Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Jian-bin Hu
@inproceedings{DBLP:conf/sose/YuTHLHD17, author = {Lian Yu and Wei{-}Tek Tsai and Chenjian Hu and Baijie Li and Jian{-}bin Hu and Enyan Deng}, title = {Modeling Context-aware Legal Computing with Bigraphs}, booktitle = {2017 {IEEE} Symposium on Service-Oriented System Engineering, {SOSE} 2017, San Francisco, CA, USA, April 6-9, 2017}, pages = {145--152}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SOSE.2017.31}, doi = {10.1109/SOSE.2017.31}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sose/YuTHLHD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cfi/MengCHG16, author = {Hongwei Meng and Zhong Chen and Jian{-}bin Hu and Zhi Guan}, title = {Establish the Intrinsic Binding in Naming Space for Future Internet Using Combined Public Key}, booktitle = {Proceedings of the 11th International Conference on Future Internet Technologies, {CFI} 2016, Nanjing, China, June 15-17, 2016}, pages = {62--68}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2935663.2935676}, doi = {10.1145/2935663.2935676}, timestamp = {Tue, 06 Nov 2018 16:57:06 +0100}, biburl = {https://dblp.org/rec/conf/cfi/MengCHG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uic/LiTHC15, author = {Zhou Li and Cong Tang and Jian{-}bin Hu and Zhong Chen}, title = {Making Tagging Systems Resistant to Tricky Spam Attacks}, booktitle = {2015 {IEEE} 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 {IEEE} 12th Intl Conf on Autonomic and Trusted Computing and 2015 {IEEE} 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), Beijing, China, August 10-14, 2015}, pages = {871--879}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/UIC-ATC-ScalCom-CBDCom-IoP.2015.169}, doi = {10.1109/UIC-ATC-SCALCOM-CBDCOM-IOP.2015.169}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uic/LiTHC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uic/LiTHC15a, author = {Zhou Li and Cong Tang and Jian{-}bin Hu and Zhong Chen}, title = {Vulnerabilities Scoring Approach for Cloud SaaS}, booktitle = {2015 {IEEE} 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 {IEEE} 12th Intl Conf on Autonomic and Trusted Computing and 2015 {IEEE} 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), Beijing, China, August 10-14, 2015}, pages = {1339--1347}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/UIC-ATC-ScalCom-CBDCom-IoP.2015.242}, doi = {10.1109/UIC-ATC-SCALCOM-CBDCOM-IOP.2015.242}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uic/LiTHC15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/waim/YuWWZHC14, author = {Liangwen Yu and Yonggang Wang and Zhengang Wu and Jiawei Zhu and Jian{-}bin Hu and Zhong Chen}, editor = {Feifei Li and Guoliang Li and Seung{-}won Hwang and Bin Yao and Zhenjie Zhang}, title = {Edges Protection in Multiple Releases of Social Network Data}, booktitle = {Web-Age Information Management - 15th International Conference, {WAIM} 2014, Macau, China, June 16-18, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8485}, pages = {669--680}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08010-9\_71}, doi = {10.1007/978-3-319-08010-9\_71}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/waim/YuWWZHC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/XiongHC13, author = {Hu Xiong and Jian{-}bin Hu and Zhong Chen}, title = {Security Flaw of an ECC-based Signcryption Scheme with Anonymity}, journal = {Int. J. Netw. Secur.}, volume = {15}, number = {4}, pages = {317--320}, year = {2013}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v15-n4/ijns-2013-v15-n4-p317-320.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/XiongHC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEwisa/YuJJHDY13, author = {Lian Yu and Yingnan Ju and Qi Jing and Jian{-}bin Hu and Feng Ding and Kun You}, title = {Context-Aware Service Modeling and Rule Evolution}, booktitle = {2013 10th Web Information System and Application Conference, Yangzhou, China, November 10-15, 2013}, pages = {71--75}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/WISA.2013.22}, doi = {10.1109/WISA.2013.22}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEwisa/YuJJHDY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apweb/YangXYYHC13, author = {Tao Yang and Wei Xin and Liangwen Yu and Yong Yang and Jian{-}bin Hu and Zhong Chen}, editor = {Yoshiharu Ishikawa and Jianzhong Li and Wei Wang and Rui Zhang and Wenjie Zhang}, title = {MisDis: An Efficent Misbehavior Discovering