BibTeX records: Donggang Liu

download as .bib file

@inproceedings{DBLP:conf/ciss/RumeeLL17,
  author       = {Sarker T. Ahmed Rumee and
                  Donggang Liu and
                  Yu Lei},
  title        = {MirrorDroid: {A} framework to detect sensitive information leakage
                  in Android by duplicate program execution},
  booktitle    = {51st Annual Conference on Information Sciences and Systems, {CISS}
                  2017, Baltimore, MD, USA, March 22-24, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CISS.2017.7926086},
  doi          = {10.1109/CISS.2017.7926086},
  timestamp    = {Fri, 15 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ciss/RumeeLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JunaidLK16,
  author       = {Mohsin Junaid and
                  Donggang Liu and
                  David Chenho Kung},
  title        = {Dexteroid: Detecting malicious behaviors in Android apps using reverse-engineered
                  life cycle models},
  journal      = {Comput. Secur.},
  volume       = {59},
  pages        = {92--117},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2016.01.008},
  doi          = {10.1016/J.COSE.2016.01.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JunaidLK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/JunaidLK15,
  author       = {Mohsin Junaid and
                  Donggang Liu and
                  David Chenho Kung},
  title        = {Dexteroid: Detecting Malicious Behaviors in Android Apps Using Reverse-Engineered
                  Life Cycle Models},
  journal      = {CoRR},
  volume       = {abs/1506.05217},
  year         = {2015},
  url          = {http://arxiv.org/abs/1506.05217},
  eprinttype    = {arXiv},
  eprint       = {1506.05217},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/JunaidLK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/ZhangLCKL14,
  author       = {Dazhi Zhang and
                  Donggang Liu and
                  Christoph Csallner and
                  David Chenho Kung and
                  Yu Lei},
  title        = {A distributed framework for demand-driven software vulnerability detection},
  journal      = {J. Syst. Softw.},
  volume       = {87},
  pages        = {60--73},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jss.2013.08.033},
  doi          = {10.1016/J.JSS.2013.08.033},
  timestamp    = {Wed, 10 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/ZhangLCKL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/percom/RajLLWD14,
  author       = {Mayank Raj and
                  Na Li and
                  Donggang Liu and
                  Matthew K. Wright and
                  Sajal K. Das},
  title        = {Using data mules to preserve source location privacy in Wireless Sensor
                  Networks},
  journal      = {Pervasive Mob. Comput.},
  volume       = {11},
  pages        = {244--260},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.pmcj.2012.10.002},
  doi          = {10.1016/J.PMCJ.2012.10.002},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/percom/RajLLWD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/RahmanWL14,
  author       = {Nabila Rahman and
                  Matthew K. Wright and
                  Donggang Liu},
  title        = {Fast and energy-efficient technique for jammed region mapping in wireless
                  sensor networks},
  journal      = {CoRR},
  volume       = {abs/1401.7002},
  year         = {2014},
  url          = {http://arxiv.org/abs/1401.7002},
  eprinttype    = {arXiv},
  eprint       = {1401.7002},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/RahmanWL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tecs/DongLN13,
  author       = {Qi Dong and
                  Donggang Liu and
                  Peng Ning},
  title        = {Providing DoS resistance for signature-based broadcast authentication
                  in sensor networks},
  journal      = {{ACM} Trans. Embed. Comput. Syst.},
  volume       = {12},
  number       = {3},
  pages        = {73:1--73:26},
  year         = {2013},
  url          = {https://doi.org/10.1145/2442116.2442123},
  doi          = {10.1145/2442116.2442123},
  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tecs/DongLN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/DongLW13,
  author       = {Qi Dong and
                  Donggang Liu and
                  Matthew K. Wright},
  title        = {Mitigating jamming attacks in wireless broadcast systems},
  journal      = {Wirel. Networks},
  volume       = {19},
  number       = {8},
  pages        = {1867--1880},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11276-013-0574-0},
  doi          = {10.1007/S11276-013-0574-0},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/DongLW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcsw/NaziLD13,
  author       = {Azade Nazi and
                  Donggang Liu and
                  Sajal K. Das},
  title        = {Privacy Preserving Query Answering in Peer Data Management Systems},
  booktitle    = {33rd International Conference on Distributed Computing Systems Workshops
                  {(ICDCS} 2013 Workshops), Philadelphia, PA, USA, 8-11 July, 2013},
  pages        = {64--69},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICDCSW.2013.46},
