dblp.uni-trier.dewww.uni-trier.de

Huanguo Zhang Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

*2009
39EEWuping Chen, Lei Zhang, Bo Qin, Qianhong Wu, Huanguo Zhang: Certificateless One-Way Authenticated Two-Party Key Agreement Protocol. IAS 2009: 483-486
2008
38EEJianming Fu, Huijun Xiong, Zhou Li, Huanguo Zhang: PerformTrust: Trust model integrated past and current performance in P2P file sharing systems. AICCSA 2008: 718-725
37EEJing Chen, Huanguo Zhang, Junhui Hu: An Efficiency Security Model of Routing Protocol in Wireless Sensor Networks. Asia International Conference on Modelling and Simulation 2008: 59-64
36EEXiaoping Wu, Zhi-Dong Shen, Huanguo Zhang: Secure Key Management of Mobile Agent System Using TPM-Based Technology on Trusted Computing Platform. CSSE (3) 2008: 1020-1023
35EEGuojun Peng, Xuanchen Pan, Huanguo Zhang, Jianming Fu: Dynamic Trustiness Authentication Framework Based on Software's Behavior Integrity. ICYCS 2008: 2283-2288
34EEYang Yang, Huanguo Zhang, Li Wan, Bingyu Zou: Design and Implementation of an Integrity Measurement System Based on Windows Trusted Computing Platform. ICYCS 2008: 229-233
33EEFan He, Huanguo Zhang, Mei Tang: A Test Method of Trusted Computing Supporting Software. ICYCS 2008: 2330-2334
32EEJing Zhan, Huanguo Zhang, Bingyu Zou, Xiaofei Li: Research on Automated Testing of the Trusted Platform Model. ICYCS 2008: 2335-2339
31EEXiantao Zhang, Anthony X. F. Xu, Qi Li, David K. Y. Yau, Sihan Qing, Huanguo Zhang: A hash-TLB approach for MMU virtualization in xen/IA64. IPDPS 2008: 1-8
30EEShuang Xiang, Mingdi Xu, Li Wang, Huanguo Zhang: Design Secure Contexts Detect Based on Lattice for Grid Computing Environment. ISECS 2008: 110-113
29EELiqiang Zhang, Huanguo Zhang: An Introduction to Data Capturing. ISECS 2008: 457-461
28EEFan Yang, Jun Song, Huanguo Zhang: Quantitative Cryptanalysis of Six-Round DES Using Evolutionary Algorithms. ISICA 2008: 134-141
27EEJun Song, Fan Yang, Maocai Wang, Huanguo Zhang: Cryptanalysis of Transposition Cipher Using Simulated Annealing Genetic Algorithm. ISICA 2008: 795-802
26EEGuoheng Wei, Xueguang Zhou, Huanguo Zhang: A Trusted Computing Model Based on Code Authorization. ISIP 2008: 495-499
25EEJuan Wang, Jingwei Zhang, Huanguo Zhang: Type Flaw Attacks and Prevention in Security Protocols. SNPD 2008: 340-343
24EEXiantao Zhang, Qi Li, Sihan Qing, Huanguo Zhang: VNIDA: Building an IDS Architecture Using VMM-Based Non-Intrusive Approach. WKDD 2008: 594-600
23EEQingshu Meng, Min Yang, Huanguo Zhang, Jingsong Cui: A novel algorithm enumerating bent functions. Discrete Mathematics 308(23): 5576-5584 (2008)
2007
22EEJianming Fu, Binglan Chen, Huanguo Zhang: A Worm Containment Model Based on Neighbor-Alarm. ATC 2007: 449-457
21EEHuanmei Guan, Huanguo Zhang, Ping Chen, Yajie Zhou: Mobile Agents Integrity Research. I3E (1) 2007: 194-201
20EEJun Song, Huanguo Zhang, Qingshu Meng, Zhang-yi Wang: Cryptanalysis of Two-Round DES Using Genetic Algorithms. ISICA 2007: 583-590
19EEJing Zhan, Huanguo Zhang, Fei Yan: Building Trusted Sub-domain for the Grid with Trusted Computing. Inscrypt 2007: 463-471
18EEBangju Wang, Huanguo Zhang, Zhang-yi Wang, Yu-Hua Wang: Speeding Up Scalar Multiplication Using a New Signed Binary Representation for Integers. MCAM 2007: 277-285
17EELiqiang Zhang, Lu Chen, Huanguo Zhang, Fei Yan: Trusted Code Remote Execution through Trusted Computing and Virtualization. SNPD (1) 2007: 39-44
16EEBangju Wang, Huanguo Zhang, Yuhua Wang: Efficient Modular Exponentiation with Three-Moduli (2n 1, 2n+3). SNPD (3) 2007: 927-931
15EEMingdi Xu, Jian He, Bo Zhang, Huanguo Zhang: A New Data Protecting Scheme Based on TPM. SNPD (3) 2007: 943-947
14EEYuan Yuan, Yan Tong, Huanguo Zhang: Complete Mapping Polynomials over Finite Field F16. WAIFI 2007: 147-158
13EEQingshu Meng, Huanguo Zhang, Min Yang, Jingsong Cui: On the degree of homogeneous bent functions. Discrete Applied Mathematics 155(5): 665-669 (2007)
12EEQingshu Meng, Huanguo Zhang, Min Yang, Zhang-yi Wang: Analysis of affinely equivalent Boolean functions. Science in China Series F: Information Sciences 50(3): 299-306 (2007)
2006
11EEFei Yan, Weizhong Qiang, Zhi-Dong Shen, Chunrun Chen, Huanguo Zhang, Deqing Zou: Daonity: An Experience on Enhancing Grid Security by Trusted Computing Technology. ATC 2006: 227-235
10EEFajiang Yu, Huanguo Zhang, Fei Yan, Song Gao: An Improved Global Trust Value Computing Method in P2P System. ATC 2006: 258-267
9EEZhi-Dong Shen, Fei Yan, Weizhong Qiang, Xiao-Ping Wu, Huanguo Zhang: Grid System Integrated with Trusted Computing Platform. IMSCCS (1) 2006: 619-625
8EEZhi-Dong Shen, Xiao-Ping Wu, Yu-Hua Wang, Wen-Ling Peng, Huanguo Zhang: Group Key Management in Grid Environment. IMSCCS (1) 2006: 626-631
2005
7EEYichun Liu, Jianming Fu, Huanguo Zhang: An Optimistic Fair Protocol for P2P Chained Transaction. ASIAN 2005: 136-145
6EEBo Meng, Huanguo Zhang: An Electronic Commerce System Prototype and Its Implementations. CIT 2005: 966-970
5EEBo Meng, Huanguo Zhang, Qianxing Xiong: The Practical Detailed Requirements of Accountability and Its Application in the Electronic Payment Protocols. EEE 2005: 556-561
4EEJianming Fu, Lei Zhang, Weinan Li, Huanguo Zhang: An Adaptive Service Strategy Based on User Rating in P2P. GCC 2005: 860-870
2004
3EEJianming Fu, Xian Yi, Huanguo Zhang: Modeling the Behavior of Ada Tasks and Verifying Its Safety. CIT 2004: 676-680
2EEMin Yang, Huanguo Zhang, Jianming Fu, Fei Yan: A Framework for Adaptive Anomaly Detection Based on Support Vector Data Description. NPC 2004: 443-450
2003
1EEMin Luo, Lina Wang, Huanguo Zhang, Jin Chen: A Research on Intrusion Detection Based on Unsupervised Clustering and Support Vector Machine. ICICS 2003: 325-336