Method Based on Accountability and State Machine in {VANET}}, booktitle = {Web Technologies and Applications - 15th Asia-Pacific Web Conference, APWeb 2013, Sydney, Australia, April 4-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7808}, pages = {583--594}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-37401-2\_57}, doi = {10.1007/978-3-642-37401-2\_57}, timestamp = {Mon, 28 Aug 2023 21:17:33 +0200}, biburl = {https://dblp.org/rec/conf/apweb/YangXYYHC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/waim/YuYWZHC13, author = {Liangwen Yu and Tao Yang and Zhengang Wu and Jiawei Zhu and Jian{-}bin Hu and Zhong Chen}, editor = {Jianyong Wang and Hui Xiong and Yoshiharu Ishikawa and Jianliang Xu and Junfeng Zhou}, title = {Sensitive Edges Protection in Social Networks}, booktitle = {Web-Age Information Management - 14th International Conference, {WAIM} 2013, Beidaihe, China, June 14-16, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7923}, pages = {564--569}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38562-9\_57}, doi = {10.1007/978-3-642-38562-9\_57}, timestamp = {Thu, 28 Jan 2021 11:41:18 +0100}, biburl = {https://dblp.org/rec/conf/waim/YuYWZHC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/HuXC12, author = {Jian{-}bin Hu and Hu Xiong and Zhong Chen}, title = {Further Improvement of An Authentication Scheme with User Anonymity for Wireless Communications}, journal = {Int. J. Netw. Secur.}, volume = {14}, number = {5}, pages = {297--300}, year = {2012}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v14-n5/ijns-2012-v14-n5-p297-300.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/HuXC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fskd/YangKXHC12, author = {Tao Yang and Lingbo Kong and Wei Xin and Jian{-}bin Hu and Zhong Chen}, title = {Resisting relay attacks on vehicular Passive Keyless Entry and start systems}, booktitle = {9th International Conference on Fuzzy Systems and Knowledge Discovery, {FSKD} 2012, 29-31 May 2012, Chongqing, China}, pages = {2232--2236}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/FSKD.2012.6234155}, doi = {10.1109/FSKD.2012.6234155}, timestamp = {Wed, 16 Oct 2019 14:14:57 +0200}, biburl = {https://dblp.org/rec/conf/fskd/YangKXHC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/YuZWYHC12, author = {Liangwen Yu and Jiawei Zhu and Zhengang Wu and Tao Yang and Jian{-}bin Hu and Zhong Chen}, editor = {Tat Wing Chim and Tsz Hon Yuen}, title = {Privacy Protection in Social Networks Using l-Diversity}, booktitle = {Information and Communications Security - 14th International Conference, {ICICS} 2012, Hong Kong, China, October 29-31, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7618}, pages = {435--444}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34129-8\_42}, doi = {10.1007/978-3-642-34129-8\_42}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/YuZWYHC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uic/WangZLHC12, author = {Yonggang Wang and Ennan Zhai and Eng Keong Lua and Jian{-}bin Hu and Zhong Chen}, editor = {Bernady O. Apduhan and Ching{-}Hsien Hsu and Tadashi Dohi and Kenji Ishida and Laurence Tianruo Yang and Jianhua Ma}, title = {iSac: Intimacy Based Access Control for Social Network Sites}, booktitle = {9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, {UIC/ATC} 2012, Fukuoka, Japan, September 4-7, 2012}, pages = {517--524}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/UIC-ATC.2012.49}, doi = {10.1109/UIC-ATC.2012.49}, timestamp = {Thu, 01 Feb 2024 20:40:31 +0100}, biburl = {https://dblp.org/rec/conf/uic/WangZLHC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uic/YangKWHC12, author = {Tao Yang and Lingbo Kong and Yinyang Wang and Jian{-}bin Hu and Zhong Chen}, editor = {Bernady O. Apduhan and Ching{-}Hsien Hsu and Tadashi Dohi and Kenji Ishida and Laurence Tianruo Yang and Jianhua Ma}, title = {{PKU-STRAW-L:} {A} Simulative Platform Evaluate the Power-Saving Rate of the Intelligent Street Lamp System}, booktitle = {9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, {UIC/ATC} 2012, Fukuoka, Japan, September 4-7, 2012}, pages = {525--532}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/UIC-ATC.2012.116}, doi = {10.1109/UIC-ATC.2012.116}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uic/YangKWHC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/waim/YangKYHC12, author = {Tao Yang and Lingbo Kong and Liangwen Yu and Jian{-}bin Hu and Zhong Chen}, editor = {Hong