Sihan Qing

According to our database1, Sihan Qing authored at least 46 papers between 1999 and 2016.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Research on Security Algorithm of Virtual Machine Live Migration for KVM Virtualization System.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

2015
Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity.
Inf. Sci., 2015

A Self-Matching Sliding Block Algorithm Applied to Deduplication in Distributed Storage System.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

2014
Winnowing Double Structure for Wildcard Query in Payload Attribution.
Proceedings of the Information Security - 17th International Conference, 2014

Winnowing Multihashing Structure with Wildcard Query.
Proceedings of the Web Technologies and Applications, 2014

CoChecker: Detecting Capability and Sensitive Data Leaks from Component Chains in Android.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

Some issues regarding operating system security.
Proceedings of the 2014 IEEE/ACIS 13th International Conference on Computer and Information Science, 2014

2013
A Covert Channel Using Event Channel State on Xen Hypervisor.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

2012
Reliable Migration Module in Trusted Cloud Based on Security Level - Design and Implementation.
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012

Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

A Covert Channel Using Core Alternation.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
Sorcery: Overcoming deceptive votes in P2P content sharing systems.
Peer-to-Peer Netw. Appl., 2011

Towards a Reliable Spam-Proof Tagging System.
Proceedings of the Fifth International Conference on Secure Software Integration and Reliability Improvement, 2011

A Way of Key Management in Cloud Storage Based on Trusted Computing.
Proceedings of the Network and Parallel Computing - 8th IFIP International Conference, 2011

A Variant of Boyen-Waters Anonymous IBE Scheme.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

SecGuard: Secure and Practical Integrity Protection Model for Operating Systems.
Proceedings of the Web Technologies and Applications - 13th Asia-Pacific Web Conference, 2011

2009
Sorcery: Could We Make P2P Content Sharing Systems Robust to Deceivers?.
Proceedings of the Proceedings P2P 2009, 2009

SpamResist: Making Peer-to-Peer Tagging Systems Robust to Spam.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

SpamClean: Towards Spam-Free Tagging Systems.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
VNIDA: Building an IDS Architecture Using VMM-Based Non-Intrusive Approach.
Proceedings of the International Workshop on Knowledge Discovery and Data Mining, 2008

A Practical Certified E-Mail System with Temporal Authentication Based on Transparent TSS.
Proceedings of the Ninth ACIS International Conference on Software Engineering, 2008

A hash-TLB approach for MMU virtualization in xen/IA64.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008

Efficient Universally Composable Password-Based Key Exchange.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2007
Design of secure operating systems with high security levels.
Sci. China Ser. F Inf. Sci., 2007

A dynamic information flow model of secure systems.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

2006
Formal analysis and design of multi-party fair exchange protocols.
Sci. China Ser. F Inf. Sci., 2006

A formal model for integrity protection based on DTE technique.
Sci. China Ser. F Inf. Sci., 2006

Supporting Ad-hoc Collaboration with Group-based RBAC Model.
Proceedings of the 2nd International ICST Conference on Collaborative Computing: Networking, 2006

A Practical Alternative to Domain and Type Enforcement Integrity Formal Models.
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006

2005
A survey and trends on Internet worms.
Comput. Secur., 2005

A formal model of fair exchange protocols.
Sci. China Ser. F Inf. Sci., 2005

A new formal model for privilege control with supporting POSIX capability mechanism.
Sci. China Ser. F Inf. Sci., 2005

Optimization of Covert Channel Identification.
Proceedings of the 3rd International IEEE Security in Storage Workshop (SISW 2005), 2005

An Administration Model of DRBAC on the Web.
Proceedings of the 2005 IEEE International Conference on e-Business Engineering (ICEBE 2005), 2005

Covert Channel Identification Founded on Information Flow Analysis.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
A New CEMBS Based on RSA Signatures and Its Application in Constructing Fair Exchange Protocol.
Proceedings of the 2004 IEEE International Conference on e-Technology, 2004

2003
Study on Strand Space Model Theory.
J. Comput. Sci. Technol., 2003

Security Flaws in Several Group Signatures Proposed by Popescu.
IACR Cryptol. ePrint Arch., 2003

2001
Threshold Undeniable RSA Signature Scheme.
Proceedings of the Information and Communications Security, Third International Conference, 2001

Applying NCP Logic to the Analysis of SSL 3.0.
Proceedings of the Information and Communications Security, Third International Conference, 2001

Square Attack on Reduced Camellia Cipher.
Proceedings of the Information and Communications Security, Third International Conference, 2001

2000
Power Analysis of RC6 and Serpent.
Proceedings of the Information Security for Global Information Infrastructures, 2000

Analysis and Design of E-voting Protocol.
Proceedings of the Information Security for Global Information Infrastructures, 2000

A Simple Algorithm for Computing Several Sequences Synthesis.
Proceedings of the Information Security for Global Information Infrastructures, 2000

The Defense Framework for Large-scale Computer Network System.
Proceedings of the Information Security for Global Information Infrastructures, 2000

1999
Cryptanalysis of some AES Candidate Algorithms.
Proceedings of the Information and Communication Security, Second International Conference, 1999


  Loading...