2009 |
10 | EE | Ting Deng,
Jinpeng Huai,
Xianxian Li,
Zongxia Du,
Huipeng Guo:
Automated synthesis of composite services with correctness guarantee.
WWW 2009: 1127-1128 |
2008 |
9 | EE | Li Lin,
Jinpeng Huai,
Yanmin Zhu,
Chunming Hu,
Xianxian Li:
A Multi-agents Contractual Approach to Incentive Provision in Non-cooperative Networks.
OTM Conferences (1) 2008: 231-248 |
2007 |
8 | EE | Dacheng Zhang,
Jie Xu,
Xianxian Li:
Dynamic Cross-Realm Authentication for Multi-Party Service Interactions.
DSN 2007: 440-449 |
2006 |
7 | EE | Xianxian Li,
Lijun Liu:
A Multi-agent Cooperative Model and System for Integrated Security Monitoring.
CANS 2006: 329-341 |
6 | EE | Jinpeng Huai,
Xianxian Li,
Wenyi Zhang,
Jun Han,
Yongzhen Zhuang:
A Software Protocol of Goals and Operations Based on BDI Model.
SUTC (1) 2006: 454-461 |
5 | EE | Xianxian Li,
Jinpeng Huai:
Cryptographic protocol security analysis based on bounded constructing algorithm.
Science in China Series F: Information Sciences 49(1): 26-47 (2006) |
2005 |
4 | EE | Yu Zhang,
Xianxian Li,
Jinpeng Huai,
Yunhao Liu:
Access Control in Peer-to-Peer Collaborative Systems.
ICDCS Workshops 2005: 835-840 |
3 | EE | Jinpeng Huai,
Yu Zhang,
Xianxian Li,
Yunhao Liu:
Distributed Access Control in CROWN Groups.
ICPP 2005: 435-442 |
2 | EE | Jianxin Li,
Jinpeng Huai,
Qin Li,
Xianxian Li:
Towards Security Analysis to Binding Update Protocol in Mobile IPv6 with Formal Method.
MSN 2005: 1073-1080 |
2002 |
1 | EE | Xianxian Li,
Jinpeng Huai:
Efficient Non-Repudiation Multicast Source Authentication Schemes.
J. Comput. Sci. Technol. 17(6): 820-829 (2002) |