The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ying Qiu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Xiangguo Cheng, Huafei Zhu, Ying Qiu, Xinmei Wang
    Efficient Group Signatures from Bilinear Pairing. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:128-139 [Conf]
  2. Ying Qiu, Peter Marbach
    Bandwidth Allocation in Wireless Ad Hoc Networks: A Price-Based Approach. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2003, pp:- [Conf]
  3. Huafei Zhu, Feng Bao, Tieyan Li, Ying Qiu
    More on Shared-Scalar-Product Protocols. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:142-152 [Conf]
  4. Ying Qiu, Jianying Zhou, Robert H. Deng
    Security Analysis and Improvement of Return Routability Protocol. [Citation Graph (0, 0)][DBLP]
    MADNES, 2005, pp:174-181 [Conf]
  5. Peter Marbach, Ying Qiu
    Cooperation in wireless ad hoc networks: a market-based approach. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2005, v:13, n:6, pp:1325-1338 [Journal]
  6. Ying Qiu, Feng Bao, Jianying Zhou
    Firewall for Dynamic IP Address in Mobile IPv6. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:467-479 [Conf]

  7. Somewhat Secure Mobile Electronic-Voting Systems Based on the Cut-and-Choose Mechanism. [Citation Graph (, )][DBLP]


  8. Mixed Commitments Mediated Transcoders: A Simple Implementation of Mercurial Mediated Transcoders. [Citation Graph (, )][DBLP]


  9. Tracing Stateful Pirate Decoders. [Citation Graph (, )][DBLP]


  10. A Lightweight Fast Handover Authentication Scheme in Mobile Networks. [Citation Graph (, )][DBLP]


  11. Model-Based Neural Network and Wavelet Packets Decomposition on Damage Detecting of Composites. [Citation Graph (, )][DBLP]


  12. Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing. [Citation Graph (, )][DBLP]


  13. Using Certificate-based Binding Update Protocol to Hide the Movement of Mobile Nodes in MIPv6. [Citation Graph (, )][DBLP]


  14. The Simulation of VRML Based Manipulator and Techniques. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002