Coauthor Index

1Binglan Chen [22]
2Chunrun Chen [11]
3Jin Chen [1]
4Jing Chen [37]
5Lu Chen [17]
6Ping Chen [21]
7Wuping Chen [39]
8Jingsong Cui [13] [23]
9Jianming Fu [2] [3] [4] [7] [22] [35] [38]
10Song Gao [10]
11Huanmei Guan [21]
12Fan He [33]
13Jian He [15]
14Junhui Hu [37]
15Qi Li [24] [31]
16Weinan Li [4]
17Xiaofei Li [32]
18Zhou Li [38]
19Yichun Liu [7]
20Min Luo [1]
21Bo Meng [5] [6]
22Qingshu Meng [12] [13] [20] [23]
23Xuanchen Pan [35]
24Guojun Peng [35]
25Wen-Ling Peng [8]
26Weizhong Qiang [9] [11]
27Bo Qin [39]
28Sihan Qing [24] [31]
29Zhi-Dong Shen [8] [9] [11] [36]
30Jun Song [20] [27] [28]
31Mei Tang [33]
32Yan Tong [14]
33Li Wan [34]
34Bangju Wang [16] [18]
35Juan Wang [25]
36Li Wang [30]
37Lina Wang [1]
38Maocai Wang [27]
39Yu-Hua Wang [8] [18]
40Yuhua Wang [16]
41Zhang-yi Wang [12] [18] [20]
42Guoheng Wei [26]
43Qianhong Wu [39]
44Xiao-Ping Wu [8] [9]
45Xiaoping Wu [36]
46Shuang Xiang [30]
47Huijun Xiong [38]
48Qianxing Xiong [5]
49Anthony X. F. Xu [31]
50Mingdi Xu [15] [30]
51Fei Yan [2] [9] [10] [11] [17] [19]
52Fan Yang [27] [28]
53Min Yang [2] [12] [13] [23]
54Yang Yang [34]
55David K. Y. Yau [31]
56Xian Yi [3]
57Fajiang Yu [10]
58Yuan Yuan [14]
59Jing Zhan [19] [32]
60Bo Zhang [15]
61Jingwei Zhang [25]
62Lei Zhang [4] [39]
63Liqiang Zhang [17] [29]
64Xiantao Zhang [24] [31]
65Xueguang Zhou [26]
66Yajie Zhou [21]
67Bingyu Zou [32] [34]
68Deqing Zou [11]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)