Jian-bin Hu

According to our database1, Jian-bin Hu authored at least 52 papers between 2005 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Modeling Context-aware Legal Computing with Bigraphs.
Proceedings of the 2017 IEEE Symposium on Service-Oriented System Engineering, 2017

2016
Establish the Intrinsic Binding in Naming Space for Future Internet Using Combined Public Key.
Proceedings of the 11th International Conference on Future Internet Technologies, 2016

2015
Vulnerabilities Scoring Approach for Cloud SaaS.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

Making Tagging Systems Resistant to Tricky Spam Attacks.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

2014
Edges Protection in Multiple Releases of Social Network Data.
Proceedings of the Web-Age Information Management - 15th International Conference, 2014

2013
Security Flaw of an ECC-based Signcryption Scheme with Anonymity.
Int. J. Netw. Secur., 2013

Sensitive Edges Protection in Social Networks.
Proceedings of the Web-Age Information Management - 14th International Conference, 2013

MisDis: An Efficent Misbehavior Discovering Method Based on Accountability and State Machine in VANET.
Proceedings of the Web Technologies and Applications - 15th Asia-Pacific Web Conference, 2013

Context-Aware Service Modeling and Rule Evolution.
Proceedings of the 2013 10th Web Information System and Application Conference, 2013

2012
Further Improvement of An Authentication Scheme with User Anonymity for Wireless Communications.
Int. J. Netw. Secur., 2012

RGH: An Efficient RSU-Aided Group-Based Hierarchical Privacy Enhancement Protocol for VANETs.
Proceedings of the Web-Age Information Management - 13th International Conference, 2012

PKU-STRAW-L: A Simulative Platform Evaluate the Power-Saving Rate of the Intelligent Street Lamp System.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012

iSac: Intimacy Based Access Control for Social Network Sites.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012

Privacy Protection in Social Networks Using l-Diversity.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Resisting relay attacks on vehicular Passive Keyless Entry and start systems.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012

2011
On the security of an identity based multi-proxy signature scheme.
Comput. Electr. Eng., 2011

New Fully Secure Hierarchical Identity-Based Encryption with Constant Size Ciphertexts.
Proceedings of the Information Security Practice and Experience, 2011

Sitab: Combating Spam in Tagging Systems via Users' Implicit Tagging Behavior.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2011

A traceable privacy-preserving authentication protocol for VANETs based on proxy re-signature.
Proceedings of the Eighth International Conference on Fuzzy Systems and Knowledge Discovery, 2011

A Novel Commutative Blinding Identity Based Encryption Scheme.
Proceedings of the Foundations and Practice of Security, 2011

Produre: A Novel Proximity Discovery Mechanism in Location Tagging System.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

A Traceable Certificateless Threshold Proxy Signature Scheme from Bilinear Pairings.
Proceedings of the Web Technologies and Applications - 13th Asia-Pacific Web Conference, 2011

Need for Symmetry: Addressing Privacy Risks in Online Social Networks.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications, 2011

2010
A Secure Routing Protocol and its application in Multi-sink Wireless Sensor Networks.
J. Networks, 2010

Towards Risk Evaluation of Denial-of-Service Vulnerabilities in Security Protocols.
J. Comput. Sci. Technol., 2010

Filtering false data via authentic consensus in vehicle ad hoc networks.
Int. J. Auton. Adapt. Commun. Syst., 2010

New Construction of Identity-based Proxy Re-encryption.
IACR Cryptol. ePrint Arch., 2010

Efficient Privacy-Preserving Authentication Protocol for Vehicular Communications with Trustworthy
CoRR, 2010

SWORDS: Improving Sensor Networks Immunity under Worm Attacks.
Proceedings of the Web-Age Information Management, 11th International Conference, 2010

Implementing Attribute-Based Encryption in Web Services.
Proceedings of the IEEE International Conference on Web Services, 2010

DSpam: Defending Against Spam in Tagging Systems via Users' Reliability.
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010

Ciphertext Policy Attribute-Based Proxy Re-encryption.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

An Adjacency Matrixes-Based Model for Network Security Analysis.
Proceedings of IEEE International Conference on Communications, 2010

Data-Centric Trust Framework for High Integrity Wireless Sensor Networks.
Proceedings of the Advances in Grid and Pervasive Computing, 5th International Conference, 2010

Claper: Recommend classical papers to beginners.
Proceedings of the Seventh International Conference on Fuzzy Systems and Knowledge Discovery, 2010

When ABE Meets RSS.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

Identity-based encryption based on DHIES.
Proceedings of the 5th ACM Symposium on Information, 2010

2009
A New Method to Generate Attack Graphs.
Proceedings of the Third IEEE International Conference on Secure Software Integration and Reliability Improvement, 2009

Securing key issuing in peer-to-peer networks.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

A holistic mechanism against file pollution in peer-to-peer networks.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

SKIP: A Secure Key Issuing Scheme for Peer-to-Peer Networks.
Proceedings of the Fifth International Conference on Networking and Services, 2009

Automatic Data Extraction from Web Discussion Forums.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009

Evaluating Network Security With Two-Layer Attack Graphs.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
FBSR: feedback-based secure routing protocol for wireless sensor networks.
Int. J. Pervasive Comput. Commun., 2008

Scalable Byzantine Fault Tolerant Public Key Authentication for Peer-to-Peer Networks.
Proceedings of the Euro-Par 2008, 2008

Automatic Construction and Optimization of Layered Network Attack Graph.
Proceedings of the Novel Algorithms and Techniques in Telecommunications and Networking, 2008

2007
An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols.
Proceedings of the Information Security Practice and Experience, 2007

Hybrid Overlay Structure Based on Virtual Node.
Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), 2007

CuboidTrust: A Global Reputation-Based Trust Model in Peer-to-Peer Networks.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

2006
C4W: An Energy Efficient Public Key Cryptosystem for Large-Scale Wireless Sensor Networks.
Proceedings of the IEEE 3rd International Conference on Mobile Adhoc and Sensor Systems, 2006

Feedback: Towards Dynamic Behavior and Secure Routing forWireless Sensor Networks.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
A Formal Language for Access Control Policies in Distributed Environment.
Proceedings of the 2005 IEEE / WIC / ACM International Conference on Web Intelligence (WI 2005), 2005


  Loading...