  doi          = {10.1109/ICDCSW.2013.46},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcsw/NaziLD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipps/MeiLSX13,
  author       = {Xiaowei Mei and
                  Donggang Liu and
                  Kun Sun and
                  Dingbang Xu},
  title        = {On Feasibility of Fingerprinting Wireless Sensor Nodes Using Physical
                  Properties},
  booktitle    = {27th {IEEE} International Symposium on Parallel and Distributed Processing,
                  {IPDPS} 2013, Cambridge, MA, USA, May 20-24, 2013},
  pages        = {1112--1121},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/IPDPS.2013.15},
  doi          = {10.1109/IPDPS.2013.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipps/MeiLSX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/RumeeL13,
  author       = {Sarker T. Ahmed Rumee and
                  Donggang Liu},
  editor       = {Yvo Desmedt},
  title        = {DroidTest: Testing Android Applications for Leakage of Private Information},
  booktitle    = {Information Security, 16th International Conference, {ISC} 2013, Dallas,
                  Texas, USA, November 13-15, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7807},
  pages        = {341--353},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-27659-5\_24},
  doi          = {10.1007/978-3-319-27659-5\_24},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/RumeeL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/ZhangLLKCNW12,
  author       = {Dazhi Zhang and
                  Donggang Liu and
                  Yu Lei and
                  David Chenho Kung and
                  Christoph Csallner and
                  Nathaniel Nystrom and
                  Wenhua Wang},
  title        = {SimFuzz: Test case similarity directed deep fuzzing},
  journal      = {J. Syst. Softw.},
  volume       = {85},
  number       = {1},
  pages        = {102--111},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.jss.2011.07.028},
  doi          = {10.1016/J.JSS.2011.07.028},
  timestamp    = {Wed, 10 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/ZhangLLKCNW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tecs/DongL12,
  author       = {Qi Dong and
                  Donggang Liu},
  title        = {Using Auxiliary Sensors for Pairwise Key Establishment in {WSN}},
  journal      = {{ACM} Trans. Embed. Comput. Syst.},
  volume       = {11},
  number       = {3},
  pages        = {59:1--59:31},
  year         = {2012},
  url          = {https://doi.org/10.1145/2345770.2345771},
  doi          = {10.1145/2345770.2345771},
  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tecs/DongL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/MehtaLW12,
  author       = {Kiran Mehta and
                  Donggang Liu and
                  Matthew K. Wright},
  title        = {Protecting Location Privacy in Sensor Networks against a Global Eavesdropper},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {11},
  number       = {2},
  pages        = {320--336},
  year         = {2012},
  url          = {https://doi.org/10.1109/TMC.2011.32},
  doi          = {10.1109/TMC.2011.32},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmc/MehtaLW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/SiddhabathulaDLW12,
  author       = {Kartik Siddhabathula and
                  Qi Dong and
                  Donggang Liu and
                  Matthew K. Wright},
  title        = {Fast jamming detection in sensor networks},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2012, Ottawa, ON, Canada, June 10-15, 2012},
  pages        = {934--938},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICC.2012.6363672},
  doi          = {10.1109/ICC.2012.6363672},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/SiddhabathulaDLW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcn/LiRLWD12,
  author       = {Na Li and
                  Mayank Raj and
                  Donggang Liu and
                  Matthew K. Wright and
                  Sajal K. Das},
  editor       = {Luciano Bononi and
                  Ajoy Kumar Datta and
                  St{\'{e}}phane Devismes and
                  Archan Misra},
  title        = {Using Data Mules to Preserve Source Location Privacy in Wireless Sensor
                  Networks},
  booktitle    = {Distributed Computing and Networking - 13th International Conference,
                  {ICDCN} 2012, Hong Kong, China, January 3-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7129},
  pages        = {309--324},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-25959-3\_23},
  doi          = {10.1007/978-3-642-25959-3\_23},
  timestamp    = {Mon, 26 Jun 2023 20:44:19 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcn/LiRLWD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mass/LiuRF12,
  author       = {Donggang Liu and
                  Joshua Raymer and
                  Andy Fox},
  title        = {Efficient and timely jamming detection in wireless sensor networks},
  booktitle    = {9th {IEEE} International Conference on Mobile Ad-Hoc and Sensor Systems,
                  {MASS} 2012, Las Vegas, NV, USA, October 8-11, 2012},
