The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Gendu Zhang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yinan Jing, Peng Tu, Xueping Wang, Gendu Zhang
    Distributed-Log-based Scheme for IP Traceback. [Citation Graph (0, 0)][DBLP]
    CIT, 2005, pp:711-715 [Conf]
  2. Kui Meng, Yue Wang, Xu Zhang, Xiaochun Xiao, Gendu Zhang
    A Trust Management Model for Virtual Communities. [Citation Graph (0, 0)][DBLP]
    CIT, 2005, pp:741-745 [Conf]
  3. Yinan Jing, Jingtao Li, Xueping Wang, Xiaochun Xiao, Gendu Zhang
    A Distributed-Log-based IP Traceback Scheme to Defeat DDoS Attacks. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2006, pp:25-32 [Conf]
  4. Yinan Jing, Xueping Wang, Xiaochun Xiao, Gendu Zhang
    A Novel Rate Limit Algorithm Against Meek DDoS Attacks. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:467-476 [Conf]
  5. Shouhuai Xu, Moti Yung, Gendu Zhang
    Friendly Observers Ease Off-Line E-Cash. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2000, pp:3-18 [Conf]
  6. Jingtao Li, Yinan Jing, Peng Fu, Gendu Zhang, Yongqiang Chen
    A Similarity-Based Recommendation Filtering Algorithm for Establishing Reputation-Based Trust in Peer-to-Peer Electronic Communities. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:1017-1024 [Conf]
  7. Jingtao Li, Xueping Wang, Yongqiang Chen, Gendu Zhang
    A Reputation Management Framework Based on Global Trust Model for P2P Systems. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (1), 2006, pp:896-899 [Conf]
  8. Yinan Jing, Jingtao Li, Gendu Zhang
    An Adaptive Edge Marking Based Hierarchical IP Traceback System. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:1188-1197 [Conf]
  9. Yinan Jing, Zheng Xiao, Xueping Wang, Gendu Zhang
    O2-DN: An Overlay-based Distributed Rate Limit Framework to Defeat DDoS Attacks. [Citation Graph (0, 0)][DBLP]
    ICN/ICONS/MCL, 2006, pp:79- [Conf]
  10. Shouhuai Xu, Moti Yung, Gendu Zhang, Hong Zhu
    Money Conservation via Atomicity in Fair Off-Line E-Cash. [Citation Graph (0, 0)][DBLP]
    ISW, 1999, pp:14-31 [Conf]
  11. Jingtao Li, Xueping Wang, Bing Liu, Qian Wang, Gendu Zhang
    A Reputation Management Scheme Based on Global Trust Model for Peer-to-Peer Virtual Communities. [Citation Graph (0, 0)][DBLP]
    WAIM, 2006, pp:205-216 [Conf]
  12. Shouhuai Xu, Gendu Zhang, Hong Zhu
    On the Properties of Cryptographic Protocols and the Weakness of the BAN-like Logics. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1997, v:31, n:4, pp:12-23 [Journal]
  13. Shouhuai Xu, Gendu Zhang, Hong Zhu
    On the Security of Three-Party Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1998, v:32, n:3, pp:7-20 [Journal]
  14. Yinan Jing, Xueping Wang, Xiaochun Xiao, Gendu Zhang
    Defending Against Meek DDoS Attacks By IP Traceback-based Rate Limiting. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]

  15. An Improved Approach to Access Graph Generation. [Citation Graph (, )][DBLP]


  16. Access Graph to Analyze Network Vulnerabilities. [Citation Graph (, )][DBLP]


Search in 0.110secs, Finished in 0.111secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002