2008 |
38 | EE | Jianming Fu,
Huijun Xiong,
Zhou Li,
Huanguo Zhang:
PerformTrust: Trust model integrated past and current performance in P2P file sharing systems.
AICCSA 2008: 718-725 |
37 | EE | Jing Chen,
Huanguo Zhang,
Junhui Hu:
An Efficiency Security Model of Routing Protocol in Wireless Sensor Networks.
Asia International Conference on Modelling and Simulation 2008: 59-64 |
36 | EE | Xiaoping Wu,
Zhi-Dong Shen,
Huanguo Zhang:
Secure Key Management of Mobile Agent System Using TPM-Based Technology on Trusted Computing Platform.
CSSE (3) 2008: 1020-1023 |
35 | EE | Guojun Peng,
Xuanchen Pan,
Huanguo Zhang,
Jianming Fu:
Dynamic Trustiness Authentication Framework Based on Software's Behavior Integrity.
ICYCS 2008: 2283-2288 |
34 | EE | Yang Yang,
Huanguo Zhang,
Li Wan,
Bingyu Zou:
Design and Implementation of an Integrity Measurement System Based on Windows Trusted Computing Platform.
ICYCS 2008: 229-233 |
33 | EE | Fan He,
Huanguo Zhang,
Mei Tang:
A Test Method of Trusted Computing Supporting Software.
ICYCS 2008: 2330-2334 |
32 | EE | Jing Zhan,
Huanguo Zhang,
Bingyu Zou,
Xiaofei Li:
Research on Automated Testing of the Trusted Platform Model.
ICYCS 2008: 2335-2339 |
31 | EE | Xiantao Zhang,
Anthony X. F. Xu,
Qi Li,
David K. Y. Yau,
Sihan Qing,
Huanguo Zhang:
A hash-TLB approach for MMU virtualization in xen/IA64.
IPDPS 2008: 1-8 |
30 | EE | Shuang Xiang,
Mingdi Xu,
Li Wang,
Huanguo Zhang:
Design Secure Contexts Detect Based on Lattice for Grid Computing Environment.
ISECS 2008: 110-113 |
29 | EE | Liqiang Zhang,
Huanguo Zhang:
An Introduction to Data Capturing.
ISECS 2008: 457-461 |
28 | EE | Fan Yang,
Jun Song,
Huanguo Zhang:
Quantitative Cryptanalysis of Six-Round DES Using Evolutionary Algorithms.
ISICA 2008: 134-141 |
27 | EE | Jun Song,
Fan Yang,
Maocai Wang,
Huanguo Zhang:
Cryptanalysis of Transposition Cipher Using Simulated Annealing Genetic Algorithm.
ISICA 2008: 795-802 |
26 | EE | Guoheng Wei,
Xueguang Zhou,
Huanguo Zhang:
A Trusted Computing Model Based on Code Authorization.
ISIP 2008: 495-499 |
25 | EE | Juan Wang,
Jingwei Zhang,
Huanguo Zhang:
Type Flaw Attacks and Prevention in Security Protocols.
SNPD 2008: 340-343 |
24 | EE | Xiantao Zhang,
Qi Li,
Sihan Qing,
Huanguo Zhang:
VNIDA: Building an IDS Architecture Using VMM-Based Non-Intrusive Approach.
WKDD 2008: 594-600 |
23 | EE | Qingshu Meng,
Min Yang,
Huanguo Zhang,
Jingsong Cui:
A novel algorithm enumerating bent functions.
Discrete Mathematics 308(23): 5576-5584 (2008) |
2007 |
22 | EE | Jianming Fu,
Binglan Chen,
Huanguo Zhang:
A Worm Containment Model Based on Neighbor-Alarm.
ATC 2007: 449-457 |
21 | EE | Huanmei Guan,
Huanguo Zhang,
Ping Chen,
Yajie Zhou:
Mobile Agents Integrity Research.
I3E (1) 2007: 194-201 |
20 | EE | Jun Song,
Huanguo Zhang,
Qingshu Meng,
Zhang-yi Wang:
Cryptanalysis of Two-Round DES Using Genetic Algorithms.
