2008 |
31 | | Sihan Qing,
Hideki Imai,
Guilin Wang:
Information and Communications Security, 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings
Springer 2008 |
30 | EE | Xiantao Zhang,
Anthony X. F. Xu,
Qi Li,
David K. Y. Yau,
Sihan Qing,
Huanguo Zhang:
A hash-TLB approach for MMU virtualization in xen/IA64.
IPDPS 2008: 1-8 |
29 | EE | Dongmei Liu,
Sihan Qing,
Pengfei Li,
ChunYang Yuan:
A Practical Certified E-Mail System with Temporal Authentication Based on Transparent TSS.
SNPD 2008: 285-290 |
28 | EE | Xiantao Zhang,
Qi Li,
Sihan Qing,
Huanguo Zhang:
VNIDA: Building an IDS Architecture Using VMM-Based Non-Intrusive Approach.
WKDD 2008: 594-600 |
2007 |
27 | EE | Jianjun Shen,
Sihan Qing:
A dynamic information flow model of secure systems.
ASIACCS 2007: 341-343 |
2006 |
26 | | Peng Ning,
Sihan Qing,
Ninghui Li:
Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings
Springer 2006 |
25 | EE | Liuying Tang,
Sihan Qing:
A Practical Alternative to Domain and Type Enforcement Integrity Formal Models.
Inscrypt 2006: 225-237 |
24 | EE | Sihan Qing,
Gaicheng Li:
Formal analysis and design of multi-party fair exchange protocols.
Science in China Series F: Information Sciences 49(2): 155-174 (2006) |
23 | EE | Qingguang Ji,
Sihan Qing,
Yeping He:
A formal model for integrity protection based on DTE technique.
Science in China Series F: Information Sciences 49(5): 545-565 (2006) |
2005 |
22 | | Sihan Qing,
Wenbo Mao,
Javier Lopez,
Guilin Wang:
Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings
Springer 2005 |
21 | | Ryôichi Sasaki,
Sihan Qing,
Eiji Okamoto,
Hiroshi Yoshiura:
Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30 - June 1, 2005, Chiba, Japan
Springer 2005 |
20 | EE | Jianjun Shen,
Sihan Qing,
Qingni Shen,
Liping Li:
Covert Channel Identification Founded on Information Flow Analysis.
CIS (2) 2005: 381-387 |
19 | EE | Guilin Wang,
Sihan Qing:
Security Flaws in Several Group Signatures Proposed by Popescu.
ICCSA (3) 2005: 711-718 |
18 | EE | Qi Li,
Jingpu Shi,
Sihan Qing:
An Administration Model of DRBAC on the Web.
ICEBE 2005: 364-367 |
17 | EE | Jianjun Shen,
Sihan Qing,
Qingni Shen,
Liping Li:
Optimization of Covert Channel Identification.
IEEE Security in Storage Workshop 2005: 95-108 |
16 | EE | Sihan Qing,
Weiping Wen:
A survey and trends on Internet worms.
Computers & Security 24(4): 334-346 (2005) |
2004 |
15 | | Javier Lopez,
Sihan Qing,
Eiji Okamoto:
Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings
Springer 2004 |
2003 |
14 | | Sihan Qing,
Dieter Gollmann,
Jianying Zhou:
Information and Communications Security, 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings
Springer 2003 |
13 | EE | Qingguang Ji,
Sihan Qing,
Yongbin Zhou,
Dengguo Feng:
Study on Strand Space Model Theory.
J. Comput. Sci. Technol. 18(5): 553-570 (2003) |
2002 |
12 | | Robert H. Deng,
Sihan Qing,
Feng Bao,
Jianying Zhou:
Information and Communications Security, 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings
Springer 2002 |
2001 |
11 | | Sihan Qing,
Tatsuaki Okamoto,
Jianying Zhou:
Information and Communications Security, Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001
Springer 2001 |
10 | EE | Zhimin Song,
Sihan Qing:
Applying NCP Logic to the Analysis of SSL 3.0.
ICICS 2001: 155-166 |
9 | EE | Guilin Wang,
Sihan Qing,
Mingsheng Wang,
Zhanfei Zhou:
Threshold Undeniable RSA Signature Scheme.
ICICS 2001: 221-232 |
8 | EE | Yeping He,
Sihan Qing:
Square Attack on Reduced Camellia Cipher.
ICICS 2001: 238-245 |
2000 |
7 | | Sihan Qing,
Jan H. P. Eloff:
Information Security for Global Information Infrastructures, IFIP TC11 Fifteenth Annual Working Conference on Information Security, August 22-24, 2000, Beijing, China
Kluwer 2000 |
6 | | Wenling Wu,
Dengguo Feng,
Sihan Qing:
Power Analysis of RC6 and Serpent.
SEC 2000: 201-209 |
5 | | Wang Mingsheng,
Sihan Qing,
Dengguo Feng:
A Simple Algorithm for Computing Several Sequences Synthesis.
SEC 2000: 211-220 |
4 | | Shaoquan Jiang,
Dengguo Feng,
Sihan Qing:
Analysis and Design of E-voting Protocol.
SEC 2000: 281-290 |
3 | | Jianchun Jiang,
Weifeng Chen,
Sihan Qing,
Dengguo Feng:
The Defense Framework for Large-scale Computer Network System.
SEC 2000: 69-78 |
1999 |
2 | | Wenling Wu,
Bao Li,
Dengguo Feng,
Sihan Qing:
Cryptanalysis of some AES Candidate Algorithms.
ICICS 1999: 13-21 |
1997 |
1 | | Yongfei Han,
Tatsuaki Okamoto,
Sihan Qing:
Information and Communication Security, First International Conference, ICICS'97, Beijing, China, November 11-14, 1997, Proceedings
Springer 1997 |