The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Qi Shi: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. John Haggerty, Qi Shi, Madjid Merabti
    Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:413-422 [Conf]
  2. Bob Askwith, Madjid Merabti, Qi Shi, K. Whiteley
    Achieving User Privacy in Mobile Networks. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1997, pp:108-0 [Conf]
  3. D. W. Gresty, Qi Shi, Madjid Merabti
    Requirements for a General Framework for Response to Distributed Denial-of-Service. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:422-432 [Conf]
  4. Ning Zhang, Qi Shi
    Security Issues in an EDI Environment. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1996, pp:129-137 [Conf]
  5. David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob Askwith
    Buffer Overrun Prevention Through Component Composition Analysis. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:156-163 [Conf]
  6. Qi Shi, Ning Zhang
    A General Approach to Evaluation of Secure Systems. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 1995, pp:396-401 [Conf]
  7. Qi Shi, Ning Zhang
    Applying Composable Security Properties to Assessment of Information Systems. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 1996, pp:118-123 [Conf]
  8. Bo Zhou, Qi Shi, Madjid Merabti
    Intrusion Detection in Pervasive Networks Based on a Chi-Square Statistic Test. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:203-208 [Conf]
  9. John A. McDermid, Qi Shi
    A Formal Model of Security Dependency for Analysis and Testing of Secure Systems. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:188-200 [Conf]
  10. Aleksandra Nenadic, Ning Zhang, Qi Shi, Carole A. Goble
    DSA-Based Verifiable and Recoverable Encryption of Signatures and Its Application in Certified E-Goods Delivery. [Citation Graph (0, 0)][DBLP]
    EEE, 2005, pp:94-99 [Conf]
  11. Qi Shi, Ning Zhang
    A general approach to secure components composition. [Citation Graph (0, 0)][DBLP]
    HASE, 1996, pp:263-286 [Conf]
  12. Bo Zhou, Qi Shi, Madjid Merabti
    Real-Time Intrusion Detection in Ubiquitous Networks with a String-Based Approach. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:352-359 [Conf]
  13. Aleksandra Nenadic, Ning Zhang, Qi Shi, Carole A. Goble
    Certified E-Mail Delivery with DSA Receipts. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2005, pp:- [Conf]
  14. Abiola Abimbola, Qi Shi, Madjid Merabti
    NetHost-Sensor: A Novel Concept in Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    ISCC, 2003, pp:232-237 [Conf]
  15. David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob Askwith
    An Extensible Framework for Practical Secure Component Composition in a Ubiquitous Computing Environment. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:112-117 [Conf]
  16. John Haggerty, Qi Shi, Madjid Merabti
    The Threat From Within -An Analysis of Attacks on anInternal Network. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:133-146 [Conf]
  17. John Haggerty, Qi Shi, Madjid Merabti
    Statistical Signatures for Early Detection of Flooding Denial-Of-Service Attacks. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:327-342 [Conf]
  18. Qi Shi, John A. McDermid
    Constructing Secure Distributed Systems Using Components. [Citation Graph (0, 0)][DBLP]
    Symposium on Reliable Distributed Systems, 1993, pp:143-152 [Conf]
  19. Ning Zhang, L. Yao, Jay Chin, Aleksandra Nenadic, A. McNab, Alan L. Rector, Carole A. Goble, Qi Shi
    Plugging a Scalable Authentication Framework into Shibboleth. [Citation Graph (0, 0)][DBLP]
    WETICE, 2005, pp:271-276 [Conf]
  20. Ning Zhang, Qi Shi
    Achieving Non-Repudiation of Receipt. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1996, v:39, n:10, pp:844-853 [Journal]
  21. Ning Zhang, Qi Shi, Madjid Merabti
    A Flexible Approach to Secure and Fair Document Exchange. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1999, v:42, n:7, pp:569-581 [Journal]
  22. Ning Zhang, Qi Shi, Madjid Merabti
    An efficient protocol for anonymous and fair document exchange. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2003, v:41, n:1, pp:19-28 [Journal]
  23. Ning Zhang, Qi Shi, Madjid Merabti, Robert Askwith
    Autonomous mobile agent based fair exchange. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2004, v:46, n:6, pp:751-770 [Journal]
  24. Bob Askwith, Madjid Merabti, Qi Shi
    MNPA: a mobile network privacy architecture. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2000, v:23, n:18, pp:1777-1788 [Journal]
  25. Madjid Merabti, Qi Shi, Rolf Oppliger
    Advanced security techniques for network protection. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2000, v:23, n:17, pp:1581-1583 [Journal]
  26. Aleksandra Nenadic, Ning Zhang, Qi Shi
    RSA-based Verifiable and Recoverable Encryption of Signatures and its application in certified e-mail delivery. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2005, v:13, n:5, pp:757-777 [Journal]
  27. Qi Shi, Ning Zhang
    An effective model for composition of secure systems. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1998, v:43, n:3, pp:233-244 [Journal]
  28. Ning Zhang, Qi Shi, Madjid Merabti
    A unified approach to a fair document exchange system. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2004, v:72, n:1, pp:83-96 [Journal]
  29. Ning Zhang, Qi Shi, Madjid Merabti
    Revocation of privacy-enhanced public-key certificates. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:75, n:1-2, pp:205-214 [Journal]
  30. Bob Askwith, Madjid Merabti, Qi Shi
    MNPA: A basis for privacy-enhanced QoS in mobile networks. [Citation Graph (0, 0)][DBLP]
    Microprocessors and Microsystems, 2003, v:27, n:2, pp:93-100 [Journal]
  31. Ning Zhang, Qi Shi, Madjid Merabti, Robert Askwith
    Practical and efficient fair document exchange over networks. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2006, v:29, n:1, pp:46-61 [Journal]

  32. Towards a Context-Aware Identity Management in Mobile Ad Hoc Networks (IMMANets). [Citation Graph (, )][DBLP]


  33. Towards Energy-Efficient Intrusion Detection in Pervasive Computing. [Citation Graph (, )][DBLP]


  34. Applying Secure Data Aggregation techniques for a Structure and Density Independent Group Based Key Management Protocol. [Citation Graph (, )][DBLP]


  35. Balancing intrusion detection resources in ubiquitous computing networks. [Citation Graph (, )][DBLP]


  36. Achieving fine-grained access control in virtual organizations. [Citation Graph (, )][DBLP]


Search in 0.064secs, Finished in 0.066secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002