2009 |
7 | EE | Cong Tang,
Ruichuan Chen,
Zhuhua Cai,
Anmin Xie,
Jian-bin Hu,
Liyong Tang,
Zhong Chen:
Securing key issuing in peer-to-peer networks.
SAC 2009: 84-85 |
2008 |
6 | EE | Ruichuan Chen,
Wenjia Guo,
Liyong Tang,
Jian-bin Hu,
Zhong Chen:
Scalable Byzantine Fault Tolerant Public Key Authentication for Peer-to-Peer Networks.
Euro-Par 2008: 601-610 |
5 | EE | Suke Li,
Zhong Chen,
Liyong Tang,
Zhao Wang:
TSearch: A Self-learning Vertical Search Spider for Travel.
ICYCS 2008: 348-353 |
4 | EE | Ruichuan Chen,
Eng Keong Lua,
Jon Crowcroft,
Wenjia Guo,
Liyong Tang,
Zhong Chen:
Securing Peer-to-Peer Content Sharing Service from Poisoning Attacks.
Peer-to-Peer Computing 2008: 22-29 |
2007 |
3 | EE | Ruichuan Chen,
Xuan Zhao,
Liyong Tang,
Jian-bin Hu,
Zhong Chen:
CuboidTrust: A Global Reputation-Based Trust Model in Peer-to-Peer Networks.
ATC 2007: 203-215 |
2 | EE | Ruichuan Chen,
Wenjia Guo,
Liyong Tang,
Jian-bin Hu,
Zhong Chen:
Hybrid Overlay Structure Based on Virtual Node.
ISCC 2007: 1091-1098 |
1 | EE | Zhen Cao,
Zhi Guan,
Zhong Chen,
Jian-bin Hu,
Liyong Tang:
An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols.
ISPEC 2007: 129-144 |