  pages        = {335--343},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/MASS.2012.6502533},
  doi          = {10.1109/MASS.2012.6502533},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mass/LiuRF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ahswn/LiuD11,
  author       = {Donggang Liu and
                  Qi Dong},
  title        = {Hardening Embedded Networking Devices Against Side-Channel Attacks},
  journal      = {Ad Hoc Sens. Wirel. Networks},
  volume       = {12},
  number       = {1-2},
  pages        = {103--124},
  year         = {2011},
  url          = {http://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-12-number-1-2-2011/ahswn-12-1-2-p-103-124/},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ahswn/LiuD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/WangLLKCZKK11,
  author       = {Wenhua Wang and
                  Yu Lei and
                  Donggang Liu and
                  David Chenho Kung and
                  Christoph Csallner and
                  Dazhi Zhang and
                  Raghu Kacker and
                  Rick Kuhn},
  title        = {A combinatorial approach to detecting buffer overflow vulnerabilities},
  booktitle    = {Proceedings of the 2011 {IEEE/IFIP} International Conference on Dependable
                  Systems and Networks, {DSN} 2011, Hong Kong, China, June 27-30 2011},
  pages        = {269--278},
  publisher    = {{IEEE} Compute Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/DSN.2011.5958225},
  doi          = {10.1109/DSN.2011.5958225},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/WangLLKCZKK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Liu11,
  author       = {Donggang Liu},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Broadcast Authentication from a Conditional Perspective},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {168--170},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_629},
  doi          = {10.1007/978-1-4419-5906-5\_629},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Liu11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Liu11a,
  author       = {Donggang Liu},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Node Clone Defense},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {844--846},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_634},
  doi          = {10.1007/978-1-4419-5906-5\_634},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Liu11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Liu11b,
  author       = {Donggang Liu},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Probabilistic Key Sharing},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {978--980},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_636},
  doi          = {10.1007/978-1-4419-5906-5\_636},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Liu11b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Liu11c,
  author       = {Donggang Liu},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Secure Localization},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1119--1121},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_640},
  doi          = {10.1007/978-1-4419-5906-5\_640},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Liu11c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/Liu10,
  author       = {Donggang Liu},
  title        = {Efficient and distributed access control for sensor networks},
  journal      = {Wirel. Networks},
  volume       = {16},
  number       = {8},
  pages        = {2151--2167},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11276-010-0249-z},
  doi          = {10.1007/S11276-010-0249-Z},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/Liu10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/ZhangLLKCW10,
  author       = {Dazhi Zhang and
                  Donggang Liu and
                  Yu Lei and
                  David Chenho Kung and
                  Christoph Csallner and
                  Wenhua Wang},
  title        = {Detecting vulnerabilities in {C} programs using trace-based testing},
  booktitle    = {Proceedings of the 2010 {IEEE/IFIP} International Conference on Dependable
                  Systems and Networks, {DSN} 2010, Chicago, IL, USA, June 28 - July
                  1 2010},
  pages        = {241--250},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/DSN.2010.5544310},
  doi          = {10.1109/DSN.2010.5544310},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/ZhangLLKCW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/ZhangL10,
  author       = {Dazhi Zhang and
                  Donggang Liu},
  title        = {DataGuard: Dynamic data attestation in wireless sensor networks},
  booktitle    = {Proceedings of the 2010 {IEEE/IFIP} International Conference on Dependable
                  Systems and Networks, {DSN} 2010, Chicago, IL, USA, June 28 - July
                  1 2010},
  pages        = {261--270},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/DSN.2010.5544307},
  doi          = {10.1109/DSN.2010.5544307},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/ZhangL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/DongL10,
  author       = {Qi Dong and
                  Donggang Liu},
  title        = {Adaptive Jamming-Resistant Broadcast Systems with Partial Channel
