Yuanbo Guo, Jianfeng Ma A Study on the Secure and Intrusion-Tolerant Authorization and Authentication System Applied to the Distributed Environment. [Citation Graph (0, 0)][DBLP] HICSS, 2005, pp:- [Conf]
Yuanbo Guo, Jianfeng Ma, Yadi Wang An Intrusion-Resilient Authorization and Authentication Framework for Grid Computing Infrastructure. [Citation Graph (0, 0)][DBLP] International Conference on Computational Science (3), 2005, pp:229-236 [Conf]
Yuanbo Guo, Jianfeng Ma An intrusion-tolerant authorization and authentication scheme in distributed environments. [Citation Graph (0, 0)][DBLP] Operating Systems Review, 2004, v:38, n:4, pp:45-51 [Journal]
CRMS: A Collusion-Resistant Matrix System for Group Key Management in Wireless Networks. [Citation Graph (, )][DBLP]
The Development Mode of Trust E-commerce Services. [Citation Graph (, )][DBLP]
Keying material based key pre-distribution scheme. [Citation Graph (, )][DBLP]
Multi-path Protocol for High Data Confidentiality and Reliability in Wireless Sensor Networks Using Non-dominated Dynamic Compensation. [Citation Graph (, )][DBLP]
A pairwise key establishment scheme for heterogeneous sensor networks. [Citation Graph (, )][DBLP]
A Congestion Avoidance and Performance Enhancement Scheme for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]
Adaptive Algorithms to Mitigate Inefficiency in Reliability Differentiation Mechanisms for Wireless Sensor Networks. [Citation Graph (, )][DBLP]
Cell Biocompatibility of Porous Nano-Hydroxyapatite/Polyamide66 Composite Scaffolds for Bone Tissue Engineering. [Citation Graph (, )][DBLP]
A New Hybrid Routing Protocol in Heterogeneous Wireless Networks. [Citation Graph (, )][DBLP]
Action-Based Access Control for Web Services. [Citation Graph (, )][DBLP]
Towards Provably Secure On-demand Source Routing in MANET. [Citation Graph (, )][DBLP]
An Efficient Anonymous Routing Protocol for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]
An Active Defense Model and Framework of Insider Threats Detection and Sense. [Citation Graph (, )][DBLP]
An Aggregate Signature Scheme with Constant Pairing Operations. [Citation Graph (, )][DBLP]
Modeling Malicious Code Spread in Scale-Free Networks of Moving Agents. [Citation Graph (, )][DBLP]