The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jingsha He: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Guorui Li, Jingsha He, Yingfang Fu
    A Group-Based Dynamic Key Management Scheme in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (2), 2007, pp:127-132 [Conf]
  2. Jingsha He, Ran Zhang
    Towards a Formal Framework for Distributed Identity Management. [Citation Graph (0, 0)][DBLP]
    APWeb, 2005, pp:913-924 [Conf]
  3. Jerry Gao, Raquel Espinoza, Jingsha He
    Testing Coverage Analysis for Software Component Validation. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:463-470 [Conf]
  4. Jerry Gao, Deepa Gopinathan, Quan Mai, Jingsha He
    A Systematic Regression Testing Method and Tool For Software Components. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:455-466 [Conf]
  5. Jingsha He, Virgil D. Gligor
    Information-Flow Analysis for Covert-Channel Identification in Multilevel Secure Operating Systems. [Citation Graph (0, 0)][DBLP]
    CSFW, 1990, pp:139-149 [Conf]
  6. Jingsha He, Virgil D. Gligor
    Formal Methods and Automated Tool for Timing-Channel Identification in TCB Source Code. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1992, pp:57-76 [Conf]
  7. Jingsha He
    An Architecture for Wide Area Network Load Balancing. [Citation Graph (0, 0)][DBLP]
    ICC (2), 2000, pp:1169-1173 [Conf]
  8. Jingsha He, C. Edward Chow, Jihui Yang, Takafumi Chujo
    An Algorithm for Available Bandwidth Measurement. [Citation Graph (0, 0)][DBLP]
    ICN (1), 2001, pp:753-761 [Conf]
  9. Guorui Li, Jingsha He, Yingfang Fu
    A Hexagon-Based Key Predistribution Scheme in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 2006, pp:175-180 [Conf]
  10. Jingsha He
    On Available Bandwidth Measurement Implementation and Experiment. [Citation Graph (0, 0)][DBLP]
    LCN, 2004, pp:772-773 [Conf]
  11. Yingfang Fu, Jingsha He, Guorui Li
    A Composite Key Management Scheme for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    OTM Workshops (1), 2006, pp:575-584 [Conf]
  12. Guorui Li, Jingsha He, Yingfang Fu
    Key Predistribution in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    UIC, 2006, pp:845-853 [Conf]
  13. Guorui Li, Jingsha He, Yingfang Fu
    Key Management in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    WASA, 2006, pp:457-466 [Conf]
  14. Yingfang Fu, Jingsha He, Guorui Li
    A Distributed Intrusion Detection Scheme for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2007, pp:75-80 [Conf]
  15. Guorui Li, Jingsha He, Yingfang Fu
    Analysis of an Adaptive Key Selection Scheme in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (4), 2007, pp:409-416 [Conf]

  16. A Method for Privacy Protection in Location Based Services. [Citation Graph (, )][DBLP]


  17. Neighbor-List Based Pairwise Key Management Scheme in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  18. A Zone-Based Distributed Key Management Scheme for Wireless Mesh Networks. [Citation Graph (, )][DBLP]


  19. A Group-Based Reputation Mechanism for Mobile P2P Networks. [Citation Graph (, )][DBLP]


  20. A Group-Based Intrusion Detection Scheme in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  21. Improving the Efficiency of Network Topology Discovery. [Citation Graph (, )][DBLP]


  22. A Power Peer-Based Reputation Scheme for Mobile P2P Systems. [Citation Graph (, )][DBLP]


  23. Mutual Authentication in Wireless Mesh Networks. [Citation Graph (, )][DBLP]


  24. A Distributed Intrusion Detection Scheme for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  25. A Distributed Decision-Making Mechanism for Wireless P2P Networks. [Citation Graph (, )][DBLP]


  26. An Energy-Efficient Dynamic Key Management Scheme in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  27. Secure Multiple Deployment in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  28. User-Centric Privacy Preservation in Data-Sharing Applications. [Citation Graph (, )][DBLP]


  29. Statistical Modeling and Correlation Analysis of End-to-End Delay in Wide Area Networks. [Citation Graph (, )][DBLP]


  30. An Enhanced Trust Model Based on Reputation for P2P Networks. [Citation Graph (, )][DBLP]


  31. A Key Management Scheme Combined with Intrusion Detection for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  32. Reputation-based Trust Update in Network Environment. [Citation Graph (, )][DBLP]


  33. A New Decision-Making Approach for C2C Electronic Trade. [Citation Graph (, )][DBLP]


  34. A directed signature scheme and its application to group key initial distribution. [Citation Graph (, )][DBLP]


  35. A Quantifying Metric for Privacy Protection Based on Information Theory. [Citation Graph (, )][DBLP]


  36. Efficient Group Key Management Scheme in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  37. An approach for tracking privacy disclosure. [Citation Graph (, )][DBLP]


  38. Group-based intrusion detection system in wireless sensor networks. [Citation Graph (, )][DBLP]


Search in 0.622secs, Finished in 0.624secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002