Gendu Zhang

According to our database1, Gendu Zhang authored at least 18 papers between 1997 and 2011.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2011
Stable Topology Support for Tracing DDoS Attackers in MANET.
Proceedings of the Global Communications Conference, 2011

2008
Access Graph to Analyze Network Vulnerabilities.
Proceedings of the PACIIA 2008, 2008

Access Graph Based Risk Assessment Model for Network Information System.
Proceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology, 2008

An Improved Approach to Access Graph Generation.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2006
A Reputation Management Scheme Based on Global Trust Model for Peer-to-Peer Virtual Communities.
Proceedings of the Advances in Web-Age Information Management, 2006

O2-DN: An Overlay-based Distributed Rate Limit Framework to Defeat DDoS Attacks.
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006

A Reputation Management Framework Based on Global Trust Model for P2P Systems.
Proceedings of the Computational Science, 2006

Defending Against Meek DDoS Attacks By IP Traceback-based Rate Limiting.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

A Novel Rate Limit Algorithm Against Meek DDoS Attacks.
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006

A Distributed-Log-based IP Traceback Scheme to Defeat DDoS Attacks.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
An Adaptive Edge Marking Based Hierarchical IP Traceback System.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

A Similarity-Based Recommendation Filtering Algorithm for Establishing Reputation-Based Trust in Peer-to-Peer Electronic Communities.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

A Trust Management Model for Virtual Communities.
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005

Distributed-Log-based Scheme for IP Traceback.
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005

2000
Friendly Observers Ease Off-Line E-Cash.
Proceedings of the Smart Card Research and Advanced Applications, 2000

1999
Money Conservation via Atomicity in Fair Off-Line E-Cash.
Proceedings of the Information Security, Second International Workshop, 1999

1998
On the Security of Three-Party Cryptographic Protocols.
ACM SIGOPS Oper. Syst. Rev., 1998

1997
On the Properties of Cryptographic Protocols and the Weakness of the BAN-like Logics.
ACM SIGOPS Oper. Syst. Rev., 1997


  Loading...