dblp.uni-trier.dewww.uni-trier.de

Sihan Qing

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
31 Sihan Qing, Hideki Imai, Guilin Wang: Information and Communications Security, 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings Springer 2008
30EEXiantao Zhang, Anthony X. F. Xu, Qi Li, David K. Y. Yau, Sihan Qing, Huanguo Zhang: A hash-TLB approach for MMU virtualization in xen/IA64. IPDPS 2008: 1-8
29EEDongmei Liu, Sihan Qing, Pengfei Li, ChunYang Yuan: A Practical Certified E-Mail System with Temporal Authentication Based on Transparent TSS. SNPD 2008: 285-290
28EEXiantao Zhang, Qi Li, Sihan Qing, Huanguo Zhang: VNIDA: Building an IDS Architecture Using VMM-Based Non-Intrusive Approach. WKDD 2008: 594-600
2007
27EEJianjun Shen, Sihan Qing: A dynamic information flow model of secure systems. ASIACCS 2007: 341-343
2006
26 Peng Ning, Sihan Qing, Ninghui Li: Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings Springer 2006
25EELiuying Tang, Sihan Qing: A Practical Alternative to Domain and Type Enforcement Integrity Formal Models. Inscrypt 2006: 225-237
24EESihan Qing, Gaicheng Li: Formal analysis and design of multi-party fair exchange protocols. Science in China Series F: Information Sciences 49(2): 155-174 (2006)
23EEQingguang Ji, Sihan Qing, Yeping He: A formal model for integrity protection based on DTE technique. Science in China Series F: Information Sciences 49(5): 545-565 (2006)
2005
22 Sihan Qing, Wenbo Mao, Javier Lopez, Guilin Wang: Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings Springer 2005
21 Ryôichi Sasaki, Sihan Qing, Eiji Okamoto, Hiroshi Yoshiura: Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30 - June 1, 2005, Chiba, Japan Springer 2005
20EEJianjun Shen, Sihan Qing, Qingni Shen, Liping Li: Covert Channel Identification Founded on Information Flow Analysis. CIS (2) 2005: 381-387
19EEGuilin Wang, Sihan Qing: Security Flaws in Several Group Signatures Proposed by Popescu. ICCSA (3) 2005: 711-718
18EEQi Li, Jingpu Shi, Sihan Qing: An Administration Model of DRBAC on the Web. ICEBE 2005: 364-367
17EEJianjun Shen, Sihan Qing, Qingni Shen, Liping Li: Optimization of Covert Channel Identification. IEEE Security in Storage Workshop 2005: 95-108
16EESihan Qing, Weiping Wen: A survey and trends on Internet worms. Computers & Security 24(4): 334-346 (2005)
2004
15 Javier Lopez, Sihan Qing, Eiji Okamoto: Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings Springer 2004
2003
14 Sihan Qing, Dieter Gollmann, Jianying Zhou: Information and Communications Security, 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings Springer 2003
13EEQingguang Ji, Sihan Qing, Yongbin Zhou, Dengguo Feng: Study on Strand Space Model Theory. J. Comput. Sci. Technol. 18(5): 553-570 (2003)
2002
12 Robert H. Deng, Sihan Qing, Feng Bao, Jianying Zhou: Information and Communications Security, 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings Springer 2002
2001
11 Sihan Qing, Tatsuaki Okamoto, Jianying Zhou: Information and Communications Security, Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001 Springer 2001
10EEZhimin Song, Sihan Qing: Applying NCP Logic to the Analysis of SSL 3.0. ICICS 2001: 155-166
9EEGuilin Wang, Sihan Qing, Mingsheng Wang, Zhanfei Zhou: Threshold Undeniable RSA Signature Scheme. ICICS 2001: 221-232
8EEYeping He, Sihan Qing: Square Attack on Reduced Camellia Cipher. ICICS 2001: 238-245
2000
7 Sihan Qing, Jan H. P. Eloff: Information Security for Global Information Infrastructures, IFIP TC11 Fifteenth Annual Working Conference on Information Security, August 22-24, 2000, Beijing, China Kluwer 2000
6 Wenling Wu, Dengguo Feng, Sihan Qing: Power Analysis of RC6 and Serpent. SEC 2000: 201-209
5 Wang Mingsheng, Sihan Qing, Dengguo Feng: A Simple Algorithm for Computing Several Sequences Synthesis. SEC 2000: 211-220
4 Shaoquan Jiang, Dengguo Feng, Sihan Qing: Analysis and Design of E-voting Protocol. SEC 2000: 281-290
3 Jianchun Jiang, Weifeng Chen, Sihan Qing, Dengguo Feng: The Defense Framework for Large-scale Computer Network System. SEC 2000: 69-78
1999
2 Wenling Wu, Bao Li, Dengguo Feng, Sihan Qing: Cryptanalysis of some AES Candidate Algorithms. ICICS 1999: 13-21
1997
1 Yongfei Han, Tatsuaki Okamoto, Sihan Qing: Information and Communication Security, First International Conference, ICICS'97, Beijing, China, November 11-14, 1997, Proceedings Springer 1997

Coauthor Index

1Feng Bao [12]
2Weifeng Chen [3]
3Robert H. Deng (Robert Huijie Deng) [12]
4Jan H. P. Eloff [7]
5Dengguo Feng [2] [3] [4] [5] [6] [13]
6Dieter Gollmann [14]
7Yongfei Han [1]
8Yeping He [8] [23]
9Hideki Imai [31]
10Qingguang Ji [13] [23]
11Jianchun Jiang [3]
12Shaoquan Jiang [4]
13Bao Li [2]
14Gaicheng Li [24]
15Liping Li [17] [20]
16Ninghui Li [26]
17Pengfei Li [29]
18Qi Li [18] [28] [30]
19Dongmei Liu [29]
20Javier Lopez [15] [22]
21Wenbo Mao [22]
22Wang Mingsheng [5]
23Peng Ning [26]
24Eiji Okamoto [15] [21]
25Tatsuaki Okamoto [1] [11]
26Ryôichi Sasaki [21]
27Jianjun Shen [17] [20] [27]
28Qingni Shen [17] [20]
29Jingpu Shi [18]
30Zhimin Song [10]
31Liuying Tang [25]
32Guilin Wang [9] [19] [22] [31]
33Mingsheng Wang [9]
34Weiping Wen [16]
35Wenling Wu [2] [6]
36Anthony X. F. Xu [30]
37David K. Y. Yau [30]
38Hiroshi Yoshiura [21]
39ChunYang Yuan [29]
40Huanguo Zhang [28] [30]
41Xiantao Zhang [28] [30]
42Jianying Zhou [11] [12] [14]
43Yongbin Zhou [13]
44Zhanfei Zhou [9]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)