                  Sharing},
  booktitle    = {2010 International Conference on Distributed Computing Systems, {ICDCS}
                  2010, Genova, Italy, June 21-25, 2010},
  pages        = {428--437},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICDCS.2010.25},
  doi          = {10.1109/ICDCS.2010.25},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/DongL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/HoLWD09,
  author       = {Jun{-}Won Ho and
                  Donggang Liu and
                  Matthew K. Wright and
                  Sajal K. Das},
  title        = {Distributed detection of replica node attacks with group deployment
                  knowledge in wireless sensor networks},
  journal      = {Ad Hoc Networks},
  volume       = {7},
  number       = {8},
  pages        = {1476--1488},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.adhoc.2009.04.008},
  doi          = {10.1016/J.ADHOC.2009.04.008},
  timestamp    = {Tue, 10 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/HoLWD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/Liu09,
  author       = {Donggang Liu},
  title        = {Protecting Neighbor Discovery Against Node Compromises in Sensor Networks},
  booktitle    = {29th {IEEE} International Conference on Distributed Computing Systems
                  {(ICDCS} 2009), 22-26 June 2009, Montreal, Qu{\'{e}}bec, Canada},
  pages        = {579--588},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICDCS.2009.10},
  doi          = {10.1109/ICDCS.2009.10},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/Liu09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipps/LiuD09,
  author       = {Donggang Liu and
                  Qi Dong},
  title        = {Combating side-channel attacks using key management},
  booktitle    = {23rd {IEEE} International Symposium on Parallel and Distributed Processing,
                  {IPDPS} 2009, Rome, Italy, May 23-29, 2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/IPDPS.2009.5161248},
  doi          = {10.1109/IPDPS.2009.5161248},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipps/LiuD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/HoLWD09,
  author       = {Jun{-}Won Ho and
                  Donggang Liu and
                  Matthew K. Wright and
                  Sajal K. Das},
  title        = {Distributed Detection of Replicas with Deployment Knowledge in Wireless
                  Sensor Networks},
  booktitle    = {Seventh Annual {IEEE} International Conference on Pervasive Computing
                  and Communications - Workshops (PerCom Workshops 2009), 9-13 March
                  2009, Galveston, TX, {USA}},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/PERCOM.2009.4912865},
  doi          = {10.1109/PERCOM.2009.4912865},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/HoLWD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secon/DongL09,
  author       = {Qi Dong and
                  Donggang Liu},
  title        = {Resilient Cluster Leader Election for Wireless Sensor Networks},
  booktitle    = {Proceedings of the Sixth Annual {IEEE} Communications Society Conference
                  on Sensor, Mesh and Ad Hoc Communications and Networks, {SECON} 2009,
                  June 22-26, 2009, Rome, Italy},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/SAHCN.2009.5168966},
  doi          = {10.1109/SAHCN.2009.5168966},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/secon/DongL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LiuNLWD08,
  author       = {Donggang Liu and
                  Peng Ning and
                  An Liu and
                  Cliff Wang and
                  Wenliang Du},
  title        = {Attack-Resistant Location Estimation in Wireless Sensor Networks},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {11},
  number       = {4},
  pages        = {22:1--22:39},
  year         = {2008},
  url          = {https://doi.org/10.1145/1380564.1380570},
  doi          = {10.1145/1380564.1380570},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/LiuNLWD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosn/LiuND08,
  author       = {Donggang Liu and
                  Peng Ning and
                  Wenliang Du},
  title        = {Group-based key predistribution for wireless sensor networks},
  journal      = {{ACM} Trans. Sens. Networks},
  volume       = {4},
  number       = {2},
  pages        = {11:1--11:30},
  year         = {2008},
  url          = {https://doi.org/10.1145/1340771.1340777},
  doi          = {10.1145/1340771.1340777},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosn/LiuND08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issre/ZhangWLLK08,
  author       = {Dazhi Zhang and
                  Wenhua Wang and
                  Donggang Liu and
                  Yu Lei and
                  David Chenho Kung},
  title        = {Reusing Existing Test Cases for Security Testing},
  booktitle    = {19th International Symposium on Software Reliability Engineering {(ISSRE}
                  2008), 11-14 November 2008, Seattle/Redmond, WA, {USA}},
  pages        = {323--324},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISSRE.2008.55},
