The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Liyong Tang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Zhen Cao, Zhi Guan, Zhong Chen, Jian-bin Hu, Liyong Tang
    An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:129-144 [Conf]
  2. Ruichuan Chen, Xuan Zhao, Liyong Tang, Jian-bin Hu, Zhong Chen
    CuboidTrust: A Global Reputation-Based Trust Model in Peer-to-Peer Networks. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:203-215 [Conf]

  3. Scalable Byzantine Fault Tolerant Public Key Authentication for Peer-to-Peer Networks. [Citation Graph (, )][DBLP]


  4. Hybrid Overlay Structure Based on Virtual Node. [Citation Graph (, )][DBLP]


  5. Securing Peer-to-Peer Content Sharing Service from Poisoning Attacks. [Citation Graph (, )][DBLP]


  6. Sorcery: Could We Make P2P Content Sharing Systems Robust to Deceivers?. [Citation Graph (, )][DBLP]


  7. Securing key issuing in peer-to-peer networks. [Citation Graph (, )][DBLP]


  8. SKIP: A Secure Key Issuing Scheme for Peer-to-Peer Networks. [Citation Graph (, )][DBLP]


  9. TSearch: A Self-learning Vertical Search Spider for Travel. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002