2007 | ||
---|---|---|
4 | EE | Zhiguo Shi, Yeping He, Xiaoyong Huai, Hong Zhang: Identity Anonymity for Grid Computing Coordination based on Trusted Computing. GCC 2007: 403-410 |
3 | EE | Hong Zhang, Yeping He, Zhiguo Shi: A formal model for access control with supporting spatial context. Science in China Series F: Information Sciences 50(3): 419-439 (2007) |
2006 | ||
2 | EE | Hong Zhang, Yeping He, Zhiguo Shi: Spatial Context in Role-Based Access Control. ICISC 2006: 166-178 |
2005 | ||
1 | EE | Cheng Shen, Zhiguo Shi, Lixin Ran: Synchronizing chaotic Colpitts circuits adaptively with parameter mismatches and channel distortions. ISCAS (6) 2005: 6042-6045 |
1 | Yeping He | [2] [3] [4] |
2 | Xiaoyong Huai | [4] |
3 | Lixin Ran | [1] |
4 | Cheng Shen | [1] |
5 | Hong Zhang | [2] [3] [4] |