dblp.uni-trier.dewww.uni-trier.de

Liyong Tang

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
7EECong Tang, Ruichuan Chen, Zhuhua Cai, Anmin Xie, Jian-bin Hu, Liyong Tang, Zhong Chen: Securing key issuing in peer-to-peer networks. SAC 2009: 84-85
2008
6EERuichuan Chen, Wenjia Guo, Liyong Tang, Jian-bin Hu, Zhong Chen: Scalable Byzantine Fault Tolerant Public Key Authentication for Peer-to-Peer Networks. Euro-Par 2008: 601-610
5EESuke Li, Zhong Chen, Liyong Tang, Zhao Wang: TSearch: A Self-learning Vertical Search Spider for Travel. ICYCS 2008: 348-353
4EERuichuan Chen, Eng Keong Lua, Jon Crowcroft, Wenjia Guo, Liyong Tang, Zhong Chen: Securing Peer-to-Peer Content Sharing Service from Poisoning Attacks. Peer-to-Peer Computing 2008: 22-29
2007
3EERuichuan Chen, Xuan Zhao, Liyong Tang, Jian-bin Hu, Zhong Chen: CuboidTrust: A Global Reputation-Based Trust Model in Peer-to-Peer Networks. ATC 2007: 203-215
2EERuichuan Chen, Wenjia Guo, Liyong Tang, Jian-bin Hu, Zhong Chen: Hybrid Overlay Structure Based on Virtual Node. ISCC 2007: 1091-1098
1EEZhen Cao, Zhi Guan, Zhong Chen, Jian-bin Hu, Liyong Tang: An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols. ISPEC 2007: 129-144

Coauthor Index

1Zhuhua Cai [7]
2Zhen Cao [1]
3Ruichuan Chen [2] [3] [4] [6] [7]
4Zhong Chen [1] [2] [3] [4] [5] [6] [7]
5Jon Crowcroft [4]
6Zhi Guan [1]
7Wenjia Guo [2] [4] [6]
8Jian-bin Hu [1] [2] [3] [6] [7]
9Suke Li [5]
10Eng Keong Lua [4]
11Cong Tang [7]
12Zhao Wang [5]
13Anmin Xie [7]
14Xuan Zhao [3]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)