Dichao Peng

According to our database1, Dichao Peng authored at least 9 papers between 2005 and 2013.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
TrustVis: visualizing trust toward attack identification in distributed computing environments.
Secur. Commun. Networks, 2013

A Visual Analysis Approach for Community Detection of Multi-Context Mobile Social Networks.
J. Comput. Sci. Technol., 2013

2012
SideKnot: Revealing relation patterns for graph visualization.
Proceedings of the 2012 IEEE Pacific Visualization Symposium, 2012

2008
A Flexible Trust Model for Distributed Service Infrastructures.
Proceedings of the 11th IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2008), 2008

2007
User Behavior Identification for Trust Management in Pervasive Computing Systems.
Proceedings of the 11th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2007

2006
A Secure RFID Identity Reporting Protocol for Physical Attack Resistance.
J. Commun., 2006

A Security-Supportive Middleware Architecture for Pervasive Computing.
Proceedings of the Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September, 2006

True random number generator in RFID systems against traceability.
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006

2005
Communication Protection in IP-based Video Surveillance Systems.
Proceedings of the Seventh IEEE International Symposium on Multimedia (ISM 2005), 2005


  Loading...