dblp.uni-trier.dewww.uni-trier.de

Huanguo Zhang

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
38EEJianming Fu, Huijun Xiong, Zhou Li, Huanguo Zhang: PerformTrust: Trust model integrated past and current performance in P2P file sharing systems. AICCSA 2008: 718-725
37EEJing Chen, Huanguo Zhang, Junhui Hu: An Efficiency Security Model of Routing Protocol in Wireless Sensor Networks. Asia International Conference on Modelling and Simulation 2008: 59-64
36EEXiaoping Wu, Zhi-Dong Shen, Huanguo Zhang: Secure Key Management of Mobile Agent System Using TPM-Based Technology on Trusted Computing Platform. CSSE (3) 2008: 1020-1023
35EEGuojun Peng, Xuanchen Pan, Huanguo Zhang, Jianming Fu: Dynamic Trustiness Authentication Framework Based on Software's Behavior Integrity. ICYCS 2008: 2283-2288
34EEYang Yang, Huanguo Zhang, Li Wan, Bingyu Zou: Design and Implementation of an Integrity Measurement System Based on Windows Trusted Computing Platform. ICYCS 2008: 229-233
33EEFan He, Huanguo Zhang, Mei Tang: A Test Method of Trusted Computing Supporting Software. ICYCS 2008: 2330-2334
32EEJing Zhan, Huanguo Zhang, Bingyu Zou, Xiaofei Li: Research on Automated Testing of the Trusted Platform Model. ICYCS 2008: 2335-2339
31EEXiantao Zhang, Anthony X. F. Xu, Qi Li, David K. Y. Yau, Sihan Qing, Huanguo Zhang: A hash-TLB approach for MMU virtualization in xen/IA64. IPDPS 2008: 1-8
30EEShuang Xiang, Mingdi Xu, Li Wang, Huanguo Zhang: Design Secure Contexts Detect Based on Lattice for Grid Computing Environment. ISECS 2008: 110-113
29EELiqiang Zhang, Huanguo Zhang: An Introduction to Data Capturing. ISECS 2008: 457-461
28EEFan Yang, Jun Song, Huanguo Zhang: Quantitative Cryptanalysis of Six-Round DES Using Evolutionary Algorithms. ISICA 2008: 134-141
27EEJun Song, Fan Yang, Maocai Wang, Huanguo Zhang: Cryptanalysis of Transposition Cipher Using Simulated Annealing Genetic Algorithm. ISICA 2008: 795-802
26EEGuoheng Wei, Xueguang Zhou, Huanguo Zhang: A Trusted Computing Model Based on Code Authorization. ISIP 2008: 495-499
25EEJuan Wang, Jingwei Zhang, Huanguo Zhang: Type Flaw Attacks and Prevention in Security Protocols. SNPD 2008: 340-343
24EEXiantao Zhang, Qi Li, Sihan Qing, Huanguo Zhang: VNIDA: Building an IDS Architecture Using VMM-Based Non-Intrusive Approach. WKDD 2008: 594-600
23EEQingshu Meng, Min Yang, Huanguo Zhang, Jingsong Cui: A novel algorithm enumerating bent functions. Discrete Mathematics 308(23): 5576-5584 (2008)
2007
22EEJianming Fu, Binglan Chen, Huanguo Zhang: A Worm Containment Model Based on Neighbor-Alarm. ATC 2007: 449-457
21EEHuanmei Guan, Huanguo Zhang, Ping Chen, Yajie Zhou: Mobile Agents Integrity Research. I3E (1) 2007: 194-201
20EEJun Song, Huanguo Zhang, Qingshu Meng, Zhang-yi Wang: Cryptanalysis of Two-Round DES Using Genetic Algorithms. ISICA 2007: 583-590
19EEJing Zhan, Huanguo Zhang, Fei Yan: Building Trusted Sub-domain for the Grid with Trusted Computing. Inscrypt 2007: 463-471
18EEBangju Wang, Huanguo Zhang, Zhang-yi Wang, Yu-Hua Wang: Speeding Up Scalar Multiplication Using a New Signed Binary Representation for Integers. MCAM 2007: 277-285
17EELiqiang Zhang, Lu Chen, Huanguo Zhang, Fei Yan: Trusted Code Remote Execution through Trusted Computing and Virtualization. SNPD (1) 2007: 39-44
16EEBangju Wang, Huanguo Zhang, Yuhua Wang: Efficient Modular Exponentiation with Three-Moduli (2n 1, 2n+3). SNPD (3) 2007: 927-931
15EEMingdi Xu, Jian He, Bo Zhang, Huanguo Zhang: A New Data Protecting Scheme Based on TPM. SNPD (3) 2007: 943-947
14EEYuan Yuan, Yan Tong, Huanguo Zhang: Complete Mapping Polynomials over Finite Field F16. WAIFI 2007: 147-158
13EEQingshu Meng, Huanguo Zhang, Min Yang, Jingsong Cui: On the degree of homogeneous bent functions. Discrete Applied Mathematics 155(5): 665-669 (2007)
12EEQingshu Meng, Huanguo Zhang, Min Yang, Zhang-yi Wang: Analysis of affinely equivalent Boolean functions. Science in China Series F: Information Sciences 50(3): 299-306 (2007)
2006
11EEFei Yan, Weizhong Qiang, Zhi-Dong Shen, Chunrun Chen, Huanguo Zhang, Deqing Zou: Daonity: An Experience on Enhancing Grid Security by Trusted Computing Technology. ATC 2006: 227-235
10EEFajiang Yu, Huanguo Zhang, Fei Yan, Song Gao: An Improved Global Trust Value Computing Method in P2P System. ATC 2006: 258-267
9EEZhi-Dong Shen, Fei Yan, Weizhong Qiang, Xiao-Ping Wu, Huanguo Zhang: Grid System Integrated with Trusted Computing Platform. IMSCCS (1) 2006: 619-625
8EEZhi-Dong Shen, Xiao-Ping Wu, Yu-Hua Wang, Wen-Ling Peng, Huanguo Zhang: Group Key Management in Grid Environment. IMSCCS (1) 2006: 626-631
2005
7EEYichun Liu, Jianming Fu, Huanguo Zhang: An Optimistic Fair Protocol for P2P Chained Transaction. ASIAN 2005: 136-145
6EEBo Meng, Huanguo Zhang: An Electronic Commerce System Prototype and Its Implementations. CIT 2005: 966-970
5EEBo Meng, Huanguo Zhang, Qianxing Xiong: The Practical Detailed Requirements of Accountability and Its Application in the Electronic Payment Protocols. EEE 2005: 556-561
4EEJianming Fu, Lei Zhang, Weinan Li, Huanguo Zhang: An Adaptive Service Strategy Based on User Rating in P2P. GCC 2005: 860-870
2004
3EEJianming Fu, Xian Yi, Huanguo Zhang: Modeling the Behavior of Ada Tasks and Verifying Its Safety. CIT 2004: 676-680
2EEMin Yang, Huanguo Zhang, Jianming Fu, Fei Yan: A Framework for Adaptive Anomaly Detection Based on Support Vector Data Description. NPC 2004: 443-450
2003
1EEMin Luo, Lina Wang, Huanguo Zhang, Jin Chen: A Research on Intrusion Detection Based on Unsupervised Clustering and Support Vector Machine. ICICS 2003: 325-336

