Yong-Zhong He

According to our database1, Yong-Zhong He authored at least 7 papers between 2008 and 2016.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Two image encryption methods with hiding effect based on moiré pattern.
Int. J. High Perform. Comput. Netw., 2016

2010
The Formal Model of DBMS Enforcing Multiple Security Polices.
J. Softw., 2010

A Fine Grained RBAC Model Supporting Flexible Administrative Separation of Duty.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

2009
User Authentication with Provable Security against Online Dictionary Attacks.
J. Networks, 2009

Usage Control in Conditional Access System with malicious Set-top Box.
Proceedings of the 2009 International Conference on Security & Management, 2009

2008
Context Active RBAC and its Applications.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

Configuring RBAC to Simulate Bell Model.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008


  Loading...