|
Search the dblp DataBase
Huanguo Zhang:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Jianming Fu, Xian Yi, Huanguo Zhang
Modeling the Behavior of Ada Tasks and Verifying Its Safety. [Citation Graph (0, 0)][DBLP] CIT, 2004, pp:676-680 [Conf]
- Bo Meng, Huanguo Zhang
An Electronic Commerce System Prototype and Its Implementations. [Citation Graph (0, 0)][DBLP] CIT, 2005, pp:966-970 [Conf]
- Yichun Liu, Jianming Fu, Huanguo Zhang
An Optimistic Fair Protocol for P2P Chained Transaction. [Citation Graph (0, 0)][DBLP] ASIAN, 2005, pp:136-145 [Conf]
- Fei Yan, Weizhong Qiang, Zhi-Dong Shen, Chunrun Chen, Huanguo Zhang, Deqing Zou
Daonity: An Experience on Enhancing Grid Security by Trusted Computing Technology. [Citation Graph (0, 0)][DBLP] ATC, 2006, pp:227-235 [Conf]
- Fajiang Yu, Huanguo Zhang, Fei Yan, Song Gao
An Improved Global Trust Value Computing Method in P2P System. [Citation Graph (0, 0)][DBLP] ATC, 2006, pp:258-267 [Conf]
- Bo Meng, Huanguo Zhang, Qianxing Xiong
The Practical Detailed Requirements of Accountability and Its Application in the Electronic Payment Protocols. [Citation Graph (0, 0)][DBLP] EEE, 2005, pp:556-561 [Conf]
- Jianming Fu, Lei Zhang, Weinan Li, Huanguo Zhang
An Adaptive Service Strategy Based on User Rating in P2P. [Citation Graph (0, 0)][DBLP] GCC, 2005, pp:860-870 [Conf]
- Min Luo, Lina Wang, Huanguo Zhang, Jin Chen
A Research on Intrusion Detection Based on Unsupervised Clustering and Support Vector Machine. [Citation Graph (0, 0)][DBLP] ICICS, 2003, pp:325-336 [Conf]
- Zhi-Dong Shen, Xiao-Ping Wu, Yu-Hua Wang, Wen-Ling Peng, Huanguo Zhang
Group Key Management in Grid Environment. [Citation Graph (0, 0)][DBLP] IMSCCS (1), 2006, pp:626-631 [Conf]
- Zhi-Dong Shen, Fei Yan, Weizhong Qiang, Xiao-Ping Wu, Huanguo Zhang
Grid System Integrated with Trusted Computing Platform. [Citation Graph (0, 0)][DBLP] IMSCCS (1), 2006, pp:619-625 [Conf]
- Min Yang, Huanguo Zhang, Jianming Fu, Fei Yan
A Framework for Adaptive Anomaly Detection Based on Support Vector Data Description. [Citation Graph (0, 0)][DBLP] NPC, 2004, pp:443-450 [Conf]
- Qingshu Meng, Huanguo Zhang, Min Yang, Jingsong Cui
On the degree of homogeneous bent functions. [Citation Graph (0, 0)][DBLP] Discrete Applied Mathematics, 2007, v:155, n:5, pp:665-669 [Journal]
- Jianming Fu, Binglan Chen, Huanguo Zhang
A Worm Containment Model Based on Neighbor-Alarm. [Citation Graph (0, 0)][DBLP] ATC, 2007, pp:449-457 [Conf]
- Bang-ju Wang, Huanguo Zhang, Zhang-yi Wang, Yu-Hua Wang
Speeding Up Scalar Multiplication Using a New Signed Binary Representation for Integers. [Citation Graph (0, 0)][DBLP] MCAM, 2007, pp:277-285 [Conf]
- Jun Song, Huanguo Zhang, Qingshu Meng, Zhang-yi Wang
Cryptanalysis of Two-Round DES Using Genetic Algorithms. [Citation Graph (0, 0)][DBLP] ISICA, 2007, pp:583-590 [Conf]
- Yuan Yuan, Yan Tong, Huanguo Zhang
Complete Mapping Polynomials over Finite Field F16. [Citation Graph (0, 0)][DBLP] WAIFI, 2007, pp:147-158 [Conf]
A Secure Multi-party Computing Model Based on Trusted Computing Platform. [Citation Graph (, )][DBLP]
Research on Unified Network Access Control Architecture. [Citation Graph (, )][DBLP]
PerformTrust: Trust model integrated past and current performance in P2P file sharing systems. [Citation Graph (, )][DBLP]
Building Trusted Sub-domain for the Grid with Trusted Computing. [Citation Graph (, )][DBLP]
Research on accountability in electronic transaction. [Citation Graph (, )][DBLP]
Mobile Agents Integrity Research. [Citation Graph (, )][DBLP]
A hash-TLB approach for MMU virtualization in xen/IA64. [Citation Graph (, )][DBLP]
Type Flaw Attacks and Prevention in Security Protocols. [Citation Graph (, )][DBLP]
Trusted Code Remote Execution through Trusted Computing and Virtualization. [Citation Graph (, )][DBLP]
Efficient Modular Exponentiation with Three-Moduli (2n 1, 2n+3). [Citation Graph (, )][DBLP]
A New Data Protecting Scheme Based on TPM. [Citation Graph (, )][DBLP]
Innovations for Grid Security from Trusted Computing. [Citation Graph (, )][DBLP]
An Efficiency Security Model of Routing Protocol in Wireless Sensor Networks. [Citation Graph (, )][DBLP]
Quantitative Cryptanalysis of Six-Round DES Using Evolutionary Algorithms. [Citation Graph (, )][DBLP]
Cryptanalysis of Transposition Cipher Using Simulated Annealing Genetic Algorithm. [Citation Graph (, )][DBLP]
A Trusted Computing Model Based on Code Authorization. [Citation Graph (, )][DBLP]
VNIDA: Building an IDS Architecture Using VMM-Based Non-Intrusive Approach. [Citation Graph (, )][DBLP]
Certificateless One-Way Authenticated Two-Party Key Agreement Protocol. [Citation Graph (, )][DBLP]
Design Secure Contexts Detect Based on Lattice for Grid Computing Environment. [Citation Graph (, )][DBLP]
An Introduction to Data Capturing. [Citation Graph (, )][DBLP]
Secure Key Management of Mobile Agent System Using TPM-Based Technology on Trusted Computing Platform. [Citation Graph (, )][DBLP]
A Test Method of Trusted Computing Supporting Software. [Citation Graph (, )][DBLP]
Research on Automated Testing of the Trusted Platform Model. [Citation Graph (, )][DBLP]
Design and Implementation of an Integrity Measurement System Based on Windows Trusted Computing Platform. [Citation Graph (, )][DBLP]
Dynamic Trustiness Authentication Framework Based on Software's Behavior Integrity. [Citation Graph (, )][DBLP]
Research on Chinese Key Words Mining with Malicious Jamming in English. [Citation Graph (, )][DBLP]
Evolutionary Design of Random Number Generator. [Citation Graph (, )][DBLP]
A novel algorithm enumerating bent functions. [Citation Graph (, )][DBLP]
Search in 0.012secs, Finished in 0.014secs
|