The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jinsong Han: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Xiaoqiu Shi, Jinsong Han
    Popularity Biased Hybrid Search in P2P Systems. [Citation Graph (0, 0)][DBLP]
    GCC, 2006, pp:173-176 [Conf]
  2. Xiaoming Chen, Zhoujun Li, Yongzhen Zhuang, Jinsong Han, Lei Chen 0002
    HAND: An Overlay Optimization Algorithm in Peer-to-Peer Systems. [Citation Graph (0, 0)][DBLP]
    HPCC, 2006, pp:290-299 [Conf]
  3. Jinsong Han, Yunhao Liu, Li Lu, Lei Hu, Abhishek P. Patil
    A Random Walk Based Anonymous Peer-to-Peer Protocol Design. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:143-152 [Conf]
  4. Jinsong Han, Yanmin Zhu, Yunhao Liu, Jianfeng Cai, Lei Hu
    Provide Privacy for Mobile P2P Systems. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2005, pp:829-834 [Conf]
  5. Yanmin Zhu, Jinsong Han, Yunhao Liu, Lionel M. Ni, Chunming Hu, Jinpeng Huai
    TruGrid: A Self-Sustaining Trustworthy Grid. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2005, pp:815-821 [Conf]
  6. Jinsong Han, Yunhao Liu, Li Xiao, Renyi Xiao, Lionel M. Ni
    A Mutual Anonymous Peer-to-Peer Protocol Design. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2005, pp:- [Conf]
  7. Xiaoqiu Shi, Jinsong Han, Yunhao Liu, Lionel M. Ni
    Popularity Adaptive Search in Hybrid P2P Systems. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2007, pp:1-10 [Conf]
  8. Li Lu, Jinsong Han, Lei Hu, Jinpeng Huai, Yunhao Liu, Lionel M. Ni
    Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2007, pp:1-10 [Conf]

  9. Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems. [Citation Graph (, )][DBLP]


  10. ACTION: Breaking the Privacy Barrier for RFID Systems. [Citation Graph (, )][DBLP]


  11. DHT-assisted probabilistic exhaustive search in unstructured P2P networks. [Citation Graph (, )][DBLP]


  12. Road Network Based Adaptive Query Evaluation in VANET. [Citation Graph (, )][DBLP]


  13. Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems. [Citation Graph (, )][DBLP]


  14. Randomizing RFID Private Authentication. [Citation Graph (, )][DBLP]


  15. Dubious feedback: fair or not? [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002