|
Search the dblp DataBase
Liyong Tang:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Zhen Cao, Zhi Guan, Zhong Chen, Jian-bin Hu, Liyong Tang
An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols. [Citation Graph (0, 0)][DBLP] ISPEC, 2007, pp:129-144 [Conf]
- Ruichuan Chen, Xuan Zhao, Liyong Tang, Jian-bin Hu, Zhong Chen
CuboidTrust: A Global Reputation-Based Trust Model in Peer-to-Peer Networks. [Citation Graph (0, 0)][DBLP] ATC, 2007, pp:203-215 [Conf]
Scalable Byzantine Fault Tolerant Public Key Authentication for Peer-to-Peer Networks. [Citation Graph (, )][DBLP]
Hybrid Overlay Structure Based on Virtual Node. [Citation Graph (, )][DBLP]
Securing Peer-to-Peer Content Sharing Service from Poisoning Attacks. [Citation Graph (, )][DBLP]
Sorcery: Could We Make P2P Content Sharing Systems Robust to Deceivers?. [Citation Graph (, )][DBLP]
Securing key issuing in peer-to-peer networks. [Citation Graph (, )][DBLP]
SKIP: A Secure Key Issuing Scheme for Peer-to-Peer Networks. [Citation Graph (, )][DBLP]
TSearch: A Self-learning Vertical Search Spider for Travel. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|