2008 |
9 | EE | Chengyu Fan,
Shijie Zhou,
Fagen Li:
Deniable Proxy-Anonymous Signatures.
ICYCS 2008: 2131-2136 |
8 | EE | Rui Yang,
Shijie Zhou,
Chengyu Fan:
A New Algorithm for Network Diameter.
ICYCS 2008: 247-252 |
7 | EE | Fagen Li,
Shijie Zhou,
Rong Sun:
Cryptanalysis of an Identity Based Proxy Multi-Signature Scheme.
IEICE Transactions 91-A(7): 1820-1823 (2008) |
2007 |
6 | EE | Chunjiang Wu,
Shijie Zhou,
Linna Wei,
Jiaqing Luo,
Yanli Wang,
Xiaoqian Yang:
A New k-Graph Partition Algorithm for Distributed P2P Simulation Systems.
ICA3PP 2007: 391-402 |
2006 |
5 | EE | Shijie Zhou,
Zhiguang Qin,
Xiaomei Zhao,
Xucheng Luo:
Interconnected Peer-to-Peer Network: A Community Based Scheme.
AICT/ICIW 2006: 108 |
4 | EE | Jiaqing Luo,
Shijie Zhou,
Chunjiang Wu:
An Experimental Study of the Active Recommendation Mechanism Based Distributed Approximate Indexing in Unstructured P2P Networks.
IAT Workshops 2006: 467-470 |
2004 |
3 | EE | Feng Zhang,
Zhiguang Qin,
Shijie Zhou:
Policy-Tree Based Proactive Defense Model for Network Security.
GCC Workshops 2004: 437-449 |
2003 |
2 | EE | Shijie Zhou,
Zhiguang Qin,
Jinde Liu:
Distributing the Keys into P2P Network.
GCC (1) 2003: 460-463 |
1 | EE | Shijie Zhou,
Zhiguang Qin,
Feng Zhang,
Xianfeng Zhang,
Wei Chen,
Jinde Liu:
Colored Petri Net Based Attack Modeling.
RSFDGrC 2003: 715-718 |