  doi          = {10.1109/ISSRE.2008.55},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issre/ZhangWLLK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/OuyangLLFM08,
  author       = {Yi Ouyang and
                  Zhengyi Le and
                  Donggang Liu and
                  James Ford and
                  Fillia Makedon},
  editor       = {Albert Levi and
                  Peng Liu and
                  Refik Molva},
  title        = {Source location privacy against laptop-class attacks in sensor networks},
  booktitle    = {4th International {ICST} Conference on Security and Privacy in Communication
                  Networks, {SECURECOMM} 2008, Istanbul, Turkey, September 22-25, 2008},
  pages        = {5},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1460877.1460884},
  doi          = {10.1145/1460877.1460884},
  timestamp    = {Fri, 11 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/OuyangLLFM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/DongLN08,
  author       = {Qi Dong and
                  Donggang Liu and
                  Peng Ning},
  editor       = {Virgil D. Gligor and
                  Jean{-}Pierre Hubaux and
                  Radha Poovendran},
  title        = {Pre-authentication filters: providing dos resistance for signature-based
                  broadcast authentication in sensor networks},
  booktitle    = {Proceedings of the First {ACM} Conference on Wireless Network Security,
                  {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008},
  pages        = {2--12},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1352533.1352536},
  doi          = {10.1145/1352533.1352536},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/DongLN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/LiuN07,
  author       = {Donggang Liu and
                  Peng Ning},
  title        = {Security for Wireless Sensor Networks},
  series       = {Advances in Information Security},
  volume       = {28},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-46781-8},
  doi          = {10.1007/978-0-387-46781-8},
  isbn         = {978-0-387-32723-5},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/LiuN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/ZhuYLSJ07,
  author       = {Sencun Zhu and
                  Chao Yao and
                  Donggang Liu and
                  Sanjeev Setia and
                  Sushil Jajodia},
  title        = {Efficient security mechanisms for overlay multicast based content
                  delivery},
  journal      = {Comput. Commun.},
  volume       = {30},
  number       = {4},
  pages        = {793--806},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.comcom.2006.10.003},
  doi          = {10.1016/J.COMCOM.2006.10.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/ZhuYLSJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dcoss/Liu07,
  author       = {Donggang Liu},
  editor       = {James Aspnes and
                  Christian Scheideler and
                  Anish Arora and
                  Samuel Madden},
  title        = {Efficient and Distributed Access Control for Sensor Networks},
  booktitle    = {Distributed Computing in Sensor Systems, Third {IEEE} International
                  Conference, {DCOSS} 2007, Santa Fe, NM, USA, June 18-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4549},
  pages        = {21--35},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73090-3\_2},
  doi          = {10.1007/978-3-540-73090-3\_2},
  timestamp    = {Wed, 09 Aug 2023 12:14:21 +0200},
  biburl       = {https://dblp.org/rec/conf/dcoss/Liu07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/Liu07,
  author       = {Donggang Liu},
  title        = {Resilient Cluster Formation for Sensor Networks},
  booktitle    = {27th {IEEE} International Conference on Distributed Computing Systems
                  {(ICDCS} 2007), June 25-29, 2007, Toronto, Ontario, Canada},
  pages        = {40},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICDCS.2007.131},
  doi          = {10.1109/ICDCS.2007.131},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/Liu07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/MehtaLW07,
  author       = {Kiran Mehta and
                  Donggang Liu and
                  Matthew K. Wright},
  title        = {Location Privacy in Sensor Networks Against a Global Eavesdropper},
  booktitle    = {Proceedings of the {IEEE} International Conference on Network Protocols,
                  {ICNP} 2007, October 16-19, 2007, Beijing, China},
  pages        = {314--323},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICNP.2007.4375862},
  doi          = {10.1109/ICNP.2007.4375862},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnp/MehtaLW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipccc/LiuD07,
  author       = {Donggang Liu and
                  Qi Dong},
  title        = {Detecting Misused Keys in Wireless Sensor Networks},
  booktitle    = {Proceedings of the 26th {IEEE} International Performance Computing
                  and Communications Conference, {IPCCC} 2007, April 11-13, 2007, New
                  Orleans, Louisiana, {USA}},
  pages        = {272--280},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/PCCC.2007.358904},
