The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Fan Hong: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Shaobin Wang, Fan Hong, Guohua Cui
    A fair e-cash payment scheme based on credit. [Citation Graph (0, 0)][DBLP]
    ICEC, 2005, pp:622-626 [Conf]
  2. Zhao-Li Zhang, Fan Hong, Jun-Guo Liao
    Modeling Chinese Wall Policy Using Colored Petri Nets. [Citation Graph (0, 0)][DBLP]
    CIT, 2006, pp:162- [Conf]
  3. Shaobin Wang, Fan Hong, Xian Zhu
    Optimistic Fair-exchange Protocols Based on DSA Signatures. [Citation Graph (0, 0)][DBLP]
    IEEE SCC, 2004, pp:498-501 [Conf]
  4. Fan Hong, Liang Hong, Cai Fu
    Secure OLSR. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:713-718 [Conf]
  5. Fan Hong, Xian Zhu, Shaobin Wang
    Delegation Depth Control in Trust-Management System. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:411-414 [Conf]
  6. Hong Zhu, Sujuan Duan, Fan Hong, Kevin Lü
    An Access-Control Policy Based on Sharing Resource Management for a Multi-domains Environment. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:439-448 [Conf]
  7. Xian Zhu, Shaobin Wang, Fan Hong, Junguo Liao
    Distributed Credential Chain Discovery in Trust-Management with Parameterized Roles. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:334-348 [Conf]
  8. Haibo Shen, Fan Hong
    A Context-Aware Role-Based Access Control Model for Web Services. [Citation Graph (0, 0)][DBLP]
    ICEBE, 2005, pp:220-223 [Conf]
  9. Jian-Hua Song, Fan Hong, Yu Zhang
    Effective Filtering Scheme against RREQ Flooding Attack in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2006, pp:497-502 [Conf]
  10. Haibo Shen, Fan Hong
    An Attribute-Based Access Control Model for Web Services. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2006, pp:74-79 [Conf]
  11. Fan Hong, Yongquan Cui
    Administrative Usage Control Model for Secure Interoperability. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2006, pp:86-89 [Conf]
  12. Shaobin Wang, Fan Hong, Guohua Cui
    Secure Efficient Proxy Blind Signature Schemes Based DLP. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:452-455 [Conf]
  13. Zhao-Li Zhang, Fan Hong, Hai-Jun Xiao
    Verification of Strict Integrity Policy via Petri Nets. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:23- [Conf]
  14. Fan Hong, Shuzhi Sam Ge, Tong Heng Lee
    Practical adaptive neural control of nonlinear systems with unknown time delays. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part B, 2005, v:35, n:4, pp:849-854 [Journal]

  15. Intrusion Detection Using Ensemble of SVM Classifiers. [Citation Graph (, )][DBLP]


  16. A Distributed Monitoring Mechanism for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  17. Cryptanalysis of an Improved Forward Secure Proxy Signature Scheme. [Citation Graph (, )][DBLP]


Search in 0.008secs, Finished in 0.008secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002