Xuehai Peng

According to our database1, Xuehai Peng authored at least 9 papers between 2003 and 2009.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2009
Proxy-Based Security Audit System for Remote Desktop Access.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

2008
TNC-UTM: A Holistic Solution to Secure Enterprise Networks.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Enhancing Tit-for-Tat Strategy to Cope with Free-Riding in Unreliable P2P Networks.
Proceedings of the Third International Conference on Internet and Web Applications and Services, 2008

2007
TNC-compatible NAC System implemented on Network Processor.
Proceedings of the 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 2007

2006
Research on Network Architecture with Trustworthiness and Controllability.
J. Comput. Sci. Technol., 2006

AM-Trie: An OC-192 Parallel Multidimensional Packet Classification Algorithm.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

AntiWorm NPU-based Parallel Bloom filters in Giga-Ethernet LAN.
Proceedings of IEEE International Conference on Communications, 2006

Architecture of Trustworthy Networks.
Proceedings of the Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September, 2006

2003
Modeling in hierarchical mobile IPv6 and intelligent mobility management scheme.
Proceedings of the IEEE 14th International Symposium on Personal, 2003


  Loading...