Coauthor Index

1Binglan Chen [22]
2Chunrun Chen [11]
3Jin Chen [1]
4Jing Chen [37]
5Lu Chen [17]
6Ping Chen [21]
7Jingsong Cui [13] [23]
8Jianming Fu [2] [3] [4] [7] [22] [35] [38]
9Song Gao [10]
10Huanmei Guan [21]
11Fan He [33]
12Jian He [15]
13Junhui Hu [37]
14Qi Li [24] [31]
15Weinan Li [4]
16Xiaofei Li [32]
17Zhou Li [38]
18Yichun Liu [7]
19Min Luo [1]
20Bo Meng [5] [6]
21Qingshu Meng [12] [13] [20] [23]
22Xuanchen Pan [35]
23Guojun Peng [35]
24Wen-Ling Peng [8]
25Weizhong Qiang [9] [11]
26Sihan Qing [24] [31]
27Zhi-Dong Shen [8] [9] [11] [36]
28Jun Song [20] [27] [28]
29Mei Tang [33]
30Yan Tong [14]
31Li Wan [34]
32Bangju Wang [16] [18]
33Juan Wang [25]
34Li Wang [30]
35Lina Wang [1]
36Maocai Wang [27]
37Yu-Hua Wang [8] [18]
38Yuhua Wang [16]
39Zhang-yi Wang [12] [18] [20]
40Guoheng Wei [26]
41Xiao-Ping Wu [8] [9]
42Xiaoping Wu [36]
43Shuang Xiang [30]
44Huijun Xiong [38]
45Qianxing Xiong [5]
46Anthony X. F. Xu [31]
47Mingdi Xu [15] [30]
48Fei Yan [2] [9] [10] [11] [17] [19]
49Fan Yang [27] [28]
50Min Yang [2] [12] [13] [23]
51Yang Yang [34]
52David K. Y. Yau [31]
53Xian Yi [3]
54Fajiang Yu [10]
55Yuan Yuan [14]
56Jing Zhan [19] [32]
57Bo Zhang [15]
58Jingwei Zhang [25]
59Lei Zhang [4]
60Liqiang Zhang [17] [29]
61Xiantao Zhang [24] [31]
62Xueguang Zhou [26]
63Yajie Zhou [21]
64Bingyu Zou [32] [34]
65Deqing Zou [11]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)