The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Bo Zhu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Guilin Wang, Xiaoxi Han, Bo Zhu
    On the Security of Two Threshold Signature Schemes with Traceable Signers. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:111-122 [Conf]
  2. Bo Zhu, Sanjeev Setia, Sushil Jajodia
    Providing witness anonymity in peer-to-peer systems. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:6-16 [Conf]
  3. Bo Zhu, Tieyan Li, Huafei Zhu, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng
    Trust Establishment in Large Scale Grid Settings. [Citation Graph (0, 0)][DBLP]
    GCC, 2004, pp:317-324 [Conf]
  4. Bo Zhu, Zhiguo Wan, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng
    Anonymous Secure Routing in Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    LCN, 2004, pp:102-108 [Conf]
  5. Bo Zhu, Feng Bao, Robert H. Deng, Mohan S. Kankanhalli, Guilin Wang
    Efficient and robust key management for large mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2005, v:48, n:4, pp:657-682 [Journal]
  6. Xuxin Xu, Lingyu Wang, Amr M. Youssef, Bo Zhu
    Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:177-193 [Conf]
  7. Bo Zhu, Guilin Wang, Zhiguo Wan, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng
    Providing efficient certification services against active attacks in ad hoc networks. [Citation Graph (0, 0)][DBLP]
    IPCCC, 2005, pp:285-292 [Conf]

  8. Efficient Distributed Detection of Node Replication Attacks in Sensor Networks. [Citation Graph (, )][DBLP]


  9. Anonymous user communication for privacy protection in wireless metropolitan mesh networks. [Citation Graph (, )][DBLP]


  10. Anonymous Misbehavior Detection in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  11. The design and implementation of a malicious code behavior detecting model based on virtualization techology. [Citation Graph (, )][DBLP]


  12. Towards Secure and Practical MACs for Body Sensor Networks. [Citation Graph (, )][DBLP]


  13. A Point-Based Simulation Framework for Minimally Invasive Surgery. [Citation Graph (, )][DBLP]


  14. Privacy-Aware Attribute-Based Encryption with User Accountability. [Citation Graph (, )][DBLP]


  15. Particle-Based Deformable Modeling with Pre-computed Surface Data in Real-Time Surgical Simulation. [Citation Graph (, )][DBLP]


  16. An Integrity Lock Architecture for Supporting Distributed Authorizations in Database Federations. [Citation Graph (, )][DBLP]


  17. BoBlossom: modeling growing plants in games. [Citation Graph (, )][DBLP]


  18. Opportunistic Cooperation with Receiver-Based Ratio Combining Strategy. [Citation Graph (, )][DBLP]


  19. A Granulating Algorithm using Global Filled Function. [Citation Graph (, )][DBLP]


  20. Ontology and Metadata for E-learning Based on Grid. [Citation Graph (, )][DBLP]


  21. Adaptive Thresholds Algorithm of Image Denoising Based on Nonsubsampled Contourlet Transform. [Citation Graph (, )][DBLP]


  22. A PIN Entry Scheme Resistant to Recording-Based Shoulder-Surfing. [Citation Graph (, )][DBLP]


  23. Key-Insulated Encryption Based Key Pre-distribution Scheme for WSN. [Citation Graph (, )][DBLP]


  24. A New Approach to Malware Detection. [Citation Graph (, )][DBLP]


  25. Output tracking of VTOL aircraft with delayed attitude measurements. [Citation Graph (, )][DBLP]


  26. Minimum word classification error training of HMMS for automatic speech recognition. [Citation Graph (, )][DBLP]


  27. On the phonetic information in ultrasonic microphone signals. [Citation Graph (, )][DBLP]


  28. Research on Tension Control Strategy of Dry-Powder-Embedded Zinc-Air Battery Pole Manufacturing Line. [Citation Graph (, )][DBLP]


  29. Bitwise Higher Order Differential Cryptanalysis. [Citation Graph (, )][DBLP]


  30. Improved Cryptanalysis of the FOX Block Cipher. [Citation Graph (, )][DBLP]


Search in 0.015secs, Finished in 0.017secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002