Ping Pan

Orcid: 0000-0002-2310-9434

According to our database1, Ping Pan authored at least 35 papers between 1999 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Stationary iterated weighted Tikhonov regularization method for identifying an unknown source term of time-fractional radial heat equation.
Numer. Algorithms, 2022

Image Encryption Scheme Based on Mixed Chaotic Bernoulli Measurement Matrix Block Compressive Sensing.
Entropy, 2022

Double-Matrix Decomposition Image Steganography Scheme Based on Wavelet Transform with Multi-Region Coverage.
Entropy, 2022

2021
New Commitment Schemes Based on Conjugacy Problems over Rubik's Groups.
Inf., 2021

Plaintext-Related Dynamic Key Chaotic Image Encryption Algorithm.
Entropy, 2021

2020
An Attitude Prediction Method for Autonomous Recovery Operation of Unmanned Surface Vehicle.
Sensors, 2020

Key Regulatory Effect of Activated HIF-1α/VEGFA Signaling Pathway in Systemic Capillary Leak Syndrome Confirmed by Bioinformatics Analysis.
J. Comput. Biol., 2020

Provably Secure Encryption Schemes With Zero Setup and Linear Speed by Using Rubik's Cubes.
IEEE Access, 2020

2018
Authenticity identification of speaker digital recording data based on quantum genetic algorithm.
Multim. Tools Appl., 2018

2016
LDP Extensions for Pseudowire Binding to Label Switched Path (LSP) Tunnels.
RFC, August, 2016

MPLS Transport Profile (MPLS-TP) Operations, Administration, and Maintenance (OAM) Identifiers Management Information Base (MIB).
RFC, January, 2016

2014
Requirements for MPLS Transport Profile (MPLS-TP) Shared Mesh Protection.
RFC, December, 2014

Efficient threshold public key encryption with full security based on dual pairing vector spaces.
Int. J. Commun. Syst., 2014

A Speculative Mechanism for Barrier Synchronization.
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014

Reliability Analysis of Business Continuity Based on SPN in Information System Security Management.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

2013
MPLS Transport Profile (MPLS-TP) Applicability: Use Cases and Design.
RFC, August, 2013

Label Switched Path (LSP) Ping for Pseudowire Forwarding Equivalence Classes (FECs) Advertised over IPv6.
RFC, January, 2013

Publicly Verifiable Secret Sharing Scheme with Provable Security against Chosen Secret Attacks.
Int. J. Distributed Sens. Networks, 2013

Chameleon Hash Functions and One-Time Signature Schemes from Inner Automorphism Groups.
Fundam. Informaticae, 2013

Efficient Construction of CCA-Secure Threshold PKE Based on Hashed Diffie-Hellman Assumption.
Comput. J., 2013

Open transport switch: a software defined networking architecture for transport networks.
Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, 2013

Bursting Data between Data Centers: Case for Transport SDN.
Proceedings of the IEEE 21st Annual Symposium on High-Performance Interconnects, 2013

2012
CSP-DHIES: a new public-key encryption scheme from matrix conjugation.
Secur. Commun. Networks, 2012

Block-based hardware scheduler design on Many-core architecture.
Proceedings of the 21st IEEE International Symposium on Industrial Electronics, 2012

Faculty Training of Computer Hardware Courses Based on University-enterprise Cooperation.
Proceedings of the 14th IEEE International Conference on High Performance Computing and Communication & 9th IEEE International Conference on Embedded Software and Systems, 2012

Record Branch Prediction: An Optimized Scheme for Two-level Branch Predictors.
Proceedings of the 14th IEEE International Conference on High Performance Computing and Communication & 9th IEEE International Conference on Embedded Software and Systems, 2012

2009
Rapid Service Creation Environment for service delivery platform based on service templates.
Proceedings of the Integrated Network Management, 2009

Simulation of Key Management Protocol in Wireless Sensor Networks.
Proceedings of the Second International Joint Conference on Computational Sciences and Optimization, 2009

2008
Asset-based requirement analysis in telecom Service Delivery Platform domain.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

Template based rapid service creation environment for service delivery platform.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

Common business process model for continuous SDP transformation.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

2005
Fast Reroute Extensions to RSVP-TE for LSP Tunnels.
RFC, May, 2005

2001
RSVP Refresh Overhead Reduction Extensions.
RFC, April, 2001

2000
BGRP: Sink-tree-based aggregation for inter-domain reservations.
J. Commun. Networks, 2000

1999
YESSIR: a simple reservation mechanism for the Internet.
Comput. Commun. Rev., 1999


  Loading...