2008 | ||
---|---|---|
38 | EE | Jianming Fu, Huijun Xiong, Zhou Li, Huanguo Zhang: PerformTrust: Trust model integrated past and current performance in P2P file sharing systems. AICCSA 2008: 718-725 |
37 | EE | Jing Chen, Huanguo Zhang, Junhui Hu: An Efficiency Security Model of Routing Protocol in Wireless Sensor Networks. Asia International Conference on Modelling and Simulation 2008: 59-64 |
36 | EE | Xiaoping Wu, Zhi-Dong Shen, Huanguo Zhang: Secure Key Management of Mobile Agent System Using TPM-Based Technology on Trusted Computing Platform. CSSE (3) 2008: 1020-1023 |
35 | EE | Guojun Peng, Xuanchen Pan, Huanguo Zhang, Jianming Fu: Dynamic Trustiness Authentication Framework Based on Software's Behavior Integrity. ICYCS 2008: 2283-2288 |
34 | EE | Yang Yang, Huanguo Zhang, Li Wan, Bingyu Zou: Design and Implementation of an Integrity Measurement System Based on Windows Trusted Computing Platform. ICYCS 2008: 229-233 |
33 | EE | Fan He, Huanguo Zhang, Mei Tang: A Test Method of Trusted Computing Supporting Software. ICYCS 2008: 2330-2334 |
32 | EE | Jing Zhan, Huanguo Zhang, Bingyu Zou, Xiaofei Li: Research on Automated Testing of the Trusted Platform Model. ICYCS 2008: 2335-2339 |
31 | EE | Xiantao Zhang, Anthony X. F. Xu, Qi Li, David K. Y. Yau, Sihan Qing, Huanguo Zhang: A hash-TLB approach for MMU virtualization in xen/IA64. IPDPS 2008: 1-8 |
30 | EE | Shuang Xiang, Mingdi Xu, Li Wang, Huanguo Zhang: Design Secure Contexts Detect Based on Lattice for Grid Computing Environment. ISECS 2008: 110-113 |
29 | EE | Liqiang Zhang, Huanguo Zhang: An Introduction to Data Capturing. ISECS 2008: 457-461 |
28 | EE | Fan Yang, Jun Song, Huanguo Zhang: Quantitative Cryptanalysis of Six-Round DES Using Evolutionary Algorithms. ISICA 2008: 134-141 |
27 | EE | Jun Song, Fan Yang, Maocai Wang, Huanguo Zhang: Cryptanalysis of Transposition Cipher Using Simulated Annealing Genetic Algorithm. ISICA 2008: 795-802 |
26 | EE | Guoheng Wei, Xueguang Zhou, Huanguo Zhang: A Trusted Computing Model Based on Code Authorization. ISIP 2008: 495-499 |
25 | EE | Juan Wang, Jingwei Zhang, Huanguo Zhang: Type Flaw Attacks and Prevention in Security Protocols. SNPD 2008: 340-343 |
24 | EE | Xiantao Zhang, Qi Li, Sihan Qing, Huanguo Zhang: VNIDA: Building an IDS Architecture Using VMM-Based Non-Intrusive Approach. WKDD 2008: 594-600 |
23 | EE | Qingshu Meng, Min Yang, Huanguo Zhang, Jingsong Cui: A novel algorithm enumerating bent functions. Discrete Mathematics 308(23): 5576-5584 (2008) |
2007 | ||
22 | EE | Jianming Fu, Binglan Chen, Huanguo Zhang: A Worm Containment Model Based on Neighbor-Alarm. ATC 2007: 449-457 |
21 | EE | Huanmei Guan, Huanguo Zhang, Ping Chen, Yajie Zhou: Mobile Agents Integrity Research. I3E (1) 2007: 194-201 |
20 | EE | Jun Song, Huanguo Zhang, Qingshu Meng, Zhang-yi Wang: Cryptanalysis of Two-Round DES Using Genetic Algorithms. ISICA 2007: 583-590 |
