Search the dblp DataBase
Qi Shi :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
John Haggerty , Qi Shi , Madjid Merabti Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:413-422 [Conf ] Bob Askwith , Madjid Merabti , Qi Shi , K. Whiteley Achieving User Privacy in Mobile Networks. [Citation Graph (0, 0)][DBLP ] ACSAC, 1997, pp:108-0 [Conf ] D. W. Gresty , Qi Shi , Madjid Merabti Requirements for a General Framework for Response to Distributed Denial-of-Service. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:422-432 [Conf ] Ning Zhang , Qi Shi Security Issues in an EDI Environment. [Citation Graph (0, 0)][DBLP ] ACSAC, 1996, pp:129-137 [Conf ] David Llewellyn-Jones , Madjid Merabti , Qi Shi , Bob Askwith Buffer Overrun Prevention Through Component Composition Analysis. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:156-163 [Conf ] Qi Shi , Ning Zhang A General Approach to Evaluation of Secure Systems. [Citation Graph (0, 0)][DBLP ] COMPSAC, 1995, pp:396-401 [Conf ] Qi Shi , Ning Zhang Applying Composable Security Properties to Assessment of Information Systems. [Citation Graph (0, 0)][DBLP ] COMPSAC, 1996, pp:118-123 [Conf ] Bo Zhou , Qi Shi , Madjid Merabti Intrusion Detection in Pervasive Networks Based on a Chi-Square Statistic Test. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:203-208 [Conf ] John A. McDermid , Qi Shi A Formal Model of Security Dependency for Analysis and Testing of Secure Systems. [Citation Graph (0, 0)][DBLP ] CSFW, 1991, pp:188-200 [Conf ] Aleksandra Nenadic , Ning Zhang , Qi Shi , Carole A. Goble DSA-Based Verifiable and Recoverable Encryption of Signatures and Its Application in Certified E-Goods Delivery. [Citation Graph (0, 0)][DBLP ] EEE, 2005, pp:94-99 [Conf ] Qi Shi , Ning Zhang A general approach to secure components composition. [Citation Graph (0, 0)][DBLP ] HASE, 1996, pp:263-286 [Conf ] Bo Zhou , Qi Shi , Madjid Merabti Real-Time Intrusion Detection in Ubiquitous Networks with a String-Based Approach. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:352-359 [Conf ] Aleksandra Nenadic , Ning Zhang , Qi Shi , Carole A. Goble Certified E-Mail Delivery with DSA Receipts. [Citation Graph (0, 0)][DBLP ] IPDPS, 2005, pp:- [Conf ] Abiola Abimbola , Qi Shi , Madjid Merabti NetHost-Sensor: A Novel Concept in Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP ] ISCC, 2003, pp:232-237 [Conf ] David Llewellyn-Jones , Madjid Merabti , Qi Shi , Bob Askwith An Extensible Framework for Practical Secure Component Composition in a Ubiquitous Computing Environment. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:112-117 [Conf ] John Haggerty , Qi Shi , Madjid Merabti The Threat From Within -An Analysis of Attacks on anInternal Network. [Citation Graph (0, 0)][DBLP ] SEC, 2002, pp:133-146 [Conf ] John Haggerty , Qi Shi , Madjid Merabti Statistical Signatures for Early Detection of Flooding Denial-Of-Service Attacks. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:327-342 [Conf ] Qi Shi , John A. McDermid Constructing Secure Distributed Systems Using Components. [Citation Graph (0, 0)][DBLP ] Symposium on Reliable Distributed Systems, 1993, pp:143-152 [Conf ] Ning Zhang , L. Yao , Jay Chin , Aleksandra Nenadic , A. McNab , Alan L. Rector , Carole A. Goble , Qi Shi Plugging a Scalable Authentication Framework into Shibboleth. [Citation Graph (0, 0)][DBLP ] WETICE, 2005, pp:271-276 [Conf ] Ning Zhang , Qi Shi Achieving Non-Repudiation of Receipt. [Citation Graph (0, 0)][DBLP ] Comput. J., 1996, v:39, n:10, pp:844-853 [Journal ] Ning Zhang , Qi Shi , Madjid Merabti A Flexible Approach to Secure and Fair Document Exchange. [Citation Graph (0, 0)][DBLP ] Comput. J., 1999, v:42, n:7, pp:569-581 [Journal ] Ning Zhang , Qi Shi , Madjid Merabti An efficient protocol for anonymous and fair document exchange. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2003, v:41, n:1, pp:19-28 [Journal ] Ning Zhang , Qi Shi , Madjid Merabti , Robert Askwith Autonomous mobile agent based fair exchange. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2004, v:46, n:6, pp:751-770 [Journal ] Bob Askwith , Madjid Merabti , Qi Shi MNPA: a mobile network privacy architecture. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2000, v:23, n:18, pp:1777-1788 [Journal ] Madjid Merabti , Qi Shi , Rolf Oppliger Advanced security techniques for network protection. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2000, v:23, n:17, pp:1581-1583 [Journal ] Aleksandra Nenadic , Ning Zhang , Qi Shi RSA-based Verifiable and Recoverable Encryption of Signatures and its application in certified e-mail delivery. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2005, v:13, n:5, pp:757-777 [Journal ] Qi Shi , Ning Zhang An effective model for composition of secure systems. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 1998, v:43, n:3, pp:233-244 [Journal ] Ning Zhang , Qi Shi , Madjid Merabti A unified approach to a fair document exchange system. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2004, v:72, n:1, pp:83-96 [Journal ] Ning Zhang , Qi Shi , Madjid Merabti Revocation of privacy-enhanced public-key certificates. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2005, v:75, n:1-2, pp:205-214 [Journal ] Bob Askwith , Madjid Merabti , Qi Shi MNPA: A basis for privacy-enhanced QoS in mobile networks. [Citation Graph (0, 0)][DBLP ] Microprocessors and Microsystems, 2003, v:27, n:2, pp:93-100 [Journal ] Ning Zhang , Qi Shi , Madjid Merabti , Robert Askwith Practical and efficient fair document exchange over networks. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2006, v:29, n:1, pp:46-61 [Journal ] Towards a Context-Aware Identity Management in Mobile Ad Hoc Networks (IMMANets). [Citation Graph (, )][DBLP ] Towards Energy-Efficient Intrusion Detection in Pervasive Computing. [Citation Graph (, )][DBLP ] Applying Secure Data Aggregation techniques for a Structure and Density Independent Group Based Key Management Protocol. [Citation Graph (, )][DBLP ] Balancing intrusion detection resources in ubiquitous computing networks. [Citation Graph (, )][DBLP ] Achieving fine-grained access control in virtual organizations. [Citation Graph (, )][DBLP ] Search in 0.064secs, Finished in 0.066secs