|
Search the dblp DataBase
Bo Zhu:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Guilin Wang, Xiaoxi Han, Bo Zhu
On the Security of Two Threshold Signature Schemes with Traceable Signers. [Citation Graph (0, 0)][DBLP] ACNS, 2003, pp:111-122 [Conf]
- Bo Zhu, Sanjeev Setia, Sushil Jajodia
Providing witness anonymity in peer-to-peer systems. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2006, pp:6-16 [Conf]
- Bo Zhu, Tieyan Li, Huafei Zhu, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng
Trust Establishment in Large Scale Grid Settings. [Citation Graph (0, 0)][DBLP] GCC, 2004, pp:317-324 [Conf]
- Bo Zhu, Zhiguo Wan, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng
Anonymous Secure Routing in Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP] LCN, 2004, pp:102-108 [Conf]
- Bo Zhu, Feng Bao, Robert H. Deng, Mohan S. Kankanhalli, Guilin Wang
Efficient and robust key management for large mobile ad hoc networks. [Citation Graph (0, 0)][DBLP] Computer Networks, 2005, v:48, n:4, pp:657-682 [Journal]
- Xuxin Xu, Lingyu Wang, Amr M. Youssef, Bo Zhu
Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme. [Citation Graph (0, 0)][DBLP] ACNS, 2007, pp:177-193 [Conf]
- Bo Zhu, Guilin Wang, Zhiguo Wan, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng
Providing efficient certification services against active attacks in ad hoc networks. [Citation Graph (0, 0)][DBLP] IPCCC, 2005, pp:285-292 [Conf]
Efficient Distributed Detection of Node Replication Attacks in Sensor Networks. [Citation Graph (, )][DBLP]
Anonymous user communication for privacy protection in wireless metropolitan mesh networks. [Citation Graph (, )][DBLP]
Anonymous Misbehavior Detection in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]
The design and implementation of a malicious code behavior detecting model based on virtualization techology. [Citation Graph (, )][DBLP]
Towards Secure and Practical MACs for Body Sensor Networks. [Citation Graph (, )][DBLP]
A Point-Based Simulation Framework for Minimally Invasive Surgery. [Citation Graph (, )][DBLP]
Privacy-Aware Attribute-Based Encryption with User Accountability. [Citation Graph (, )][DBLP]
Particle-Based Deformable Modeling with Pre-computed Surface Data in Real-Time Surgical Simulation. [Citation Graph (, )][DBLP]
An Integrity Lock Architecture for Supporting Distributed Authorizations in Database Federations. [Citation Graph (, )][DBLP]
BoBlossom: modeling growing plants in games. [Citation Graph (, )][DBLP]
Opportunistic Cooperation with Receiver-Based Ratio Combining Strategy. [Citation Graph (, )][DBLP]
A Granulating Algorithm using Global Filled Function. [Citation Graph (, )][DBLP]
Ontology and Metadata for E-learning Based on Grid. [Citation Graph (, )][DBLP]
Adaptive Thresholds Algorithm of Image Denoising Based on Nonsubsampled Contourlet Transform. [Citation Graph (, )][DBLP]
A PIN Entry Scheme Resistant to Recording-Based Shoulder-Surfing. [Citation Graph (, )][DBLP]
Key-Insulated Encryption Based Key Pre-distribution Scheme for WSN. [Citation Graph (, )][DBLP]
A New Approach to Malware Detection. [Citation Graph (, )][DBLP]
Output tracking of VTOL aircraft with delayed attitude measurements. [Citation Graph (, )][DBLP]
Minimum word classification error training of HMMS for automatic speech recognition. [Citation Graph (, )][DBLP]
On the phonetic information in ultrasonic microphone signals. [Citation Graph (, )][DBLP]
Research on Tension Control Strategy of Dry-Powder-Embedded Zinc-Air Battery Pole Manufacturing Line. [Citation Graph (, )][DBLP]
Bitwise Higher Order Differential Cryptanalysis. [Citation Graph (, )][DBLP]
Improved Cryptanalysis of the FOX Block Cipher. [Citation Graph (, )][DBLP]
Search in 0.015secs, Finished in 0.017secs
|