|
Search the dblp DataBase
Yanjun Zuo:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Yanjun Zuo, Brajendra Panda
Damage Discovery in Distributed Database Systems. [Citation Graph (0, 0)][DBLP] DBSec, 2004, pp:111-123 [Conf]
- Yanjun Zuo, Brajendra Panda
Network Viruses: Their 306 Working Principles and Marriages with Hacking Programs. [Citation Graph (0, 0)][DBLP] IAW, 2003, pp:306-307 [Conf]
- Yanjun Zuo, Brajendra Panda
Component based trust management in the context of a virtual organization. [Citation Graph (0, 0)][DBLP] SAC, 2005, pp:1582-1588 [Conf]
- Yanjun Zuo, Brajendra Panda
Information trustworthiness evaluation based on trust combination. [Citation Graph (0, 0)][DBLP] SAC, 2006, pp:1880-1885 [Conf]
- Yanjun Zuo, Brajendra Panda
External Object Trust Zone Mapping for Information Clustering. [Citation Graph (0, 0)][DBLP] WOSIS, 2005, pp:196-206 [Conf]
A Framework of Survivability Requirement Specification for Critical Information Systems. [Citation Graph (, )][DBLP]
Changing Hands Together: A Secure Group Ownership Transfer Protocol for RFID Tags. [Citation Graph (, )][DBLP]
Securely Querying Sensor Enabled RFID Virtual Databases (SERVDs). [Citation Graph (, )][DBLP]
Analysis and Simulation of System Survivability. [Citation Graph (, )][DBLP]
Trust Computing for Social Networking. [Citation Graph (, )][DBLP]
Mobile Data Protection Using Handheld Usage Context Matching. [Citation Graph (, )][DBLP]
RFID survivability quantification and attack modeling. [Citation Graph (, )][DBLP]
A Framework for RFID Survivability Requirement Analysis and Specification. [Citation Graph (, )][DBLP]
Handheld data protection using handheld usage pattern identification. [Citation Graph (, )][DBLP]
Two-level trust-based decision model for information assurance in a virtual organization. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.003secs
|