Gao and Lipyeow Lim and Wei Wang and Chuan Li and Lei Chen}, title = {{RGH:} An Efficient RSU-Aided Group-Based Hierarchical Privacy Enhancement Protocol for VANETs}, booktitle = {Web-Age Information Management - 13th International Conference, {WAIM} 2012, Harbin, China, August 18-20, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7418}, pages = {352--362}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32281-5\_35}, doi = {10.1007/978-3-642-32281-5\_35}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/waim/YangKYHC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/XiongHCL11, author = {Hu Xiong and Jian{-}bin Hu and Zhong Chen and Fagen Li}, title = {On the security of an identity based multi-proxy signature scheme}, journal = {Comput. Electr. Eng.}, volume = {37}, number = {2}, pages = {129--135}, year = {2011}, url = {https://doi.org/10.1016/j.compeleceng.2011.01.006}, doi = {10.1016/J.COMPELECENG.2011.01.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/XiongHCL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/TangWXYHSC11, author = {Cong Tang and Yonggang Wang and Hu Xiong and Tao Yang and Jian{-}bin Hu and Qingni Shen and Zhong Chen}, title = {Need for Symmetry: Addressing Privacy Risks in Online Social Networks}, booktitle = {25th {IEEE} International Conference on Advanced Information Networking and Applications, {AINA} 2011, Biopolis, Singapore, March 22-25, 2011}, pages = {534--541}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/AINA.2011.57}, doi = {10.1109/AINA.2011.57}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/TangWXYHSC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apweb/YangXHWDXC11, author = {Tao Yang and Hu Xiong and Jian{-}bin Hu and Yonggang Wang and Yong Deng and Biao Xiao and Zhong Chen}, editor = {Xiaoyong Du and Wenfei Fan and Jianmin Wang and Zhiyong Peng and Mohamed A. Sharaf}, title = {A Traceable Certificateless Threshold Proxy Signature Scheme from Bilinear Pairings}, booktitle = {Web Technologies and Applications - 13th Asia-Pacific Web Conference, APWeb 2011, Beijing, China, April 18-20, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6612}, pages = {376--381}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20291-9\_39}, doi = {10.1007/978-3-642-20291-9\_39}, timestamp = {Mon, 26 Jun 2023 20:48:23 +0200}, biburl = {https://dblp.org/rec/conf/apweb/YangXHWDXC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisis-spain/HuWYGGC11, author = {Jian{-}bin Hu and Yonggang Wang and Tao Yang and Zhi Guan and Nike Gui and Zhong Chen}, editor = {{\'{A}}lvaro Herrero and Emilio Corchado}, title = {Produre: {A} Novel Proximity Discovery Mechanism in Location Tagging System}, booktitle = {Computational Intelligence in Security for Information Systems - 4th International Conference, {CISIS} 2011, Held at {IWANN} 2011, Torremolinos-M{\'{a}}laga, Spain, June 8-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6694}, pages = {238--245}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21323-6\_30}, doi = {10.1007/978-3-642-21323-6\_30}, timestamp = {Fri, 12 Aug 2022 13:44:54 +0200}, biburl = {https://dblp.org/rec/conf/cisis-spain/HuWYGGC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/ChenLHC11, author = {Yu Chen and Song Luo and Jian{-}bin Hu and Zhong Chen}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Pascal Lafourcade}, title = {A Novel Commutative Blinding Identity Based Encryption Scheme}, booktitle = {Foundations and Practice of Security - 4th Canada-France {MITACS} Workshop, {FPS} 2011, Paris, France, May 12-13, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6888}, pages = {73--89}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27901-0\_7}, doi = {10.1007/978-3-642-27901-0\_7}, timestamp = {Fri, 27 Dec 2019 21:23:06 +0100}, biburl = {https://dblp.org/rec/conf/fps/ChenLHC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fskd/YangXHWXDC11, author = {Tao Yang and Hu Xiong and Jian{-}bin Hu and Yonggang Wang and Wei Xin and Yong Deng and Zhong Chen}, title = {A traceable privacy-preserving authentication protocol for VANETs based on proxy re-signature}, booktitle = {Eighth International Conference on Fuzzy Systems and Knowledge Discovery, {FSKD} 2011, 26-28 July 2011, Shanghai, China}, pages = {2217--2221}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/FSKD.2011.6020025}, doi = {10.1109/FSKD.2011.6020025}, timestamp = {Fri, 13 Aug 2021 09:26:01 +0200}, biburl = {https://dblp.org/rec/conf/fskd/YangXHWXDC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispa/DuWHC11, author = {Longzhi Du and Yonggang Wang and Jian{-}bin Hu and Zhong Chen}, title = {Sitab: Combating Spam in Tagging Systems via Users' Implicit Tagging Behavior}, booktitle = {{IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA} 2011, Busan, Korea, 26-28 May, 2011}, pages = {270--275}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ISPA.2011.35}, doi = {10.1109/ISPA.2011.35}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispa/DuWHC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LuoCHC11, author = {Song Luo and Yu Chen and Jian{-}bin Hu and Zhong Chen}, editor = {Feng Bao and Jian Weng}, title = {New Fully Secure Hierarchical Identity-Based Encryption with Constant Size Ciphertexts}, booktitle = {Information Security Practice and Experience - 7th International Conference, {ISPEC} 2011, Guangzhou, China, May 30 - June 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6672}, pages = {55--70}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21031-0\_5}, doi = {10.1007/978-3-642-21031-0\_5}, timestamp = {Tue, 12 May 2020 10:56:38 +0200}, biburl = {https://dblp.org/rec/conf/ispec/LuoCHC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijaacs/CaoKGCH10, author = {Zhen Cao and Jiejun Kong and Mario Gerla and Zhong Chen and Jian{-}bin Hu}, title = {Filtering false data via authentic consensus in vehicle ad hoc networks}, journal = {Int. J. Auton. Adapt. Commun. Syst.}, volume = {3}, number = {2}, pages = {217--235}, year = {2010}, url = {https://doi.org/10.1504/IJAACS.2010.031092}, doi = {10.1504/IJAACS.2010.031092}, timestamp = {Sun, 30 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijaacs/CaoKGCH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/CaoGCHT10, author = {Zhen Cao and Zhi Guan and Zhong Chen and Jian{-}bin Hu and Liyong Tang}, title = {Towards Risk Evaluation of Denial-of-Service Vulnerabilities in Security Protocols}, journal = {J. Comput. Sci. Technol.}, volume = {25}, number = {2}, pages = {375--387}, year = {2010}, url = {https://doi.org/10.1007/s11390-010-9330-4}, doi = {10.1007/S11390-010-9330-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcst/CaoGCHT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/GuiHC10, author = {Nike Gui and Jian{-}bin Hu and Zhong Chen}, title = {A Secure Routing Protocol and its application in Multi-sink Wireless Sensor Networks}, journal = {J. Networks}, volume = {5}, number = {5}, pages = {535--542}, year = {2010}, url = {https://doi.org/10.4304/jnw.5.5.535-542}, doi = {10.4304/JNW.5.5.535-542}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/GuiHC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChenCGHC10, author = {Yu Chen and Manuel Charlemagne and Zhi Guan and Jian{-}bin Hu and Zhong Chen}, editor = {Dengguo Feng and David A. Basin and Peng Liu}, title = {Identity-based encryption based on {DHIES}}, booktitle = {Proceedings of the 5th {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2010, Beijing, China, April 13-16, 2010}, pages = {82--88}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1755688.1755699}, doi = {10.1145/1755688.1755699}, timestamp = {Fri, 03 Jun 2022 12:02:10 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ChenCGHC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/ChenKHC10, author = {Yu Chen and Hyun Sung Kim and Jian{-}bin Hu and Zhong Chen}, editor = {Sara Foresti and Sushil Jajodia}, title = {When {ABE} Meets {RSS}}, booktitle = {Data and Applications Security and Privacy XXIV, 24th Annual {IFIP} {WG} 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6166}, pages = {319--326}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13739-6\_23}, doi = {10.1007/978-3-642-13739-6\_23}, timestamp = {Sun, 12 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/ChenKHC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/LuoHC10, author = {Song Luo and Jian{-}bin Hu and Zhong Chen}, editor = {Ehab Al{-}Shaer and Hongxia Jin and Marc Joye}, title = {New construction of identity-based proxy re-encryption}, booktitle = {Proceedings of the 10th {ACM} Workshop on Digital Rights Management, Chicago, Illinois, USA, October 4, 2010}, pages = {47--50}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866870.1866880}, doi = {10.1145/1866870.1866880}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/LuoHC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fskd/WangZHC10, author = {Yonggang Wang and Ennan Zhai