|
Search the dblp DataBase
Chunhe Xia:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Hongyan Peng, Xiaojian Li, Chunhe Xia, Jianfeng Deng, Xiaofa Zhou
A Non-Repudiation Protocol for E-Mail and Its Formal Analysis. [Citation Graph (0, 0)][DBLP] Journal of Computer Research and Development, 2006, v:43, n:11, pp:1914-1919 [Journal]
A Tactical Intelligence Production Model of Computer Network Self-Organizing Operations. [Citation Graph (, )][DBLP]
Application for Artificial Bee Colony Algorithm in Migration of Mobile Agent. [Citation Graph (, )][DBLP]
Research on Simulation Framework of Structured P2P Network. [Citation Graph (, )][DBLP]
A Network Security Risk Assessment Framework Based on Game Theory. [Citation Graph (, )][DBLP]
A New Type of Self-Adaptive Mechanism for Network Survivability Based on Intrusion Deception. [Citation Graph (, )][DBLP]
An Algorithm for Generation of Attack Signatures Based on Sequences Alignment. [Citation Graph (, )][DBLP]
Research on Survivability of Mobile Ad Hoc Network. [Citation Graph (, )][DBLP]
A Game Theoretical Attack-Defense Model Oriented to Network Security Risk Assessment. [Citation Graph (, )][DBLP]
A Game Theoretical Attack-Defense Model Oriented to Network Security Risk Assessment. [Citation Graph (, )][DBLP]
An Evaluation Model of CNO Intelligence Information Confidence. [Citation Graph (, )][DBLP]
A Bulk Email Oriented Multi-party Non-repudiation Exchange Protocol. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.001secs
|