|
Search the dblp DataBase
Yeping He:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Chunyang Yuan, Yeping He, Jianbo He, Zhouyi Zhou
A Verifiable Formal Specification for RBAC Model with Constraints of Separation of Duty. [Citation Graph (0, 0)][DBLP] Inscrypt, 2006, pp:196-210 [Conf]
- Lingli Deng, Yeping He, Ziyao Xu, Chunyang Yuan
An Enhanced N-Way Exchange-Based Incentive Scheme for P2P File Sharing (Short Paper). [Citation Graph (0, 0)][DBLP] ICICS, 2006, pp:322-331 [Conf]
- Yeping He, Sihan Qing
Square Attack on Reduced Camellia Cipher. [Citation Graph (0, 0)][DBLP] ICICS, 2001, pp:238-245 [Conf]
- Hong Zhang, Yeping He, Zhiguo Shi
Spatial Context in Role-Based Access Control. [Citation Graph (0, 0)][DBLP] ICISC, 2006, pp:166-178 [Conf]
- Zhouyi Zhou, Bin Liang, Li Jiang, Wenchang Shi, Yeping He
A Formal Description of SECIMOS Operating System. [Citation Graph (0, 0)][DBLP] MMM-ACNS, 2005, pp:286-297 [Conf]
- Zhiguo Shi, Yeping He, Xiaoyong Huai, Hong Zhang
Identity Anonymity for Grid Computing Coordination based on Trusted Computing. [Citation Graph (0, 0)][DBLP] GCC, 2007, pp:403-410 [Conf]
- Ziyao Xu, Yeping He, Lingli Deng
A Multilevel Reputation System for Peer-to-Peer Networks. [Citation Graph (0, 0)][DBLP] GCC, 2007, pp:67-74 [Conf]
An Integrity Assurance Mechanism for Run-Time Programs. [Citation Graph (, )][DBLP]
Separation of Duty in Trust-Based Collaboration. [Citation Graph (, )][DBLP]
Static Analysis of a Class of Memory Leaks in TrustedBSD MAC Framework. [Citation Graph (, )][DBLP]
Trusted Reputation Management Service for Peer-to-Peer Collaboration. [Citation Graph (, )][DBLP]
Service Authenticity in P2P File-Sharing. [Citation Graph (, )][DBLP]
Enforcing Separation of Duty in Ad Hoc Collaboration. [Citation Graph (, )][DBLP]
Combating Index Poisoning in P2P File Sharing. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|