Zhong Chen

Orcid: 0000-0002-5785-2912

Affiliations:
  • Peking University, School of Electronics Engineering and Computer Science, Beijing, China


According to our database1, Zhong Chen authored at least 184 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Accelerating block lifecycle on blockchain via hardware transactional memory.
J. Parallel Distributed Comput., February, 2024

2023
DFHelper: Help clients to participate in federated learning tasks.
Appl. Intell., May, 2023

sChain: An Efficient and Secure Solution for Improving Blockchain Storage.
IEEE Trans. Inf. Forensics Secur., 2023

Enabling Integrity and Compliance Auditing in Blockchain-Based GDPR-Compliant Data Management.
IEEE Internet Things J., 2023

When Contracts Meets Crypto: Exploring Developers' Struggles with Ethereum Cryptographic APIs.
CoRR, 2023

LightCert4IoTs: Blockchain-Based Lightweight Certificates Authentication for IoT Applications.
IEEE Access, 2023

TDID: Transparent and Efficient Decentralized Identity Management with Blockchain.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2023

Siguard: Detecting Signature-Related Vulnerabilities in Smart Contracts.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering: ICSE 2023 Companion Proceedings, 2023

DIDAPPER: A Practical and Auditable On-Chain Identity Service for Decentralized Applications.
Proceedings of the IEEE International Conference on Decentralized Applications and Infrastructures, 2023

Privacy Protection Scheme for Epidemiological Investigation Based on Blockchain Technology.
Proceedings of the 5th Blockchain and Internet of Things Conference, 2023

Hades: Practical Decentralized Identity with Full Accountability and Fine-grained Sybil-resistance.
Proceedings of the Annual Computer Security Applications Conference, 2023

2022
Make aspect-based sentiment classification go further: step into the long-document-level.
Appl. Intell., 2022

Smifier: A Smart Contract Verifier for Composite Transactions.
Proceedings of the 34th International Conference on Software Engineering and Knowledge Engineering, 2022

Xscope: Hunting for Cross-Chain Bridge Attacks.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

TBFT: Efficient Byzantine Fault Tolerance Using Trusted Execution Environment.
Proceedings of the IEEE International Conference on Communications, 2022

DPLogChain: A Dynamic Packaging LogChain based on Random Witness.
Proceedings of the IEEE International Conference on Communications, 2022

ChainDB: Ensuring Integrity of Querying Off-Chain Data on Blockchain.
Proceedings of the 2022 5th International Conference on Blockchain Technology and Applications, 2022

PShard: A Practical Sharding Protocol for Enterprise Blockchain.
Proceedings of the 2022 5th International Conference on Blockchain Technology and Applications, 2022

ESUM: an efficient UTXO schedule model.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2022

2021
LightLedger: A Novel Blockchain-Based Domain Certificate Authentication and Validation Scheme.
IEEE Trans. Netw. Sci. Eng., 2021

A digital rights management system based on a scalable blockchain.
Peer-to-Peer Netw. Appl., 2021

Correction to: A digital rights management system based on a scalable blockchain.
Peer-to-Peer Netw. Appl., 2021

TrustCross: Enabling Confidential Interoperability across Blockchains Using Trusted Hardware.
CoRR, 2021

TBFT: Understandable and Efficient Byzantine Fault Tolerance using Trusted Execution Environment.
CoRR, 2021

OverlapShard: Overlap-based Sharding Mechanism.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

Associated Lattice-BERT for Spoken Language Understanding.
Proceedings of the Neural Information Processing - 28th International Conference, 2021

FASTBLOCK: Accelerating Blockchains via Hardware Transactional Memory.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

TrustCross: Enabling Confidential Interoperability across Blockchains Using Trusted Hardware.
Proceedings of the ICBTA 2021: 4th International Conference on Blockchain Technology and Applications, Xi'an, China, December 17, 2021

2020
A new stable collocation method for solving a class of nonlinear fractional delay differential equations.
Numer. Algorithms, 2020

Studying gas exceptions in blockchain-based cloud applications.
J. Cloud Comput., 2020

EShield: protect smart contracts against reverse engineering.
Proceedings of the ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020

Kaya: A Testing Framework for Blockchain-based Decentralized Applications.
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2020

