Detecting and blocking unauthorized access in Wi-Fi networks H Xia, J Brustoloni International Conference on Research in Networking, 795-806, 2004 | 55 | 2004 |
Enforcement of security policy compliance in virtual private networks H Xia, J Kanchana, JC Brustoloni SSI 2005, 8-11, 2005 | 2 | 2005 |
Evaluating DSTM—An IPv6 Transition Mechanism for IPv6 Dominant Networks H Xia, J Bound, Y Pouffary Citeseer, 1994 | 2 | 1994 |
Hardening web browsers against man-in-the-middle and eavesdropping attacks H Xia, JC Brustoloni Proceedings of the 14th international conference on World Wide Web, 489-498, 2005 | 136 | 2005 |
Improving the usability of web browser security H Xia, JC Brustoloni Symposium on Usable Privacy and Security (SOUP), 6-8, 0 | 1 | |
Secure and flexible support for visitors in enterprise wi-fi networks H Xia, JC Brustoloni GLOBECOM'05. IEEE Global Telecommunications Conference, 2005. 5, 6 pp.-2652, 2005 | 1 | 2005 |
The evaluation of DSTM: An IPv6 transition mechanism H Xia, J Bound, Y Pouffary | 2 | |
Using secure coprocessors to enforce network access policies in enterprise and ad hoc networks H Xia University of Pittsburgh, 2008 | | 2008 |
Using secure coprocessors to protect access to enterprise networks H Xia, J Kanchana, JC Brustoloni NETWORKING 2005. Networking Technologies, Services, and Protocols …, 2005 | 44 | 2005 |
Virtual prepaid tokens for Wi-Fi hotspot access H Xia, J Brustoloni 29th Annual IEEE International Conference on Local Computer Networks, 232-239, 2004 | 13 | 2004 |
WC04. 2 Secure and Flexible Support for Visitors in Enterprise Wi-Fi Networks H Xia, JC Brustoloni GLOBECOM-NEW YORK- 5 (1), 2647-2652, 2003 | | 2003 |