|
Search the dblp DataBase
Xianxian Li:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Xianxian Li, Lijun Liu
A Multi-agent Cooperative Model and System for Integrated Security Monitoring. [Citation Graph (0, 0)][DBLP] CANS, 2006, pp:329-341 [Conf]
- Yu Zhang, Xianxian Li, Jinpeng Huai, Yunhao Liu
Access Control in Peer-to-Peer Collaborative Systems. [Citation Graph (0, 0)][DBLP] ICDCS Workshops, 2005, pp:835-840 [Conf]
- Jinpeng Huai, Yu Zhang, Xianxian Li, Yunhao Liu
Distributed Access Control in CROWN Groups. [Citation Graph (0, 0)][DBLP] ICPP, 2005, pp:435-442 [Conf]
- Jianxin Li, Jinpeng Huai, Qin Li, Xian-xian Li
Towards Security Analysis to Binding Update Protocol in Mobile IPv6 with Formal Method. [Citation Graph (0, 0)][DBLP] MSN, 2005, pp:1073-1080 [Conf]
- Jinpeng Huai, Xianxian Li, Wenyi Zhang, Jun Han, Yongzhen Zhuang
A Software Protocol of Goals and Operations Based on BDI Model. [Citation Graph (0, 0)][DBLP] SUTC (1), 2006, pp:454-461 [Conf]
- Xianxian Li, Jinpeng Huai
Efficient Non-Repudiation Multicast Source Authentication Schemes. [Citation Graph (0, 0)][DBLP] J. Comput. Sci. Technol., 2002, v:17, n:6, pp:820-829 [Journal]
- Dacheng Zhang, Jie Xu, Xianxian Li
Dynamic Cross-Realm Authentication for Multi-Party Service Interactions. [Citation Graph (0, 0)][DBLP] DSN, 2007, pp:440-449 [Conf]
A Multi-agents Contractual Approach to Incentive Provision in Non-cooperative Networks. [Citation Graph (, )][DBLP]
Automated synthesis of composite services with correctness guarantee. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
|