The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Yixin Jiang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yixin Jiang, Chuang Lin, Zhiguang Shan, Zhen Chen
    Modeling and Performance Analysis of Network-Based Intrusion Detection Cluster. [Citation Graph (0, 0)][DBLP]
    ISCA PDCS, 2004, pp:530-535 [Conf]
  2. Xiaowen Chu, Yixin Jiang, Chuang Lin, Fujun Feng
    Self-certified Mutual Authentication and Key Exchange Protocol for Roaming Services. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:408-417 [Conf]
  3. Yixin Jiang, Chuang Lin, Zhen Chen, Hao Yin
    Using Petri Nets to Verify Security Policies in Mandatory Access Control Model. [Citation Graph (0, 0)][DBLP]
    IRI, 2004, pp:271-276 [Conf]
  4. Zhen Chen, Chuang Lin, Jia Ni, Dong-Hua Ruan, Bo Zheng, Yixin Jiang
    AntiWorm NPU-based Parallel Bloom Filters for TCP/IP Content Processing in Giga-Ethernet LAN. [Citation Graph (0, 0)][DBLP]
    LCN, 2005, pp:748-755 [Conf]
  5. Yixin Jiang, Chuang Lin, Xuemin Shen, Minghui Shi
    Mutual Authentication and Key Exchange Protocols with Anonymity Property for Roaming Services. [Citation Graph (0, 0)][DBLP]
    NETWORKING, 2005, pp:114-125 [Conf]
  6. Yixin Jiang, Chuang Lin, Hao Yin, Zhangxi Tan
    Security analysis of mandatory access control model. [Citation Graph (0, 0)][DBLP]
    SMC (6), 2004, pp:5013-5018 [Conf]
  7. Hao Yin, Zhangxi Tan, Chuang Lin, Yixin Jiang, Feng Qiu
    Modeling mobile Web services flow using generalized stochastic high-level Petri net. [Citation Graph (0, 0)][DBLP]
    SMC (5), 2004, pp:4953-4958 [Conf]
  8. Yixin Jiang, Chuang Lin, Minghui Shi, Xuemin Shen
    Self-healing group key distribution with time-limited node revocation for wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    Ad Hoc Networks, 2007, v:5, n:1, pp:14-23 [Journal]
  9. Kai Ouyang, Xiaowen Chu, Yixin Jiang, Hsiao-Hwa Chen, Jiangchuan Liu
    On the Homonymous Role in Role-Based Discretionary Access Control. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:313-322 [Conf]
  10. Yixin Jiang, Chuang Lin, Minghui Shi, Xuemin Shen, Xiaowen Chu
    A DoS and fault-tolerant authentication protocol for group communications in ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:11-12, pp:2428-2441 [Journal]

  11. Speeding Up Homomorpic Hashing Using GPUs. [Citation Graph (, )][DBLP]


  12. An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding. [Citation Graph (, )][DBLP]


  13. P-Coding: Secure Network Coding against Eavesdropping Attacks. [Citation Graph (, )][DBLP]


  14. ELCP: An Effort-Based Least Cost Path Scheme for MANETs. [Citation Graph (, )][DBLP]


  15. Measurements, Analysis and Modeling of Private Trackers. [Citation Graph (, )][DBLP]


  16. Risk-Aware QoP/QoS Optimization for Multimedia Applications in Wireless Networks. [Citation Graph (, )][DBLP]


  17. An Efficient Privacy-Preserving Scheme for Wireless Link Layer Security. [Citation Graph (, )][DBLP]


  18. A Tree-Based Signature Scheme for VANETs. [Citation Graph (, )][DBLP]


  19. ECMV: Efficient Certificate Management Scheme for Vehicular Networks. [Citation Graph (, )][DBLP]


  20. An Effective Early Warning Scheme against Pollution Dissemination for BitTorrent. [Citation Graph (, )][DBLP]


  21. Cooperative Peer-to-Peer Information Exchange via Wireless Network Coding. [Citation Graph (, )][DBLP]


  22. Efficient Re-Keying Scheme for Group Key Distribution. [Citation Graph (, )][DBLP]


  23. User authentication and undeniable billing support for agent-based roaming service in WLAN/cellular integrated mobile networks. [Citation Graph (, )][DBLP]


  24. A self-adaptive probabilistic packet filtering scheme against entropy attacks in network coding. [Citation Graph (, )][DBLP]


  25. An efficient dynamic-identity based signature scheme for secure network coding. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002