2009 |
8 | EE | Zhuhua Cai,
Ruichuan Chen,
Jianqiao Feng,
Cong Tang,
Zhong Chen,
Jian-bin Hu:
A holistic mechanism against file pollution in peer-to-peer networks.
SAC 2009: 28-34 |
7 | EE | Cong Tang,
Ruichuan Chen,
Zhuhua Cai,
Anmin Xie,
Jian-bin Hu,
Liyong Tang,
Zhong Chen:
Securing key issuing in peer-to-peer networks.
SAC 2009: 84-85 |
2008 |
6 | EE | Ruichuan Chen,
Wenjia Guo,
Liyong Tang,
Jian-bin Hu,
Zhong Chen:
Scalable Byzantine Fault Tolerant Public Key Authentication for Peer-to-Peer Networks.
Euro-Par 2008: 601-610 |
2007 |
5 | EE | Ruichuan Chen,
Xuan Zhao,
Liyong Tang,
Jian-bin Hu,
Zhong Chen:
CuboidTrust: A Global Reputation-Based Trust Model in Peer-to-Peer Networks.
ATC 2007: 203-215 |
4 | EE | Ruichuan Chen,
Wenjia Guo,
Liyong Tang,
Jian-bin Hu,
Zhong Chen:
Hybrid Overlay Structure Based on Virtual Node.
ISCC 2007: 1091-1098 |
3 | EE | Zhen Cao,
Zhi Guan,
Zhong Chen,
Jian-bin Hu,
Liyong Tang:
An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols.
ISPEC 2007: 129-144 |
2006 |
2 | EE | Zhen Cao,
Jian-bin Hu,
Zhong Chen,
Maoxing Xu,
Xia Zhou:
Feedback: Towards Dynamic Behavior and Secure Routing forWireless Sensor Networks.
AINA (2) 2006: 160-164 |
2005 |
1 | EE | Peng Liu,
Jian-bin Hu,
Zhong Chen:
A Formal Language for Access Control Policies in Distributed Environment.
Web Intelligence 2005: 766-769 |