2006 |
14 | EE | Yinan Jing,
Jingtao Li,
Xueping Wang,
Xiaochun Xiao,
Gendu Zhang:
A Distributed-Log-based IP Traceback Scheme to Defeat DDoS Attacks.
AINA (2) 2006: 25-32 |
13 | EE | Yinan Jing,
Xueping Wang,
Xiaochun Xiao,
Gendu Zhang:
A Novel Rate Limit Algorithm Against Meek DDoS Attacks.
ATC 2006: 467-476 |
12 | EE | Yinan Jing,
Xueping Wang,
Xiaochun Xiao,
Gendu Zhang:
Defending Against Meek DDoS Attacks By IP Traceback-based Rate Limiting.
GLOBECOM 2006 |
11 | EE | Yinan Jing,
Zheng Xiao,
Xueping Wang,
Gendu Zhang:
O2-DN: An Overlay-based Distributed Rate Limit Framework to Defeat DDoS Attacks.
ICN/ICONS/MCL 2006: 79 |
10 | EE | Jingtao Li,
Xueping Wang,
Yongqiang Chen,
Gendu Zhang:
A Reputation Management Framework Based on Global Trust Model for P2P Systems.
International Conference on Computational Science (1) 2006: 896-899 |
9 | EE | Jingtao Li,
Xueping Wang,
Bing Liu,
Qian Wang,
Gendu Zhang:
A Reputation Management Scheme Based on Global Trust Model for Peer-to-Peer Virtual Communities.
WAIM 2006: 205-216 |
2005 |
8 | EE | Jingtao Li,
Yinan Jing,
Peng Fu,
Gendu Zhang,
Yongqiang Chen:
A Similarity-Based Recommendation Filtering Algorithm for Establishing Reputation-Based Trust in Peer-to-Peer Electronic Communities.
CIS (2) 2005: 1017-1024 |
7 | EE | Yinan Jing,
Peng Tu,
Xueping Wang,
Gendu Zhang:
Distributed-Log-based Scheme for IP Traceback.
CIT 2005: 711-715 |
6 | EE | Kui Meng,
Yue Wang,
Xu Zhang,
Xiaochun Xiao,
Gendu Zhang:
A Trust Management Model for Virtual Communities.
CIT 2005: 741-745 |
5 | EE | Yinan Jing,
Jingtao Li,
Gendu Zhang:
An Adaptive Edge Marking Based Hierarchical IP Traceback System.
ICCNMC 2005: 1188-1197 |
2000 |
4 | | Shouhuai Xu,
Moti Yung,
Gendu Zhang:
Friendly Observers Ease Off-Line E-Cash.
CARDIS 2000: 3-18 |
1999 |
3 | EE | Shouhuai Xu,
Moti Yung,
Gendu Zhang,
Hong Zhu:
Money Conservation via Atomicity in Fair Off-Line E-Cash.
ISW 1999: 14-31 |
1998 |
2 | | Shouhuai Xu,
Gendu Zhang,
Hong Zhu:
On the Security of Three-Party Cryptographic Protocols.
Operating Systems Review 32(3): 7-20 (1998) |
1997 |
1 | | Shouhuai Xu,
Gendu Zhang,
Hong Zhu:
On the Properties of Cryptographic Protocols and the Weakness of the BAN-like Logics.
Operating Systems Review 31.(4): 12-23 (1997) |