|
Search the dblp DataBase
Yingcai Bai:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Jianguo Ding, Bernd J. Krämer, Yingcai Bai, Hansheng Chen
Probabilistic Inference for Network Management. [Citation Graph (0, 0)][DBLP] ECUMN, 2004, pp:498-507 [Conf]
- Dongxi Liu, Xiaoyong Li, Yingcai Bai
An Intelligent Intruder Model for Security Protocol Analysis. [Citation Graph (0, 0)][DBLP] ICICS, 2001, pp:13-22 [Conf]
- Jianguo Ding, Shihao Xu, Bernd J. Krämer, Yingcai Bai, Hansheng Chen, Jun Zhang
Probabilistic Inference Strategy in Distributed Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP] ISPA, 2004, pp:835-844 [Conf]
- Jianguo Ding, Jun Zhang, Yingcai Bai, Hansheng Chen
One Backward Inference Algorithm in Bayesian Networks. [Citation Graph (0, 0)][DBLP] PDCAT, 2004, pp:72-75 [Conf]
- Zhang Jun, Fanyuan Ma, Gu Dawu, Yingcai Bai
An Efficient Group Key Management Scheme: Link Tree Protocol. [Citation Graph (0, 0)][DBLP] PDCAT, 2005, pp:381-385 [Conf]
- Jun Zhang, Fanyuan Ma, Yingcai Bai, Minglu Li
Performance Analysis of Batch Rekey Algorithm for Secure Group Communications. [Citation Graph (0, 0)][DBLP] PDCAT, 2004, pp:829-832 [Conf]
- Jun Zhang, Yu Zhou, Fanyuan Ma, Gu Dawu, Yingcai Bai
An extension of secure group communication using key graph. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2006, v:176, n:20, pp:3060-3078 [Journal]
- Dongyi Liu, Xiaoyong Li, Yingcai Bai
An Attack-Finding Algorithm for Security Protocols. [Citation Graph (0, 0)][DBLP] J. Comput. Sci. Technol., 2002, v:17, n:4, pp:450-463 [Journal]
- Jianguo Ding, Bernd J. Krämer, Yingcai Bai, Hansheng Chen
Backward Inference in Bayesian Networks for Distributed Systems Management. [Citation Graph (0, 0)][DBLP] J. Network Syst. Manage., 2005, v:13, n:4, pp:409-427 [Journal]
Search in 0.002secs, Finished in 0.002secs
|