  doi          = {10.1109/PCCC.2007.358904},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipccc/LiuD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/networking/DongL07,
  author       = {Qi Dong and
                  Donggang Liu},
  editor       = {Ian F. Akyildiz and
                  Raghupathy Sivakumar and
                  Eylem Ekici and
                  Jaudelice Cavalcante de Oliveira and
                  Janise McNair},
  title        = {Using Auxiliary Sensors for Pairwise Key Establishment in {WSN}},
  booktitle    = {{NETWORKING} 2007. Ad Hoc and Sensor Networks, Wireless Networks,
                  Next Generation Internet, 6th International {IFIP-TC6} Networking
                  Conference, Atlanta, GA, USA, May 14-18, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4479},
  pages        = {251--262},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72606-7\_22},
  doi          = {10.1007/978-3-540-72606-7\_22},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/networking/DongL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/NingLD07,
  author       = {Peng Ning and
                  Donggang Liu and
                  Wenliang Du},
  editor       = {Radha Poovendran and
                  Sumit Roy and
                  Cliff Wang},
  title        = {Secure and Resilient Localization in Wireless Sensor Networks},
  booktitle    = {Secure Localization and Time Synchronization for Wireless Sensor and
                  Ad Hoc Networks},
  series       = {Advances in Information Security},
  volume       = {30},
  pages        = {161--184},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-46276-9\_7},
  doi          = {10.1007/978-0-387-46276-9\_7},
  timestamp    = {Mon, 15 Jun 2020 07:44:16 +0200},
  biburl       = {https://dblp.org/rec/series/ais/NingLD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sasn/2006,
  editor       = {Sencun Zhu and
                  Donggang Liu},
  title        = {Proceedings of the 4th {ACM} Workshop on Security of ad hoc and Sensor
                  Networks, {SASN} 2006, Alexandria, VA, USA, October 30, 2006},
  publisher    = {{ACM}},
  year         = {2006},
  isbn         = {1-59593-554-1},
  timestamp    = {Thu, 07 Dec 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sasn/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LiuNL05,
  author       = {Donggang Liu and
                  Peng Ning and
                  Rongfang Li},
  title        = {Establishing pairwise keys in distributed sensor networks},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {8},
  number       = {1},
  pages        = {41--77},
  year         = {2005},
  url          = {https://doi.org/10.1145/1053283.1053287},
  doi          = {10.1145/1053283.1053287},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/LiuNL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosn/LiuN05,
  author       = {Donggang Liu and
                  Peng Ning},
  title        = {Improving key predistribution with deployment knowledge in static
                  sensor networks},
  journal      = {{ACM} Trans. Sens. Networks},
  volume       = {1},
  number       = {2},
  pages        = {204--239},
  year         = {2005},
  url          = {https://doi.org/10.1145/1105688.1105691},
  doi          = {10.1145/1105688.1105691},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosn/LiuN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ZhuYLSJ05,
  author       = {Sencun Zhu and
                  Chao Yao and
                  Donggang Liu and
                  Sanjeev Setia and
                  Sushil Jajodia},
  editor       = {John Ioannidis and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Efficient Security Mechanisms for Overlay Multicast-Based Content
                  Distribution},
  booktitle    = {Applied Cryptography and Network Security, Third International Conference,
                  {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3531},
  pages        = {40--55},
  year         = {2005},
  url          = {https://doi.org/10.1007/11496137\_4},
  doi          = {10.1007/11496137\_4},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/ZhuYLSJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/LiuND05,
  author       = {Donggang Liu and
                  Peng Ning and
                  Wenliang Du},
  title        = {Detecting Malicious Beacon Nodes for Secure Location Discovery in
                  Wireless Sensor Networks},
  booktitle    = {25th International Conference on Distributed Computing Systems {(ICDCS}
                  2005), 6-10 June 2005, Columbus, OH, {USA}},
  pages        = {609--619},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICDCS.2005.21},
  doi          = {10.1109/ICDCS.2005.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/LiuND05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipsn/LiuND05,
  author       = {Donggang Liu and
                  Peng Ning and
                  Wenliang Du},
  title        = {Attack-resistant location estimation in sensor networks},
  booktitle    = {Proceedings of the Fourth International Symposium on Information Processing
                  in Sensor Networks, {IPSN} 2005, April 25-27, 2005, UCLA, Los Angeles,
                  California, {USA}},
  pages        = {99--106},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/IPSN.2005.1440904},
  doi          = {10.1109/IPSN.2005.1440904},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/ipsn/LiuND05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobiquitous/LiuNZJ05,
  author       = {Donggang Liu and
                  Peng Ning and
                  Sencun Zhu and
                  Sushil Jajodia},
  title        = {Practical Broadcast Authentication in Sensor Networks},
  booktitle    = {2nd Annual International Conference on Mobile and Ubiquitous Systems
                  (MobiQuitous 2005), 17-21 July 2005, San Diego, CA, {USA}},
  pages        = {118--132},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/MOBIQUITOUS.2005.49},
  doi          = {10.1109/MOBIQUITOUS.2005.49},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobiquitous/LiuNZJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ws/LiuND05,
  author       = {Donggang Liu and
                  Peng Ning and
                  Wenliang Du},
  editor       = {Markus Jakobsson and
                  Radha Poovendran},
  title        = {Group-based key pre-distribution in wireless sensor networks},
  booktitle    = {Proceedings of the 2005 {ACM} Workshop on Wireless Security, Cologne,
                  Germany, September 2, 2005},
  pages        = {11--20},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1080793.1080798},
  doi          = {10.1145/1080793.1080798},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ws/LiuND05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/wi/05/NingL05,
  author       = {Peng Ning and
                  Donggang Liu},
  editor       = {Ivan Stojmenovic},
  title        = {Broadcast Authentication and Key Management for Secure Sensor Networks},
  booktitle    = {Handbook of Sensor Networks: Algorithms and Architectures},
  series       = {Wiley series on parallel and distributed computing},
  pages        = {141--172},
  publisher    = {Wiley},
  year         = {2005},
  url          = {https://doi.org/10.1002/047174414x.ch5},
  doi          = {10.1002/047174414X.CH5},
  timestamp    = {Tue, 16 Jul 2019 13:42:29 +0200},
  biburl       = {https://dblp.org/rec/books/wi/05/NingL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tecs/LiuN04,
  author       = {Donggang Liu and
                  Peng Ning},
  title        = {Multilevel {\(\mathrm{\mu}\)}TESLA: Broadcast authentication for distributed
                  sensor networks},
  journal      = {{ACM} Trans. Embed. Comput. Syst.},
  volume       = {3},
  number       = {4},
  pages        = {800--836},
  year         = {2004},
  url          = {https://doi.org/10.1145/1027794.1027800},
  doi          = {10.1145/1027794.1027800},
  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tecs/LiuN04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiuN03,
  author       = {Donggang Liu and
                  Peng Ning},
  editor       = {Sushil Jajodia and
                  Vijayalakshmi Atluri and
                  Trent Jaeger},
  title        = {Establishing pairwise keys in distributed sensor networks},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003},
  pages        = {52--61},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/948109.948119},
  doi          = {10.1145/948109.948119},
  timestamp    = {Tue, 10 Nov 2020 20:00:42 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LiuN03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiuNS03,
  author       = {Donggang Liu and
                  Peng Ning and
                  Kun Sun},
  editor       = {Sushil Jajodia and
                  Vijayalakshmi Atluri and
                  Trent Jaeger},
  title        = {Efficient self-healing group key distribution with revocation capability},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003},
  pages        = {231--240},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/948109.948141},
  doi          = {10.1145/948109.948141},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LiuNS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/LiuN03,
  author       = {Donggang Liu and
                  Peng Ning},
  title        = {Efficient Distribution of Key Chain Commitments for Broadcast Authentication
                  in Distributed Sensor Networks},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2003, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2003},
  url          = {https://www.ndss-symposium.org/ndss2003/efficient-distribution-key-chain-commitments-broadcast-authentication-distributed-sensor/},
  timestamp    = {Mon, 01 Feb 2021 08:42:24 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/LiuN03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sasn/LiuN03,
  author       = {Donggang Liu and
                  Peng Ning},
  editor       = {Sanjeev Setia and
                  Vipin Swarup},
  title        = {Location-based pairwise key establishments for static sensor networks},
  booktitle    = {Proceedings of the 1st {ACM} Workshop on Security of ad hoc and Sensor
                  Networks, {SASN} 2003, Fairfax, Virginia, USA, 2003},
  pages        = {72--82},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/986858.986869},
  doi          = {10.1145/986858.986869},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sasn/LiuN03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics