


default search action
Song Han 0004
Person information
- affiliation: Curtin University, School of Information Systems, Perth, Australia
- affiliation: Peking University, Department of Mathematics, Beijing, China
Other persons with the same name
- Song Han — disambiguation page
- Song Han 0001
— Yanshan University, Institute of Electrical Engineering, Qinhuangdao, China
- Song Han 0002
— University of Connecticut, Department of Computer Science and Engineering, Storrs, CT, USA (and 2 more)
- Song Han 0003
— Massachusetts Institute of Technology, Cambridge, MA, USA (and 1 more)
- Song Han 0005 — Kim Il Sung University, Pyongyang, North Korea
- Song Han 0006
— Zhejiang Gongshang University, Hangzhou, Zhejiang, China (and 1 more)
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2013
- [j14]Song Han, Tharam S. Dillon, Vidy Potdar, Elizabeth Chang:
RFID mutual authentication protocols for tags and readers with and without a server. Comput. Syst. Sci. Eng. 28(2) (2013) - 2012
- [j13]Biming Tian, Song Han, Sazia Parvin
, Jiankun Hu
, Sajal K. Das
:
Erratum: Self-Healing Key Distribution Schemes for Wireless Networks: A Survey. Comput. J. 55(4): 438 (2012) - [j12]Biming Tian, Song Han, Liu Liu
, Saghar Khadem, Sazia Parvin
:
Towards enhanced key management in multi-phase ZigBee network architecture. Comput. Commun. 35(5): 579-588 (2012) - [j11]Sazia Parvin
, Farookh Khadeer Hussain, Omar Khadeer Hussain
, Song Han, Biming Tian, Elizabeth Chang
:
Cognitive radio network security: A survey. J. Netw. Comput. Appl. 35(6): 1691-1708 (2012) - [c31]Sazia Parvin
, Song Han, Zia ur Rehman
, Mohammad Abdullah Al Faruque, Farookh Khadeer Hussain:
A New Identity-Based Group Signature Scheme Based on Knapsack ECC. IMIS 2012: 73-80 - 2011
- [j10]Biming Tian, Song Han, Sazia Parvin
, Jiankun Hu
, Sajal K. Das
:
Self-Healing Key Distribution Schemes for Wireless Networks: A Survey. Comput. J. 54(4): 549-569 (2011) - [j9]Biming Tian, Song Han, Jiankun Hu
, Tharam S. Dillon:
A mutual-healing key distribution scheme in wireless sensor networks. J. Netw. Comput. Appl. 34(1): 80-88 (2011) - [j8]Miao Xie, Song Han, Biming Tian, Sazia Parvin
:
Anomaly detection in wireless sensor networks: A survey. J. Netw. Comput. Appl. 34(4): 1302-1325 (2011) - [j7]Sazia Parvin
, Farookh Khadeer Hussain, Song Han, Omar Khadeer Hussain
:
Trust-Based Spectrum Sharing for Cognitive Radio Networks. J. Interconnect. Networks 12(3): 155-171 (2011) - [c30]Sazia Parvin
, Song Han, Farookh Khadeer Hussain, Biming Tian:
A Combinational Approach for Trust Establishment in Cognitive Radio Networks. CISIS 2011: 227-232 - [c29]Biming Tian, Song Han, Sazia Parvin, Miao Xie:
Generalized hash-binary-tree based self-healing key distribution with implicit authentication. IWCMC 2011: 213-219 - [c28]Miao Xie, Song Han, Biming Tian:
Highly Efficient Distance-Based Anomaly Detection through Univariate with PCA in Wireless Sensor Networks. TrustCom 2011: 564-571 - 2010
- [c27]Sazia Parvin
, Song Han, Li Gao, Farookh Khadeer Hussain, Elizabeth Chang
:
Towards Trust Establishment for Spectrum Selection in Cognitive Radio Networks. AINA 2010: 579-583 - [c26]Li Gao, Elizabeth Chang
, Sazia Parvin
, Song Han, Tharam S. Dillon:
A Secure Key Management Model for Wireless Mesh Networks. AINA 2010: 655-660 - [c25]Sazia Parvin
, Song Han, Biming Tian, Farookh Khadeer Hussain:
Trust-Based Authentication for Secure Communication in Cognitive Radio Networks. EUC 2010: 589-596 - [c24]Biming Tian, Song Han, Sazia Parvin
, Tharam S. Dillon:
A Key Management Protocol for Multiphase Hierarchical Wireless Sensor Networks. EUC 2010: 617-623 - [c23]Song Han, Biming Tian, Yuting Zhang, Jiankun Hu
:
An Efficient Self-Healing Key Distribution Scheme with Constant-Size Personal Keys for Wireless Sensor Networks. ICC 2010: 1-5 - [c22]Sazia Parvin
, Song Han, Farookh Khadeer Hussain, Mohammad Abdullah Al Faruque
:
Trust based security for cognitive radio networks. iiWAS 2010: 743-748 - [i1]Irfan Syamsuddin, Tharam S. Dillon, Elizabeth Chang, Song Han:
A Survey of RFID Authentication Protocols Based on Hash-Chain Method. CoRR abs/1008.2452 (2010)
2000 – 2009
- 2009
- [j6]Song Han, Tharam S. Dillon, Elizabeth Chang
, Biming Tian:
Secure web services using two-way authentication and three-party key establishment for service delivery. J. Syst. Archit. 55(4): 233-242 (2009) - [j5]Song Han, Biming Tian, Mingxing He, Elizabeth Chang
:
Efficient threshold self-healing key distribution with sponsorization for infrastructureless wireless networks. IEEE Trans. Wirel. Commun. 8(4): 1876-1887 (2009) - [c21]Biming Tian, Elizabeth Chang
, Tharam S. Dillon, Song Han, Farookh Khadeer Hussain:
An Authenticated Self-Healing Key Distribution Scheme Based on Bilinear Pairings. CCNC 2009: 1-5 - [c20]Biming Tian, Song Han, Tharam S. Dillon:
A Key Management Scheme for Heterogeneous Sensor Networks Using Keyed-Hash Chain. MSN 2009: 448-456 - [c19]Sazia Parvin
, Shohrab Ali, Song Han, Tharam S. Dillon:
Security against DOS attack in mobile IP communication. SIN 2009: 152-157 - 2008
- [j4]Song Han, Elizabeth Chang, Tharam S. Dillon:
Pairing-based public-key encryption schemes with backward-and-forward security. Comput. Syst. Sci. Eng. 23(1) (2008) - [j3]Song Han, Elizabeth Chang, Tharam S. Dillon:
Pairing-based public-key encryption schemes with backward-and-forward security. Comput. Syst. Sci. Eng. 23(4) (2008) - [c18]Biming Tian, Song Han, Tharam S. Dillon:
A Self-Healing and Mutual-Healing Key Distribution Scheme Using Bilinear Pairings for Wireless Networks. EUC (2) 2008: 208-215 - [c17]Biming Tian, Song Han, Tharam S. Dillon:
An Efficient Self-Healing Key Distribution Scheme. NTMS 2008: 1-5 - [c16]Biming Tian, Song Han, Tharam S. Dillon, Sajal K. Das
:
A self-healing key distribution scheme based on vector space secret sharing and one way hash chains. WOWMOM 2008: 1-6 - 2007
- [j2]Song Han, Vidyasagar M. Potdar, Elizabeth Chang
, Tharam S. Dillon:
Privacy-Preserving Transactions Protocol Using Mobile Agents with Mutual Authentication. Int. J. Inf. Secur. Priv. 1(1): 35-46 (2007) - [c15]Song Han, Vidyasagar M. Potdar, Elizabeth Chang
:
Mutual Authentication Protocol for RFID Tags Based on Synchronized Secret Information with Monitor. ICCSA (3) 2007: 227-238 - [c14]Song Han, Tharam S. Dillon, Elizabeth Chang
:
Anonymous Mutual Authentication Protocol for RFID Tag Without Back-End Database. MSN 2007: 623-632 - [p1]Song Han, Elizabeth Chang
, Tharam S. Dillon:
Secure E-Transactions Protocol using Intelligent Mobile Agents with Fair Privacy. E-Service Intelligence 2007: 307-326 - 2006
- [j1]Geoff Skinner
, Song Han, Elizabeth Chang
:
An information privacy taxonomy for collaborative environments. Inf. Manag. Comput. Secur. 14(4): 382-394 (2006) - [c13]Song Han, Elizabeth Chang
, Tharam S. Dillon, Jie Wang:
Improvement of a Convertible Undeniable Partially Blind Signature Scheme. AINA (1) 2006: 875-882 - [c12]Vidyasagar M. Potdar, Song Han, Elizabeth Chang
, Chen Wu:
Subjective and Objective Watermark Detection Using a Novel Approach - Barcode Watermarking. CIS 2006: 576-586 - [c11]Geoff Skinner
, Song Han, Elizabeth Chang
:
Defining and Protecting Meta Privacy: A New Conceptual Framework Within Information Privacy. ICDE Workshops 2006: 101 - [c10]Feng Zou, Fu Lee Wang, Xiaotie Deng, Song Han:
Evaluation of Stop Word Lists in Chinese Language. LREC 2006: 2497-2500 - [c9]Song Han, Geoff Skinner
, Vidyasagar M. Potdar
, Elizabeth Chang
:
A framework of authentication and authorization for e-health services. SWS 2006: 105-106 - 2005
- [c8]Geoff Skinner
, Song Han, Elizabeth Chang
:
A New Conceptual Framework Within Information Privacy: Meta Privacy. CIS (2) 2005: 55-61 - [c7]Geoff Skinner
, Song Han, Elizabeth Chang
:
A Framework of Privacy Shield in Organizational Information Systems. ICMB 2005: 647-650 - [c6]Song Han, Elizabeth Chang, Tharam S. Dillon:
Secure Electronic Commerce with Mobile Agents. SEKE 2005: 777-782 - 2004
- [c5]Song Han, Jie Wang, Wanquan Liu:
An Efficient Identity-Based Group Signature Scheme over Elliptic Curves. ECUMN 2004: 417-429 - [c4]Song Han, Elizabeth Chang, Xiaotie Deng, Winson K. Y. Yeung, Li Gao:
Practical Fair Anonymous Undeniable Signatures. International Conference on Computational Intelligence 2004: 510-515 - [c3]Song Han, Wanquan Liu:
Committal deniable signatures over elliptic curves. IPCCC 2004: 833-839 - 2003
- [c2]Winson K. Y. Yeung, Song Han:
Revocable Anonymity of Undeniable Signature Scheme. IDEAL 2003: 76-83 - [c1]Song Han, Winson K. Y. Yeung, Jie Wang:
Identity-based confirmer signatures from pairings over elliptic curves. EC 2003: 262-263
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-20 19:41 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint