dblp.uni-trier.dewww.uni-trier.de

Jian-bin Hu

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
8EEZhuhua Cai, Ruichuan Chen, Jianqiao Feng, Cong Tang, Zhong Chen, Jian-bin Hu: A holistic mechanism against file pollution in peer-to-peer networks. SAC 2009: 28-34
7EECong Tang, Ruichuan Chen, Zhuhua Cai, Anmin Xie, Jian-bin Hu, Liyong Tang, Zhong Chen: Securing key issuing in peer-to-peer networks. SAC 2009: 84-85
2008
6EERuichuan Chen, Wenjia Guo, Liyong Tang, Jian-bin Hu, Zhong Chen: Scalable Byzantine Fault Tolerant Public Key Authentication for Peer-to-Peer Networks. Euro-Par 2008: 601-610
2007
5EERuichuan Chen, Xuan Zhao, Liyong Tang, Jian-bin Hu, Zhong Chen: CuboidTrust: A Global Reputation-Based Trust Model in Peer-to-Peer Networks. ATC 2007: 203-215
4EERuichuan Chen, Wenjia Guo, Liyong Tang, Jian-bin Hu, Zhong Chen: Hybrid Overlay Structure Based on Virtual Node. ISCC 2007: 1091-1098
3EEZhen Cao, Zhi Guan, Zhong Chen, Jian-bin Hu, Liyong Tang: An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols. ISPEC 2007: 129-144
2006
2EEZhen Cao, Jian-bin Hu, Zhong Chen, Maoxing Xu, Xia Zhou: Feedback: Towards Dynamic Behavior and Secure Routing forWireless Sensor Networks. AINA (2) 2006: 160-164
2005
1EEPeng Liu, Jian-bin Hu, Zhong Chen: A Formal Language for Access Control Policies in Distributed Environment. Web Intelligence 2005: 766-769

Coauthor Index

1Zhuhua Cai [7] [8]
2Zhen Cao [2] [3]
3Ruichuan Chen [4] [5] [6] [7] [8]
4Zhong Chen [1] [2] [3] [4] [5] [6] [7] [8]
5Jianqiao Feng [8]
6Zhi Guan [3]
7Wenjia Guo [4] [6]
8Peng Liu [1]
9Cong Tang [7] [8]
10Liyong Tang [3] [4] [5] [6] [7]
11Anmin Xie [7]
12Maoxing Xu [2]
13Xuan Zhao [5]
14Xia Zhou [2]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)