and Jian{-}bin Hu and Zhong Chen}, editor = {Maozhen Li and Qilian Liang and Lipo Wang and Yibin Song}, title = {Claper: Recommend classical papers to beginners}, booktitle = {Seventh International Conference on Fuzzy Systems and Knowledge Discovery, {FSKD} 2010, 10-12 August 2010, Yantai, Shandong, China}, pages = {2777--2781}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/FSKD.2010.5569227}, doi = {10.1109/FSKD.2010.5569227}, timestamp = {Sat, 25 Jun 2022 17:37:25 +0200}, biburl = {https://dblp.org/rec/conf/fskd/WangZHC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gpc/LiHG10, author = {Mingming Li and Jian{-}bin Hu and Nike Gui}, editor = {Paolo Bellavista and Ruay{-}Shiung Chang and Han{-}Chieh Chao and Shin{-}Feng Lin and Peter M. A. Sloot}, title = {Data-Centric Trust Framework for High Integrity Wireless Sensor Networks}, booktitle = {Advances in Grid and Pervasive Computing, 5th International Conference, {GPC} 2010, Hualien, Taiwan, May 10-13, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6104}, pages = {593--602}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13067-0\_61}, doi = {10.1007/978-3-642-13067-0\_61}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/gpc/LiHG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/XieTGCHC10, author = {Anmin Xie and Cong Tang and Nike Gui and Zhuhua Cai and Jian{-}bin Hu and Zhong Chen}, title = {An Adjacency Matrixes-Based Model for Network Security Analysis}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2010, Cape Town, South Africa, 23-27 May 2010}, pages = {1--5}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ICC.2010.5502655}, doi = {10.1109/ICC.2010.5502655}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/XieTGCHC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LuoHC10, author = {Song Luo and Jian{-}bin Hu and Zhong Chen}, editor = {Miguel Soriano and Sihan Qing and Javier L{\'{o}}pez}, title = {Ciphertext Policy Attribute-Based Proxy Re-encryption}, booktitle = {Information and Communications Security - 12th International Conference, {ICICS} 2010, Barcelona, Spain, December 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6476}, pages = {401--415}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17650-0\_28}, doi = {10.1007/978-3-642-17650-0\_28}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/LuoHC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpads/WangZCXWHC10, author = {Yonggang Wang and Ennan Zhai and Cui Cao and Yongqiang Xie and Zhaojun Wang and Jian{-}bin Hu and Zhong Chen}, title = {DSpam: Defending Against Spam in Tagging Systems via Users' Reliability}, booktitle = {16th {IEEE} International Conference on Parallel and Distributed Systems, {ICPADS} 2010, Shanghai, China, December 8-10, 2010}, pages = {139--146}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ICPADS.2010.63}, doi = {10.1109/ICPADS.2010.63}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icpads/WangZCXWHC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icws/LuoHC10, author = {Song Luo and Jian{-}bin Hu and Zhong Chen}, title = {Implementing Attribute-Based Encryption in Web Services}, booktitle = {{IEEE} International Conference on Web Services, {ICWS} 2010, Miami, Florida, USA, July 5-10, 2010}, pages = {658--659}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ICWS.2010.82}, doi = {10.1109/ICWS.2010.82}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icws/LuoHC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/waim/GuiZHC10, author = {Nike Gui and Ennan Zhai and Jian{-}bin Hu and Zhong Chen}, editor = {Lei Chen and Changjie Tang and Jun Yang and Yunjun Gao}, title = {{SWORDS:} Improving Sensor Networks Immunity under Worm Attacks}, booktitle = {Web-Age Information Management, 11th International Conference, {WAIM} 2010, Jiuzhaigou, China, July 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6184}, pages = {86--96}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14246-8\_11}, doi = {10.1007/978-3-642-14246-8\_11}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/waim/GuiZHC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1008-5015, author = {Hu Xiong and Jian{-}bin Hu and Tao Yang and Wei Xin and Zhong Chen}, title = {Efficient Privacy-Preserving Authentication Protocol for Vehicular Communications with Trustworthy}, journal = {CoRR}, volume = {abs/1008.5015}, year = {2010}, url = {http://arxiv.org/abs/1008.5015}, eprinttype = {arXiv}, eprint = {1008.5015}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1008-5015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuoHC10, author = {Song Luo and Jian{-}bin Hu and Zhong Chen}, title = {New Construction of Identity-based Proxy Re-encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {444}, year = {2010}, url = {http://eprint.iacr.org/2010/444}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuoHC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/XieCTHC09, author = {Anmin Xie and Zhuhua Cai and Cong Tang and Jian{-}bin Hu and Zhong Chen}, title = {Evaluating Network Security With Two-Layer Attack Graphs}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {127--136}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.22}, doi = {10.1109/ACSAC.2009.22}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/XieCTHC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fcst/LiTHC09, author = {Suke Li and Liyong Tang and Jian{-}bin Hu and Zhong Chen}, title = {Automatic Data Extraction from Web Discussion Forums}, booktitle = {Fourth International Conference on Frontier of Computer Science and Technology, {FCST} 2009, Shanghai, China, 17-19 December, 2009}, pages = {219--225}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/FCST.2009.20}, doi = {10.1109/FCST.2009.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fcst/LiTHC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icns/TangCCXHTC09, author = {Cong Tang and Ruichuan Chen and Zhuhua Cai and Anmin Xie and Jian{-}bin Hu and Liyong Tang and Zhong Chen}, editor = {Jaime Lloret Mauri and Vicente Casares Giner and Rafael Tomas and Tomeu Serra and Oana Dini}, title = {{SKIP:} {A} Secure Key Issuing Scheme for Peer-to-Peer Networks}, booktitle = {The Fifth International Conference on Networking and Services, {ICNS} 2009, 20-25 April 2009, Valencia, Spain}, pages = {296--302}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ICNS.2009.64}, doi = {10.1109/ICNS.2009.64}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icns/TangCCXHTC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/CaiCFTCH09, author = {Zhuhua Cai and Ruichuan Chen and Jianqiao Feng and Cong Tang and Zhong Chen and Jian{-}bin Hu}, editor = {Sung Y. Shin and Sascha Ossowski}, title = {A holistic mechanism against file pollution in peer-to-peer networks}, booktitle = {Proceedings of the 2009 {ACM} Symposium on Applied Computing (SAC), Honolulu, Hawaii, USA, March 9-12, 2009}, pages = {28--34}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1529282.1529288}, doi = {10.1145/1529282.1529288}, timestamp = {Tue, 06 Nov 2018 11:06:49 +0100}, biburl = {https://dblp.org/rec/conf/sac/CaiCFTCH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/TangCCXHTC09, author = {Cong Tang and Ruichuan Chen and Zhuhua Cai and Anmin Xie and Jian{-}bin Hu and Liyong Tang and Zhong Chen}, editor = {Sung Y. Shin and Sascha Ossowski}, title = {Securing key issuing in peer-to-peer networks}, booktitle = {Proceedings of the 2009 {ACM} Symposium on Applied Computing (SAC), Honolulu, Hawaii, USA, March 9-12, 2009}, pages = {84--85}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1529282.1529298}, doi = {10.1145/1529282.1529298}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sac/TangCCXHTC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/XieCWCH09, author = {Anmin Xie and Guodong Chen and Yonggang Wang and Zhong Chen and Jian{-}bin Hu}, title = {A New Method to Generate Attack Graphs}, booktitle = {Third {IEEE} International Conference on Secure Software Integration and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10, 2009}, pages = {401--406}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/SSIRI.2009.32}, doi = {10.1109/SSIRI.2009.32}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ssiri/XieCWCH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijpcc/CaoHCXZ08, author = {Zhen Cao and Jian{-}bin Hu and Zhong Chen and Maoxing Xu and Xia Zhou}, title = {{FBSR:} feedback-based secure routing protocol for wireless sensor networks}, journal = {Int. J. Pervasive Comput. Commun.