![]() | ![]() |
2008 | ||
---|---|---|
3 | EE | Zhitang Li, Huaiqing Lin, Chuiwei Lu, Yejiang Zhang: Managing Data for Evaluating Trust in Unstructured Peer-to-Peer Networks. GPC 2008: 308-318 |
2 | EE | Yejiang Zhang, Zhitang Li, Zhengbing Hu, Hao Tu, Huaiqing Lin: A P2P E-commerce Related Network Security Issue: P2P Worm. ISECS 2008: 114-117 |
2006 | ||
1 | EE | Zhitang Li, Weidong Wang, Yejiang Zhang, Weiming Li: Source Authentication of Media Streaming Based on Chains of Iso-hash Clusters. ATC 2006: 398-407 |
1 | Zhengbing Hu | [2] |
2 | Weiming Li | [1] |
3 | Zhitang Li | [1] [2] [3] |
4 | Huaiqing Lin | [2] [3] |
5 | Chuiwei Lu | [3] |
6 | Hao Tu | [2] |
7 | Weidong Wang | [1] |