dblp.uni-trier.dewww.uni-trier.de

Gendu Zhang

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2006
14EEYinan Jing, Jingtao Li, Xueping Wang, Xiaochun Xiao, Gendu Zhang: A Distributed-Log-based IP Traceback Scheme to Defeat DDoS Attacks. AINA (2) 2006: 25-32
13EEYinan Jing, Xueping Wang, Xiaochun Xiao, Gendu Zhang: A Novel Rate Limit Algorithm Against Meek DDoS Attacks. ATC 2006: 467-476
12EEYinan Jing, Xueping Wang, Xiaochun Xiao, Gendu Zhang: Defending Against Meek DDoS Attacks By IP Traceback-based Rate Limiting. GLOBECOM 2006
11EEYinan Jing, Zheng Xiao, Xueping Wang, Gendu Zhang: O2-DN: An Overlay-based Distributed Rate Limit Framework to Defeat DDoS Attacks. ICN/ICONS/MCL 2006: 79
10EEJingtao Li, Xueping Wang, Yongqiang Chen, Gendu Zhang: A Reputation Management Framework Based on Global Trust Model for P2P Systems. International Conference on Computational Science (1) 2006: 896-899
9EEJingtao Li, Xueping Wang, Bing Liu, Qian Wang, Gendu Zhang: A Reputation Management Scheme Based on Global Trust Model for Peer-to-Peer Virtual Communities. WAIM 2006: 205-216
2005
8EEJingtao Li, Yinan Jing, Peng Fu, Gendu Zhang, Yongqiang Chen: A Similarity-Based Recommendation Filtering Algorithm for Establishing Reputation-Based Trust in Peer-to-Peer Electronic Communities. CIS (2) 2005: 1017-1024
7EEYinan Jing, Peng Tu, Xueping Wang, Gendu Zhang: Distributed-Log-based Scheme for IP Traceback. CIT 2005: 711-715
6EEKui Meng, Yue Wang, Xu Zhang, Xiaochun Xiao, Gendu Zhang: A Trust Management Model for Virtual Communities. CIT 2005: 741-745
5EEYinan Jing, Jingtao Li, Gendu Zhang: An Adaptive Edge Marking Based Hierarchical IP Traceback System. ICCNMC 2005: 1188-1197
2000
4 Shouhuai Xu, Moti Yung, Gendu Zhang: Friendly Observers Ease Off-Line E-Cash. CARDIS 2000: 3-18
1999
3EEShouhuai Xu, Moti Yung, Gendu Zhang, Hong Zhu: Money Conservation via Atomicity in Fair Off-Line E-Cash. ISW 1999: 14-31
1998
2 Shouhuai Xu, Gendu Zhang, Hong Zhu: On the Security of Three-Party Cryptographic Protocols. Operating Systems Review 32(3): 7-20 (1998)
1997
1 Shouhuai Xu, Gendu Zhang, Hong Zhu: On the Properties of Cryptographic Protocols and the Weakness of the BAN-like Logics. Operating Systems Review 31.(4): 12-23 (1997)

Coauthor Index

1Yongqiang Chen [8] [10]
2Peng Fu [8]
3Yinan Jing [5] [7] [8] [11] [12] [13] [14]
4Jingtao Li [5] [8] [9] [10] [14]
5Bing Liu [9]
6Kui Meng [6]
7Peng Tu [7]
8Qian Wang [9]
9Xueping Wang [7] [9] [10] [11] [12] [13] [14]
10Yue Wang [6]
11Xiaochun Xiao [6] [12] [13] [14]
12Zheng Xiao [11]
13Shouhuai Xu [1] [2] [3] [4]
14Moti Yung (Mordechai M. Yung) [3] [4]
15Xu Zhang [6]
16Hong Zhu [1] [2] [3]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)