ISICA 2007: 583-590 |
19 | EE | Jing Zhan,
Huanguo Zhang,
Fei Yan:
Building Trusted Sub-domain for the Grid with Trusted Computing.
Inscrypt 2007: 463-471 |
18 | EE | Bangju Wang,
Huanguo Zhang,
Zhang-yi Wang,
Yu-Hua Wang:
Speeding Up Scalar Multiplication Using a New Signed Binary Representation for Integers.
MCAM 2007: 277-285 |
17 | EE | Liqiang Zhang,
Lu Chen,
Huanguo Zhang,
Fei Yan:
Trusted Code Remote Execution through Trusted Computing and Virtualization.
SNPD (1) 2007: 39-44 |
16 | EE | Bangju Wang,
Huanguo Zhang,
Yuhua Wang:
Efficient Modular Exponentiation with Three-Moduli (2n 1, 2n+3).
SNPD (3) 2007: 927-931 |
15 | EE | Mingdi Xu,
Jian He,
Bo Zhang,
Huanguo Zhang:
A New Data Protecting Scheme Based on TPM.
SNPD (3) 2007: 943-947 |
14 | EE | Yuan Yuan,
Yan Tong,
Huanguo Zhang:
Complete Mapping Polynomials over Finite Field F16.
WAIFI 2007: 147-158 |
13 | EE | Qingshu Meng,
Huanguo Zhang,
Min Yang,
Jingsong Cui:
On the degree of homogeneous bent functions.
Discrete Applied Mathematics 155(5): 665-669 (2007) |
12 | EE | Qingshu Meng,
Huanguo Zhang,
Min Yang,
Zhang-yi Wang:
Analysis of affinely equivalent Boolean functions.
Science in China Series F: Information Sciences 50(3): 299-306 (2007) |
2006 |
11 | EE | Fei Yan,
Weizhong Qiang,
Zhi-Dong Shen,
Chunrun Chen,
Huanguo Zhang,
Deqing Zou:
Daonity: An Experience on Enhancing Grid Security by Trusted Computing Technology.
ATC 2006: 227-235 |
10 | EE | Fajiang Yu,
Huanguo Zhang,
Fei Yan,
Song Gao:
An Improved Global Trust Value Computing Method in P2P System.
ATC 2006: 258-267 |
9 | EE | Zhi-Dong Shen,
Fei Yan,
Weizhong Qiang,
Xiao-Ping Wu,
Huanguo Zhang:
Grid System Integrated with Trusted Computing Platform.
IMSCCS (1) 2006: 619-625 |
8 | EE | Zhi-Dong Shen,
Xiao-Ping Wu,
Yu-Hua Wang,
Wen-Ling Peng,
Huanguo Zhang:
Group Key Management in Grid Environment.
IMSCCS (1) 2006: 626-631 |
2005 |
7 | EE | Yichun Liu,
Jianming Fu,
Huanguo Zhang:
An Optimistic Fair Protocol for P2P Chained Transaction.
ASIAN 2005: 136-145 |
6 | EE | Bo Meng,
Huanguo Zhang:
An Electronic Commerce System Prototype and Its Implementations.
CIT 2005: 966-970 |
5 | EE | Bo Meng,
Huanguo Zhang,
Qianxing Xiong:
The Practical Detailed Requirements of Accountability and Its Application in the Electronic Payment Protocols.
EEE 2005: 556-561 |
4 | EE | Jianming Fu,
Lei Zhang,
Weinan Li,
Huanguo Zhang:
An Adaptive Service Strategy Based on User Rating in P2P.
GCC 2005: 860-870 |
2004 |
3 | EE | Jianming Fu,
Xian Yi,
Huanguo Zhang:
Modeling the Behavior of Ada Tasks and Verifying Its Safety.
CIT 2004: 676-680 |
2 | EE | Min Yang,
Huanguo Zhang,
Jianming Fu,
Fei Yan:
A Framework for Adaptive Anomaly Detection Based on Support Vector Data Description.
NPC 2004: 443-450 |
2003 |
1 | EE | Min Luo,
Lina Wang,
Huanguo Zhang,
Jin Chen:
A Research on Intrusion Detection Based on Unsupervised Clustering and Support Vector Machine.
ICICS 2003: 325-336 |