19 | EE | Jing Zhan, Huanguo Zhang, Fei Yan: Building Trusted Sub-domain for the Grid with Trusted Computing. Inscrypt 2007: 463-471 |
18 | EE | Bangju Wang, Huanguo Zhang, Zhang-yi Wang, Yu-Hua Wang: Speeding Up Scalar Multiplication Using a New Signed Binary Representation for Integers. MCAM 2007: 277-285 |
17 | EE | Liqiang Zhang, Lu Chen, Huanguo Zhang, Fei Yan: Trusted Code Remote Execution through Trusted Computing and Virtualization. SNPD (1) 2007: 39-44 |
16 | EE | Bangju Wang, Huanguo Zhang, Yuhua Wang: Efficient Modular Exponentiation with Three-Moduli (2n 1, 2n+3). SNPD (3) 2007: 927-931 |
15 | EE | Mingdi Xu, Jian He, Bo Zhang, Huanguo Zhang: A New Data Protecting Scheme Based on TPM. SNPD (3) 2007: 943-947 |
14 | EE | Yuan Yuan, Yan Tong, Huanguo Zhang: Complete Mapping Polynomials over Finite Field F16. WAIFI 2007: 147-158 |
13 | EE | Qingshu Meng, Huanguo Zhang, Min Yang, Jingsong Cui: On the degree of homogeneous bent functions. Discrete Applied Mathematics 155(5): 665-669 (2007) |
12 | EE | Qingshu Meng, Huanguo Zhang, Min Yang, Zhang-yi Wang: Analysis of affinely equivalent Boolean functions. Science in China Series F: Information Sciences 50(3): 299-306 (2007) |
2006 | ||
11 | EE | Fei Yan, Weizhong Qiang, Zhi-Dong Shen, Chunrun Chen, Huanguo Zhang, Deqing Zou: Daonity: An Experience on Enhancing Grid Security by Trusted Computing Technology. ATC 2006: 227-235 |
10 | EE | Fajiang Yu, Huanguo Zhang, Fei Yan, Song Gao: An Improved Global Trust Value Computing Method in P2P System. ATC 2006: 258-267 |
9 | EE | Zhi-Dong Shen, Fei Yan, Weizhong Qiang, Xiao-Ping Wu, Huanguo Zhang: Grid System Integrated with Trusted Computing Platform. IMSCCS (1) 2006: 619-625 |
8 | EE | Zhi-Dong Shen, Xiao-Ping Wu, Yu-Hua Wang, Wen-Ling Peng, Huanguo Zhang: Group Key Management in Grid Environment. IMSCCS (1) 2006: 626-631 |
2005 | ||
7 | EE | Yichun Liu, Jianming Fu, Huanguo Zhang: An Optimistic Fair Protocol for P2P Chained Transaction. ASIAN 2005: 136-145 |
6 | EE | Bo Meng, Huanguo Zhang: An Electronic Commerce System Prototype and Its Implementations. CIT 2005: 966-970 |
5 | EE | Bo Meng, Huanguo Zhang, Qianxing Xiong: The Practical Detailed Requirements of Accountability and Its Application in the Electronic Payment Protocols. EEE 2005: 556-561 |
4 | EE | Jianming Fu, Lei Zhang, Weinan Li, Huanguo Zhang: An Adaptive Service Strategy Based on User Rating in P2P. GCC 2005: 860-870 |
2004 | ||
3 | EE | Jianming Fu, Xian Yi, Huanguo Zhang: Modeling the Behavior of Ada Tasks and Verifying Its Safety. CIT 2004: 676-680 |
2 | EE | Min Yang, Huanguo Zhang, Jianming Fu, Fei Yan: A Framework for Adaptive Anomaly Detection Based on Support Vector Data Description. NPC 2004: 443-450 |
2003 | ||
1 | EE | Min Luo, Lina Wang, Huanguo Zhang, Jin Chen: A Research on Intrusion Detection Based on Unsupervised Clustering and Support Vector Machine. ICICS 2003: 325-336 |