. Syst. Archit.
55 (4) (2009)
Sazia Parvin
,
Shohrab Ali
,
Song Han
,
Tharam S. Dillon
Security against DOS attack in mobile IP communication.
SIN
(2009)
Song Han
,
Biming Tian
,
Mingxing He
,
Elizabeth Chang
Efficient threshold self-healing key distribution with sponsorization for infrastructureless wireless networks.
IEEE Trans. Wirel. Commun.
8 (4) (2009)
Biming Tian
,
Song Han
,
Tharam S. Dillon
A Key Management Scheme for Heterogeneous Sensor Networks Using Keyed-Hash Chain.
MSN
(2009)
Song Han
,
Elizabeth Chang
,
Tharam S. Dillon
Pairing-based public-key encryption schemes with backward-and-forward security.
Comput. Syst. Sci. Eng.
23 (4) (2008)
Biming Tian
,
Song Han
,
Tharam S. Dillon
An Efficient Self-Healing Key Distribution Scheme.
NTMS
(2008)
Biming Tian
,
Song Han
,
Tharam S. Dillon
,
Sajal K. Das
A self-healing key distribution scheme based on vector space secret sharing and one way hash chains.
WOWMOM
(2008)
Biming Tian
,
Song Han
,
Tharam S. Dillon
A Self-Healing and Mutual-Healing Key Distribution Scheme Using Bilinear Pairings for Wireless Networks.
EUC (2)
(2008)
Song Han
,
Elizabeth Chang
,
Tharam S. Dillon
Pairing-based public-key encryption schemes with backward-and-forward security.
Comput. Syst. Sci. Eng.
23 (1) (2008)
Song Han
,
Vidyasagar M. Potdar
,
Elizabeth Chang
Mutual Authentication Protocol for RFID Tags Based on Synchronized Secret Information with Monitor.
ICCSA (3)
(2007)
Song Han
,
Vidyasagar M. Potdar
,
Elizabeth Chang
,
Tharam S. Dillon
Privacy-Preserving Transactions Protocol Using Mobile Agents with Mutual Authentication.
Int. J. Inf. Secur. Priv.
1 (1) (2007)
Song Han
,
Tharam S. Dillon
,
Elizabeth Chang
Anonymous Mutual Authentication Protocol for RFID Tag Without Back-End Database.
MSN
(2007)
Geoff Skinner
,
Song Han
,
Elizabeth Chang
Defining and Protecting Meta Privacy: A New Conceptual Framework Within Information Privacy.
ICDE Workshops
(2006)
Song Han
,
Geoff Skinner
,
Vidyasagar M. Potdar
,
Elizabeth Chang
A framework of authentication and authorization for e-health services.
SWS
(2006)
Geoff Skinner
,
Song Han
,
Elizabeth Chang
An information privacy taxonomy for collaborative environments.
Inf. Manag. Comput. Secur.
14 (4) (2006)
Song Han
,
Elizabeth Chang
,
Tharam S. Dillon
,
Jie Wang
Improvement of a Convertible Undeniable Partially Blind Signature Scheme.
AINA (1)
(2006)
Vidyasagar M. Potdar
,
Song Han
,
Elizabeth Chang
,
Chen Wu
Subjective and Objective Watermark Detection Using a Novel Approach - Barcode Watermarking.
CIS
(2006)
Geoff Skinner
,
Song Han
,
Elizabeth Chang
A Framework of Privacy Shield in Organizational Information Systems.
ICMB
(2005)
Song Han
,
Elizabeth Chang
,
Tharam S. Dillon
Secure Electronic Commerce with Mobile Agents.
SEKE
(2005)
Geoff Skinner
,
Song Han
,
Elizabeth Chang
A New Conceptual Framework Within Information Privacy: Meta Privacy.
CIS (2)
(2005)
Song Han
,
Elizabeth Chang
,
Xiaotie Deng
,
Winson K. Y. Yeung
,
Li Gao
Practical Fair Anonymous Undeniable Signatures.
International Conference on Computational Intelligence
(2004)
Song Han
,
Jie Wang
,
Wanquan Liu
An Efficient Identity-Based Group Signature Scheme over Elliptic Curves.
ECUMN
(2004)
Song Han
,
Winson K. Y. Yeung
,
Jie Wang
Identity-based confirmer signatures from pairings over elliptic curves.
EC
(2003)
Winson K. Y. Yeung
,
Song Han
Revocable Anonymity of Undeniable Signature Scheme.
IDEAL
(2003)