BB-PKI: Blockchain-Based Public Key Infrastructure Certificate Management.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

PassPage: Graphical Password Authentication Scheme Based on Web Browsing Records.
Proceedings of the Financial Cryptography and Data Security, 2020

2019
Performance Analysis of the Libra Blockchain: An Experimental Study.
CoRR, 2019

Peer-to-peer file sharing in next generation eXpressive Internet Architecture.
CCF Trans. Netw., 2019

Towards automated testing of blockchain-based decentralized applications.
Proceedings of the 27th International Conference on Program Comprehension, 2019

EasyFlow: keep ethereum away from overflow.
Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings, 2019

Aspect Based Hierarchical System: A Fine-grained Sentiment Analysis System in Edge Computing.
Proceedings of the IEEE International Conference on Industrial Cyber Physical Systems, 2019

AuthLedger: A Novel Blockchain-based Domain Name Authentication Scheme.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

Understanding Out of Gas Exceptions on Ethereum.
Proceedings of the Blockchain and Trustworthy Systems - First International Conference, 2019

2018
ReGuard: finding reentrancy bugs in smart contracts.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

Analysis of Man-In-The-Middle of Attack on Bitcoin Address.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

2017
Seamless service migration for human-centered computing in future Internet architecture.
Proceedings of the 2017 IEEE SmartWorld, 2017

Exploring the Network of Real-World Passwords: Visualization and Estimation.
Proceedings of the Security and Privacy in Communication Networks, 2017

2016
Establish the Intrinsic Binding in Naming Space for Future Internet Using Combined Public Key.
Proceedings of the 11th International Conference on Future Internet Technologies, 2016

2015
SCRHM: A Secure Continuous Remote Health Monitoring System.
Int. J. Distributed Sens. Networks, 2015

The Scale-free Network of Passwords : Visualization and Estimation of Empirical Passwords.
CoRR, 2015

Location Semantics Protection Based on Bayesian Inference.
Proceedings of the Web-Age Information Management - 16th International Conference, 2015

API Sequences Based Malware Detection for Android.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

Vulnerabilities Scoring Approach for Cloud SaaS.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

Making Tagging Systems Resistant to Tricky Spam Attacks.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

PassApp: My App is My Password!
Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2015

Accelerating RSA with Fine-Grained Parallelism Using GPU.
Proceedings of the Information Security Practice and Experience, 2015

Attribute-Based Keyword Search Efficiency Enhancement via an Online/Offline Approach.
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015

A Secure Route Optimization Mechanism for Expressive Internet Architecture (XIA) Mobility.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

Design of network mobility support in eXpressive Internet Architecture.
Proceedings of the International Conference on Connected Vehicles and Expo, 2015

Appearance similarity evaluation for Android applications.
Proceedings of the Seventh International Conference on Advanced Computational Intelligence, 2015

Trustworthy Collaborative Filtering through Downweighting Noise and Redundancy.
Proceedings of the Web Technologies and Applications - 17th Asia-PacificWeb Conference, 2015

2014
Certificate-free ad hoc anonymous authentication.
Inf. Sci., 2014

Hierarchical identity-based encryption without key delegation in decryption.
Int. J. Grid Util. Comput., 2014

Automated enforcement for relaxed information release with reference points.
Sci. China Inf. Sci., 2014

Edges Protection in Multiple Releases of Social Network Data.
Proceedings of the Web-Age Information Management - 15th International Conference, 2014

Cache-Aware Query Processing with User Privacy Protection in Location-Based Services.
Proceedings of the Web-Age Information Management, 2014

Privacy Protection against Query Prediction in Location-Based Services.
Proceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014

PUF-Based RFID Ownership Transfer Protocol in an Open Environment.
Proceedings of the 15th International Conference on Parallel and Distributed Computing, 2014

Protecting Elliptic Curve Cryptography Against Memory Disclosure Attacks.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

2013
Semantic web services publication and OCT-based discovery in structured P2P network.
Serv. Oriented Comput. Appl., 2013

New identity-based three-party authenticated key agreement protocol with provable security.
J. Netw. Comput. Appl., 2013

An efficient certificateless aggregate signature with constant pairing computations.
Inf. Sci., 2013

Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys.
Inf. Sci., 2013

Security Flaw of an ECC-based Signcryption Scheme with Anonymity.
Int. J. Netw. Secur., 2013

Efficient communication scheme with confidentiality and privacy for vehicular networks.
Comput. Electr. Eng., 2013

Authenticating Users of Recommender Systems Using Naive Bayes.
Proceedings of the Web Information Systems Engineering - WISE 2013, 2013

Sensitive Edges Protection in Social Networks.
Proceedings of the Web-Age Information Management - 14th International Conference, 2013

A Hybrid Approach for Privacy Preservation in Location Based Queries.
Proceedings of the Web-Age Information Management, 2013

Fuzzy Keyword Search over Encrypted Data in the Public Key Setting.
Proceedings of the Web-Age Information Management - 14th International Conference, 2013

Accelerating AES in JavaScript with WebGL.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

CQArank: jointly model topics and expertise in community question answering.
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013

MisDis: An Efficent Misbehavior Discovering Method Based on Accountability and State Machine in VANET.
Proceedings of the Web Technologies and Applications - 15th Asia-Pacific Web Conference, 2013

An Efficient Privacy-Preserving RFID Ownership Transfer Protocol.
Proceedings of the Web Technologies and Applications - 15th Asia-Pacific Web Conference, 2013

2012
Information-theoretic modeling of false data filtering schemes in wireless sensor networks.
ACM Trans. Sens. Networks, 2012

Efficient privacy-preserving authentication protocol for vehicular communications with trustworthy.
Secur. Commun. Networks, 2012

Provably secure and efficient certificateless authenticated tripartite key agreement protocol.
Math. Comput. Model., 2012

Exploiting Consumer Reviews for Product Feature Ranking.
J. Comput. Sci. Technol., 2012

Further Improvement of An Authentication Scheme with User Anonymity for Wireless Communications.
Int. J. Netw. Secur., 2012

Bidder-anonymous English auction protocol based on revocable ring signature.
Expert Syst. Appl., 2012

Efficient and multi-level privacy-preserving communication protocol for VANET.
Comput. Electr. Eng., 2012

RGH: An Efficient RSU-Aided Group-Based Hierarchical Privacy Enhancement Protocol for VANETs.
Proceedings of the Web-Age Information Management - 13th International Conference, 2012

PKU-STRAW-L: A Simulative Platform Evaluate the Power-Saving Rate of the Intelligent Street Lamp System.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012

iSac: Intimacy Based Access Control for Social Network Sites.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012

P2P-based Publication and Location of Web Ontology for Knowledge Sharing in Virtual Communities.
Proceedings of the 24th International Conference on Software Engineering & Knowledge Engineering (SEKE'2012), 2012

A RFID Path-Checking Protocol Based on Ordered Multisignatures.
Proceedings of the Radio Frequency Identification System Security, 2012

Reliable Migration Module in Trusted Cloud Based on Security Level - Design and Implementation.
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012

Permission-Based Abnormal Application Detection for Android.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Privacy Protection in Social Networks Using l-Diversity.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

A Privacy-Preserving Path-Checking Solution for RFID-Based Supply Chains.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

On key issuing privacy in distributed online social networks.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012

Resisting relay attacks on vehicular Passive Keyless Entry and start systems.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012

Towards privacy-preserving RFID-based location-based services.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012

P2P-Based Publication and Sharing of Axioms in OWL Ontologies for SPARQL Query Processing in Distributed Environment.
Proceedings of the Web Technologies and Applications - 14th Asia-Pacific Web Conference, 2012

PUF-Based RFID Authentication Protocol against Secret Key Leakage.
Proceedings of the Web Technologies and Applications - 14th Asia-Pacific Web Conference, 2012

2011
Sorcery: Overcoming deceptive votes in P2P content sharing systems.
Peer-to-Peer Netw. Appl., 2011

Efficient three-party authenticated key agreement protocol in certificateless cryptography.
Int. J. Comput. Math., 2011

Generic Methods to Achieve Tighter Security Reductions for a Category of IBE Schemes.
IACR Cryptol. ePrint Arch., 2011

A New Enforcement on Declassification with Reachability Analysis
CoRR, 2011

Phagocytes: A Holistic Defense and Protection Against Active P2P Worms
CoRR, 2011

