dblp.uni-trier.dewww.uni-trier.de

Qi Shi

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
36EEBo Zhou, Qi Shi, Madjid Merabti: Balancing intrusion detection resources in ubiquitous computing networks. Computer Communications 31(15): 3643-3653 (2008)
2007
35EEKashif Kifayat, Madjid Merabti, Qi Shi, David Llewellyn-Jones: Applying Secure Data Aggregation techniques for a Structure and Density Independent Group Based Key Management Protocol. IAS 2007: 44-49
34EEBo Zhou, Qi Shi, Madjid Merabti: Towards Energy-Efficient Intrusion Detection in Pervasive Computing. ICC 2007: 1417-1422
33EENing Zhang, Li Yao, Aleksandra Nenadic, Jay Chin, Carole A. Goble, Alan L. Rector, David W. Chadwick, Sassa Otenko, Qi Shi: Achieving fine-grained access control in virtual organizations. Concurrency and Computation: Practice and Experience 19(9): 1333-1352 (2007)
2006
32EEBo Zhou, Qi Shi, Madjid Merabti: Intrusion Detection in Pervasive Networks Based on a Chi-Square Statistic Test. COMPSAC (2) 2006: 203-208
31EEBo Zhou, Qi Shi, Madjid Merabti: Real-Time Intrusion Detection in Ubiquitous Networks with a String-Based Approach. ICCSA (4) 2006: 352-359
30EENing Zhang, Qi Shi, Madjid Merabti, Robert Askwith: Practical and efficient fair document exchange over networks. J. Network and Computer Applications 29(1): 46-61 (2006)
2005
29EEDavid Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob Askwith: Buffer Overrun Prevention Through Component Composition Analysis. COMPSAC (1) 2005: 156-163
28EEAleksandra Nenadic, Ning Zhang, Qi Shi, Carole A. Goble: DSA-Based Verifiable and Recoverable Encryption of Signatures and Its Application in Certified E-Goods Delivery. EEE 2005: 94-99
27EEAleksandra Nenadic, Ning Zhang, Qi Shi, Carole A. Goble: Certified E-Mail Delivery with DSA Receipts. IPDPS 2005
26 John Haggerty, Qi Shi, Madjid Merabti: Statistical Signatures for Early Detection of Flooding Denial-Of-Service Attacks. SEC 2005: 327-342
25EENing Zhang, Li Yao, Jay Chin, Aleksandra Nenadic, A. McNab, Alan L. Rector, Carole A. Goble, Qi Shi: Plugging a Scalable Authentication Framework into Shibboleth. WETICE 2005: 271-276
24EEJohn Haggerty, Qi Shi, Madjid Merabti: Early detection and prevention of denial-of-service attacks: a novel mechanism with propagated traced-back attack blocking. IEEE Journal on Selected Areas in Communications 23(10): 1994-2002 (2005)
23EEAleksandra Nenadic, Ning Zhang, Qi Shi: RSA-based Verifiable and Recoverable Encryption of Signatures and its application in certified e-mail delivery. Journal of Computer Security 13(5): 757-777 (2005)
22EENing Zhang, Qi Shi, Madjid Merabti: Revocation of privacy-enhanced public-key certificates. Journal of Systems and Software 75(1-2): 205-214 (2005)
2004
21EEDavid Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob Askwith: An Extensible Framework for Practical Secure Component Composition in a Ubiquitous Computing Environment. ITCC (1) 2004: 112-117
20EENing Zhang, Qi Shi, Madjid Merabti, Robert Askwith: Autonomous mobile agent based fair exchange. Computer Networks 46(6): 751-770 (2004)
19EENing Zhang, Qi Shi, Madjid Merabti: A unified approach to a fair document exchange system. Journal of Systems and Software 72(1): 83-96 (2004)
2003
18EEAbiola Abimbola, Qi Shi, Madjid Merabti: NetHost-Sensor: A Novel Concept in Intrusion Detection Systems. ISCC 2003: 232-237
17EENing Zhang, Qi Shi, Madjid Merabti: An efficient protocol for anonymous and fair document exchange. Computer Networks 41(1): 19-28 (2003)
16EEBob Askwith, Madjid Merabti, Qi Shi: MNPA: A basis for privacy-enhanced QoS in mobile networks. Microprocessors and Microsystems 27(2): 93-100 (2003)
2002
15EEJohn Haggerty, Qi Shi, Madjid Merabti: Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks. ACSAC 2002: 413-422
14 John Haggerty, Qi Shi, Madjid Merabti: The Threat From Within -An Analysis of Attacks on anInternal Network. SEC 2002: 133-146
2001
13EED. W. Gresty, Qi Shi, Madjid Merabti: Requirements for a General Framework for Response to Distributed Denial-of-Service. ACSAC 2001: 422-432
2000
12EEMadjid Merabti, Qi Shi, Rolf Oppliger: Advanced security techniques for network protection. Computer Communications 23(17): 1581-1583 (2000)
11EEBob Askwith, Madjid Merabti, Qi Shi: MNPA: a mobile network privacy architecture. Computer Communications 23(18): 1777-1788 (2000)
1999
10 Ning Zhang, Qi Shi, Madjid Merabti: A Flexible Approach to Secure and Fair Document Exchange. Comput. J. 42(7): 569-581 (1999)
1998
9EEQi Shi, Ning Zhang: An effective model for composition of secure systems. Journal of Systems and Software 43(3): 233-244 (1998)
1997
8EEBob Askwith, Madjid Merabti, Qi Shi, K. Whiteley: Achieving User Privacy in Mobile Networks. ACSAC 1997: 108-
1996
7EENing Zhang, Qi Shi: Security Issues in an EDI Environment. ACSAC 1996: 129-137
6EEQi Shi, Ning Zhang: Applying Composable Security Properties to Assessment of Information Systems. COMPSAC 1996: 118-123
5EEQi Shi, Ning Zhang: A general approach to secure components composition. HASE 1996: 263-286
4 Ning Zhang, Qi Shi: Achieving Non-Repudiation of Receipt. Comput. J. 39(10): 844-853 (1996)
1995
3EEQi Shi, Ning Zhang: A General Approach to Evaluation of Secure Systems. COMPSAC 1995: 396-401
1993
2 Qi Shi, John A. McDermid: Constructing Secure Distributed Systems Using Components. SRDS 1993: 143-152
1991
1 John A. McDermid, Qi Shi: A Formal Model of Security Dependency for Analysis and Testing of Secure Systems. CSFW 1991: 188-200

Coauthor Index

1Abiola Abimbola [18]
2Robert Askwith (Bob Askwith) [8] [11] [16] [20] [21] [29] [30]
3David W. Chadwick [33]
4Jay Chin [25] [33]
5Carole A. Goble [25] [27] [28] [33]
6D. W. Gresty [13]
7John Haggerty [14] [15] [24] [26]
8Kashif Kifayat [35]
9David Llewellyn-Jones [21] [29] [35]
10John A. McDermid [1] [2]
11A. McNab [25]
12Madjid Merabti [8] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22] [24] [26] [29] [30] [31] [32] [34] [35] [36]
13Aleksandra Nenadic [23] [25] [27] [28] [33]
14Rolf Oppliger [12]
15Sassa Otenko (Alexander Otenko) [33]
16Alan L. Rector [25] [33]
17K. Whiteley [8]
18Li Yao [25] [33]
19Ning Zhang [3] [4] [5] [6] [7] [9] [10] [17] [19] [20] [22] [23] [25] [27] [28] [30] [33]
20Bo Zhou [31] [32] [34] [36]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)