The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Huanguo Zhang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jianming Fu, Xian Yi, Huanguo Zhang
    Modeling the Behavior of Ada Tasks and Verifying Its Safety. [Citation Graph (0, 0)][DBLP]
    CIT, 2004, pp:676-680 [Conf]
  2. Bo Meng, Huanguo Zhang
    An Electronic Commerce System Prototype and Its Implementations. [Citation Graph (0, 0)][DBLP]
    CIT, 2005, pp:966-970 [Conf]
  3. Yichun Liu, Jianming Fu, Huanguo Zhang
    An Optimistic Fair Protocol for P2P Chained Transaction. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2005, pp:136-145 [Conf]
  4. Fei Yan, Weizhong Qiang, Zhi-Dong Shen, Chunrun Chen, Huanguo Zhang, Deqing Zou
    Daonity: An Experience on Enhancing Grid Security by Trusted Computing Technology. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:227-235 [Conf]
  5. Fajiang Yu, Huanguo Zhang, Fei Yan, Song Gao
    An Improved Global Trust Value Computing Method in P2P System. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:258-267 [Conf]
  6. Bo Meng, Huanguo Zhang, Qianxing Xiong
    The Practical Detailed Requirements of Accountability and Its Application in the Electronic Payment Protocols. [Citation Graph (0, 0)][DBLP]
    EEE, 2005, pp:556-561 [Conf]
  7. Jianming Fu, Lei Zhang, Weinan Li, Huanguo Zhang
    An Adaptive Service Strategy Based on User Rating in P2P. [Citation Graph (0, 0)][DBLP]
    GCC, 2005, pp:860-870 [Conf]
  8. Min Luo, Lina Wang, Huanguo Zhang, Jin Chen
    A Research on Intrusion Detection Based on Unsupervised Clustering and Support Vector Machine. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:325-336 [Conf]
  9. Zhi-Dong Shen, Xiao-Ping Wu, Yu-Hua Wang, Wen-Ling Peng, Huanguo Zhang
    Group Key Management in Grid Environment. [Citation Graph (0, 0)][DBLP]
    IMSCCS (1), 2006, pp:626-631 [Conf]
  10. Zhi-Dong Shen, Fei Yan, Weizhong Qiang, Xiao-Ping Wu, Huanguo Zhang
    Grid System Integrated with Trusted Computing Platform. [Citation Graph (0, 0)][DBLP]
    IMSCCS (1), 2006, pp:619-625 [Conf]
  11. Min Yang, Huanguo Zhang, Jianming Fu, Fei Yan
    A Framework for Adaptive Anomaly Detection Based on Support Vector Data Description. [Citation Graph (0, 0)][DBLP]
    NPC, 2004, pp:443-450 [Conf]
  12. Qingshu Meng, Huanguo Zhang, Min Yang, Jingsong Cui
    On the degree of homogeneous bent functions. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2007, v:155, n:5, pp:665-669 [Journal]
  13. Jianming Fu, Binglan Chen, Huanguo Zhang
    A Worm Containment Model Based on Neighbor-Alarm. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:449-457 [Conf]
  14. Bang-ju Wang, Huanguo Zhang, Zhang-yi Wang, Yu-Hua Wang
    Speeding Up Scalar Multiplication Using a New Signed Binary Representation for Integers. [Citation Graph (0, 0)][DBLP]
    MCAM, 2007, pp:277-285 [Conf]
  15. Jun Song, Huanguo Zhang, Qingshu Meng, Zhang-yi Wang
    Cryptanalysis of Two-Round DES Using Genetic Algorithms. [Citation Graph (0, 0)][DBLP]
    ISICA, 2007, pp:583-590 [Conf]
  16. Yuan Yuan, Yan Tong, Huanguo Zhang
    Complete Mapping Polynomials over Finite Field F16. [Citation Graph (0, 0)][DBLP]
    WAIFI, 2007, pp:147-158 [Conf]

  17. A Secure Multi-party Computing Model Based on Trusted Computing Platform. [Citation Graph (, )][DBLP]


  18. Research on Unified Network Access Control Architecture. [Citation Graph (, )][DBLP]


  19. PerformTrust: Trust model integrated past and current performance in P2P file sharing systems. [Citation Graph (, )][DBLP]


  20. Building Trusted Sub-domain for the Grid with Trusted Computing. [Citation Graph (, )][DBLP]


  21. Research on accountability in electronic transaction. [Citation Graph (, )][DBLP]


  22. Mobile Agents Integrity Research. [Citation Graph (, )][DBLP]


  23. A hash-TLB approach for MMU virtualization in xen/IA64. [Citation Graph (, )][DBLP]


  24. Type Flaw Attacks and Prevention in Security Protocols. [Citation Graph (, )][DBLP]


  25. Trusted Code Remote Execution through Trusted Computing and Virtualization. [Citation Graph (, )][DBLP]


  26. Efficient Modular Exponentiation with Three-Moduli (2n 1, 2n+3). [Citation Graph (, )][DBLP]


  27. A New Data Protecting Scheme Based on TPM. [Citation Graph (, )][DBLP]


  28. Innovations for Grid Security from Trusted Computing. [Citation Graph (, )][DBLP]


  29. An Efficiency Security Model of Routing Protocol in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  30. Quantitative Cryptanalysis of Six-Round DES Using Evolutionary Algorithms. [Citation Graph (, )][DBLP]


  31. Cryptanalysis of Transposition Cipher Using Simulated Annealing Genetic Algorithm. [Citation Graph (, )][DBLP]


  32. A Trusted Computing Model Based on Code Authorization. [Citation Graph (, )][DBLP]


  33. VNIDA: Building an IDS Architecture Using VMM-Based Non-Intrusive Approach. [Citation Graph (, )][DBLP]


  34. Certificateless One-Way Authenticated Two-Party Key Agreement Protocol. [Citation Graph (, )][DBLP]


  35. Design Secure Contexts Detect Based on Lattice for Grid Computing Environment. [Citation Graph (, )][DBLP]


  36. An Introduction to Data Capturing. [Citation Graph (, )][DBLP]


  37. Secure Key Management of Mobile Agent System Using TPM-Based Technology on Trusted Computing Platform. [Citation Graph (, )][DBLP]


  38. A Test Method of Trusted Computing Supporting Software. [Citation Graph (, )][DBLP]


  39. Research on Automated Testing of the Trusted Platform Model. [Citation Graph (, )][DBLP]


  40. Design and Implementation of an Integrity Measurement System Based on Windows Trusted Computing Platform. [Citation Graph (, )][DBLP]


  41. Dynamic Trustiness Authentication Framework Based on Software's Behavior Integrity. [Citation Graph (, )][DBLP]


  42. Research on Chinese Key Words Mining with Malicious Jamming in English. [Citation Graph (, )][DBLP]


  43. Evolutionary Design of Random Number Generator. [Citation Graph (, )][DBLP]


  44. A novel algorithm enumerating bent functions. [Citation Graph (, )][DBLP]


Search in 0.012secs, Finished in 0.014secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002