Green: Towards a Pollution-Free Peer-to-Peer Content Sharing Service
CoRR, 2011

On the security of an identity based multi-proxy signature scheme.
Comput. Electr. Eng., 2011

Enforcing Reactive Noninterference with Reachability Analysis.
Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011

Toward Pairing-Free Certificateless Authenticated Key Exchanges.
Proceedings of the Information Security, 14th International Conference, 2011

New Fully Secure Hierarchical Identity-Based Encryption with Constant Size Ciphertexts.
Proceedings of the Information Security Practice and Experience, 2011

Mobile Browser as a Second Factor for Web Authentication.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2011

Sitab: Combating Spam in Tagging Systems via Users' Implicit Tagging Behavior.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2011

Strong Security Enabled Certificateless Aggregate Signatures Applicable to Mobile Computation.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

Fully Secure Unidirectional Identity-Based Proxy Re-encryption.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011

A Multi-compositional Enforcement on Information Flow Security.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

A Variant of Boyen-Waters Anonymous IBE Scheme.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

Lightweight RFID Mutual Authentication Protocol against Feasible Problems.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

A traceable privacy-preserving authentication protocol for VANETs based on proxy re-signature.
Proceedings of the Eighth International Conference on Fuzzy Systems and Knowledge Discovery, 2011

A Novel Commutative Blinding Identity Based Encryption Scheme.
Proceedings of the Foundations and Practice of Security, 2011

A New Leakage-Resilient IBE Scheme in the Relative Leakage Model.
Proceedings of the Data and Applications Security and Privacy XXV, 2011

Produre: A Novel Proximity Discovery Mechanism in Location Tagging System.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

A Traceable Certificateless Threshold Proxy Signature Scheme from Bilinear Pairings.
Proceedings of the Web Technologies and Applications - 13th Asia-Pacific Web Conference, 2011

Need for Symmetry: Addressing Privacy Risks in Online Social Networks.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications, 2011

Enforcing Relaxed Declassifications with Reference Points.
Proceedings of the 10th IEEE/ACIS International Conference on Computer and Information Science, 2011

2010
A Secure Routing Protocol and its application in Multi-sink Wireless Sensor Networks.
J. Networks, 2010

Towards Risk Evaluation of Denial-of-Service Vulnerabilities in Security Protocols.
J. Comput. Sci. Technol., 2010

Supermarket Service Modeling and Evaluation.
Int. J. Serv. Sci. Manag. Eng. Technol., 2010

Filtering false data via authentic consensus in vehicle ad hoc networks.
Int. J. Auton. Adapt. Commun. Syst., 2010

New Construction of Identity-based Proxy Re-encryption.
IACR Cryptol. ePrint Arch., 2010

Secure Information Flow by Model Checking Pushdown System
CoRR, 2010

Privacy-Preserving English Auction Protocol with Round Efficiency
CoRR, 2010

Efficient Privacy-Preserving Authentication Protocol for Vehicular Communications with Trustworthy
CoRR, 2010

Extracting Service Aspects from Web Reviews.
Proceedings of the Web Information Systems and Mining - International Conference, 2010

SWORDS: Improving Sensor Networks Immunity under Worm Attacks.
Proceedings of the Web-Age Information Management, 11th International Conference, 2010

An Approach to Semantic Web Services Publication and Discovery Based on OWL Ontology Inference.
Proceedings of the Fifth IEEE International Symposium on Service-Oriented System Engineering, 2010

PDUS: P2P-Based Distributed UDDI Service Discovery Approach.
Proceedings of the International Conference on Service Sciences, 2010

Secure Information Flow in Java via Reachability Analysis of Pushdown System.
Proceedings of the 10th International Conference on Quality Software, 2010

Graph-based service quality evaluation through mining Web reviews.
Proceedings of the 6th International Conference on Natural Language Processing and Knowledge Engineering, 2010

Tagging online service reviews.
Proceedings of the 6th International Conference on Natural Language Processing and Knowledge Engineering, 2010

The design and implementation of an approach to publish and discover Semantic Web Services.
Proceedings of the 2010 IEEE International Conference on Intelligent Systems and Knowledge Engineering, 2010

Implementing Attribute-Based Encryption in Web Services.
Proceedings of the IEEE International Conference on Web Services, 2010

DSpam: Defending Against Spam in Tagging Systems via Users' Reliability.
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010

Ciphertext Policy Attribute-Based Proxy Re-encryption.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

An Adjacency Matrixes-Based Model for Network Security Analysis.
Proceedings of IEEE International Conference on Communications, 2010

Social Services Computing: Concepts, Research Challenges, and Directions.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010

A Hybrid Movie Recommender Based on Ontology and Neural Networks.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010

Claper: Recommend classical papers to beginners.
Proceedings of the Seventh International Conference on Fuzzy Systems and Knowledge Discovery, 2010

When ABE Meets RSS.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

Identity-based encryption based on DHIES.
Proceedings of the 5th ACM Symposium on Information, 2010

Survey of Authentication in Mobile IPv6 Network.
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010

Generating Tags for Service Reviews.
Proceedings of the Advanced Data Mining and Applications - 6th International Conference, 2010

2009
A New Method to Generate Attack Graphs.
Proceedings of the Third IEEE International Conference on Secure Software Integration and Reliability Improvement, 2009

Securing key issuing in peer-to-peer networks.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

A holistic mechanism against file pollution in peer-to-peer networks.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

Sorcery: Could We Make P2P Content Sharing Systems Robust to Deceivers?.
Proceedings of the Proceedings P2P 2009, 2009

SKIP: A Secure Key Issuing Scheme for Peer-to-Peer Networks.
Proceedings of the Fifth International Conference on Networking and Services, 2009

Trusted Isolation Environment: An Attestation Architecture with Usage Control Model.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

Hash-Based Tag Ownership Transfer Protocol against Traceability.
Proceedings of the 2009 IEEE International Conference on e-Business Engineering, 2009

SpamResist: Making Peer-to-Peer Tagging Systems Robust to Spam.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Automatic Data Extraction from Web Discussion Forums.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009

SpamClean: Towards Spam-Free Tagging Systems.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Filtering Spam in Social Tagging System with Dynamic Behavior Analysis.
Proceedings of the 2009 International Conference on Advances in Social Network Analysis and Mining, 2009

Evaluating Network Security With Two-Layer Attack Graphs.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
FBSR: feedback-based secure routing protocol for wireless sensor networks.
Int. J. Pervasive Comput. Commun., 2008

Securing Peer-to-Peer Content Sharing Service from Poisoning Attacks.
Proceedings of the Proceedings P2P'08, 2008

A Game Theoretic Approach Based Access Control Mechanism.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

TSearch: A Self-learning Vertical Search Spider for Travel.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Efficient Identity-Based Key Issue with TPM.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Pseudo-randomness Inside Web Browsers.
Proceedings of the Information and Communications Security, 10th International Conference, 2008

A Trust and Risk Framework to Enhance Reliable Interaction in E-Commerce.
Proceedings of the 2008 IEEE International Conference on e-Business Engineering, 2008

WebIBC: Identity Based Cryptography for Client Side Security in Web Applications.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

An Improved Scheme for Delegation Based on Usage Control.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

Scalable Byzantine Fault Tolerant Public Key Authentication for Peer-to-Peer Networks.
Proceedings of the Euro-Par 2008, 2008

Automatic Construction and Optimization of Layered Network Attack Graph.
Proceedings of the Novel Algorithms and Techniques in Telecommunications and Networking, 2008

How to Optimize the Cryptographic Symmetric Primitives on Loongson-2E Microprocessor.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols.
Proceedings of the Information Security Practice and Experience, 2007

Hybrid Overlay Structure Based on Virtual Node.
Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), 2007

CuboidTrust: A Global Reputation-Based Trust Model in Peer-to-Peer Networks.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

LENO: LEast Rotation Near-Optimal Cluster Head Rotation Strategy in Wireless Sensor Networks.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
C4W: An Energy Efficient Public Key Cryptosystem for Large-Scale Wireless Sensor Networks.
Proceedings of the IEEE 3rd International Conference on Mobile Adhoc and Sensor Systems, 2006

Feedback: Towards Dynamic Behavior and Secure Routing forWireless Sensor Networks.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
A Formal Language for Access Control Policies in Distributed Environment.
Proceedings of the 2005 IEEE / WIC / ACM International Conference on Web Intelligence (WI 2005), 2005


  Loading...