| 2006 |
| 14 | EE | Yinan Jing,
Jingtao Li,
Xueping Wang,
Xiaochun Xiao,
Gendu Zhang:
A Distributed-Log-based IP Traceback Scheme to Defeat DDoS Attacks.
AINA (2) 2006: 25-32 |
| 13 | EE | Yinan Jing,
Xueping Wang,
Xiaochun Xiao,
Gendu Zhang:
A Novel Rate Limit Algorithm Against Meek DDoS Attacks.
ATC 2006: 467-476 |
| 12 | EE | Yinan Jing,
Xueping Wang,
Xiaochun Xiao,
Gendu Zhang:
Defending Against Meek DDoS Attacks By IP Traceback-based Rate Limiting.
GLOBECOM 2006 |
| 11 | EE | Yinan Jing,
Zheng Xiao,
Xueping Wang,
Gendu Zhang:
O2-DN: An Overlay-based Distributed Rate Limit Framework to Defeat DDoS Attacks.
ICN/ICONS/MCL 2006: 79 |
| 10 | EE | Jingtao Li,
Xueping Wang,
Yongqiang Chen,
Gendu Zhang:
A Reputation Management Framework Based on Global Trust Model for P2P Systems.
International Conference on Computational Science (1) 2006: 896-899 |
| 9 | EE | Jingtao Li,
Xueping Wang,
Bing Liu,
Qian Wang,
Gendu Zhang:
A Reputation Management Scheme Based on Global Trust Model for Peer-to-Peer Virtual Communities.
WAIM 2006: 205-216 |
| 2005 |
| 8 | EE | Jingtao Li,
Yinan Jing,
Peng Fu,
Gendu Zhang,
Yongqiang Chen:
A Similarity-Based Recommendation Filtering Algorithm for Establishing Reputation-Based Trust in Peer-to-Peer Electronic Communities.
CIS (2) 2005: 1017-1024 |
| 7 | EE | Yinan Jing,
Peng Tu,
Xueping Wang,
Gendu Zhang:
Distributed-Log-based Scheme for IP Traceback.
CIT 2005: 711-715 |
| 6 | EE | Kui Meng,
Yue Wang,
Xu Zhang,
Xiaochun Xiao,
Gendu Zhang:
A Trust Management Model for Virtual Communities.
CIT 2005: 741-745 |
| 5 | EE | Yinan Jing,
Jingtao Li,
Gendu Zhang:
An Adaptive Edge Marking Based Hierarchical IP Traceback System.
ICCNMC 2005: 1188-1197 |
| 2000 |
| 4 | | Shouhuai Xu,
Moti Yung,
Gendu Zhang:
Friendly Observers Ease Off-Line E-Cash.
CARDIS 2000: 3-18 |
| 1999 |
| 3 | EE | Shouhuai Xu,
Moti Yung,
Gendu Zhang,
Hong Zhu:
Money Conservation via Atomicity in Fair Off-Line E-Cash.
ISW 1999: 14-31 |
| 1998 |
| 2 | | Shouhuai Xu,
Gendu Zhang,
Hong Zhu:
On the Security of Three-Party Cryptographic Protocols.
Operating Systems Review 32(3): 7-20 (1998) |
| 1997 |
| 1 | | Shouhuai Xu,
Gendu Zhang,
Hong Zhu:
On the Properties of Cryptographic Protocols and the Weakness of the BAN-like Logics.
Operating Systems Review 31.(4): 12-23 (1997) |