The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Zhen Han: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Xin Liu, Zhen Han, Jiqiang Liu, Chang-xiang Shen
    Develop Secure Database System with Security Extended ER Model. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1005-1010 [Conf]
  2. Xin Liu, Zhen Han, Ke-jun Sheng, Chang-xiang Shen
    Research on Confidential Level Extended BLP Model. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:257-262 [Conf]
  3. Yong Zhao, Zhen Han, Jiqiang Liu, Zhigang Li
    An Efficient and Divisible Payment Scheme for M-Commerce. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:488-496 [Conf]
  4. Shuanghe Peng, Zhen Han
    Proxy Cryptography for Secure Inter-domain Information Exchanges. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:193-199 [Conf]
  5. Zhen Han, Ruimin Hu, Li Zhu, Xinchen Zhang, Qiong Liu
    Fast Inter Mode Selection Algorithm in MPEG-2-to-AVS Transcoder. [Citation Graph (0, 0)][DBLP]
    ICICIC (2), 2006, pp:213-216 [Conf]
  6. Xin Liu, Zhen Han, Chang-xiang Shen
    An Integrated Access Control Model of Distributed Database Systems. [Citation Graph (0, 0)][DBLP]
    ICICIC (3), 2006, pp:209-212 [Conf]
  7. Xiao-yong Li, Zhen Han, Chang-xiang Shen
    Software Complexity Based Remote Attestation. [Citation Graph (0, 0)][DBLP]
    ICICIC (3), 2006, pp:220-224 [Conf]
  8. Ying Cai, Zhen Han
    Binary Sequences with Three and Four Level Autocorrelation. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:435-442 [Conf]
  9. Qiong Liu, Shengfeng Ye, Ruimin Hu, Zhen Han
    A Novel Intra/Inter Mode Decision Algorithm for H.264/AVC Based on Spatio-temporal Correlation. [Citation Graph (0, 0)][DBLP]
    MMM (1), 2007, pp:568-575 [Conf]

  10. Usage Control in Conditional Access System with malicious Set-top Box. [Citation Graph (, )][DBLP]


  11. Analysis of Interrupt Coalescing Schemes for Receive-Livelock Problem in Gigabit Ethernet Network Hosts. [Citation Graph (, )][DBLP]


  12. A remote anonymous attestation protocol in trusted computing. [Citation Graph (, )][DBLP]


  13. Global Face Super Resolution and Contour Region Constraints. [Citation Graph (, )][DBLP]


  14. Optimized Java Card transaction mechanism based on object locality. [Citation Graph (, )][DBLP]


  15. Context Active RBAC and its Applications. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002