}, volume = {4}, number = {1}, pages = {61--76}, year = {2008}, url = {https://doi.org/10.1108/17427370810873110}, doi = {10.1108/17427370810873110}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijpcc/CaoHCXZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisse/WangGHC08, author = {Yonggang Wang and Nike Gui and Jian{-}bin Hu and Zhong Chen}, editor = {Tarek M. Sobh and Khaled M. Elleithy and Ausif Mahmood}, title = {Automatic Construction and Optimization of Layered Network Attack Graph}, booktitle = {Novel Algorithms and Techniques in Telecommunications and Networking, proceedings of the 2008 International Conference on Telecommunications and Networking (TeNe), part of the International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering, {CISSE} 2008, Bridgeport, Connecticut, {USA}}, pages = {135--138}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-90-481-3662-9\_22}, doi = {10.1007/978-90-481-3662-9\_22}, timestamp = {Tue, 29 Dec 2020 18:38:51 +0100}, biburl = {https://dblp.org/rec/conf/cisse/WangGHC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europar/ChenGTHC08, author = {Ruichuan Chen and Wenjia Guo and Liyong Tang and Jian{-}bin Hu and Zhong Chen}, editor = {Emilio Luque and Tom{\`{a}}s Margalef and Domingo Benitez}, title = {Scalable Byzantine Fault Tolerant Public Key Authentication for Peer-to-Peer Networks}, booktitle = {Euro-Par 2008 - Parallel Processing, 14th International Euro-Par Conference, Las Palmas de Gran Canaria, Spain, August 26-29, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5168}, pages = {601--610}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85451-7\_64}, doi = {10.1007/978-3-540-85451-7\_64}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/europar/ChenGTHC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atc/ChenZTHC07, author = {Ruichuan Chen and Xuan Zhao and Liyong Tang and Jian{-}bin Hu and Zhong Chen}, editor = {Bin Xiao and Laurence Tianruo Yang and Jianhua Ma and Christian M{\"{u}}ller{-}Schloer and Yu Hua}, title = {CuboidTrust: {A} Global Reputation-Based Trust Model in Peer-to-Peer Networks}, booktitle = {Autonomic and Trusted Computing, 4th International Conference, {ATC} 2007, Hong Kong, China, July 11-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4610}, pages = {203--215}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73547-2\_22}, doi = {10.1007/978-3-540-73547-2\_22}, timestamp = {Thu, 01 Feb 2024 20:40:31 +0100}, biburl = {https://dblp.org/rec/conf/atc/ChenZTHC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/ChenGTHC07, author = {Ruichuan Chen and Wenjia Guo and Liyong Tang and Jian{-}bin Hu and Zhong Chen}, title = {Hybrid Overlay Structure Based on Virtual Node}, booktitle = {Proceedings of the 12th {IEEE} Symposium on Computers and Communications {(ISCC} 2007), July 1-4, Aveiro, Portugal}, pages = {1091--1098}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ISCC.2007.4381519}, doi = {10.1109/ISCC.2007.4381519}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscc/ChenGTHC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/CaoGCHT07, author = {Zhen Cao and Zhi Guan and Zhong Chen and Jian{-}bin Hu and Liyong Tang}, editor = {Ed Dawson and Duncan S. Wong}, title = {An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols}, booktitle = {Information Security Practice and Experience, Third International Conference, {ISPEC} 2007, Hong Kong, China, May 7-9, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4464}, pages = {129--144}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72163-5\_12}, doi = {10.1007/978-3-540-72163-5\_12}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispec/CaoGCHT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/CaoHCXZ06, author = {Zhen Cao and Jian{-}bin Hu and Zhong Chen and Maoxing Xu and Xia Zhou}, title = {Feedback: Towards Dynamic Behavior and Secure Routing forWireless Sensor Networks}, booktitle = {20th International Conference on Advanced Information Networking and Applications {(AINA} 2006), 18-20 April 2006, Vienna, Austria}, pages = {160--164}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/AINA.2006.179}, doi = {10.1109/AINA.2006.179}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/CaoHCXZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mass/JingHC06, author = {Qi Jing and Jian{-}bin Hu and Zhong Chen}, title = {{C4W:} An Energy Efficient Public Key Cryptosystem for Large-Scale Wireless Sensor Networks}, booktitle = {{IEEE} 3rd International Conference on Mobile Adhoc and Sensor Systems, {MASS} 2006, 9-12 October 2006, Vancouver, BC, Canada}, pages = {827--832}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/MOBHOC.2006.278660}, doi = {10.1109/MOBHOC.2006.278660}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mass/JingHC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/webi/LiuHC05, author = {Peng Liu and Jian{-}bin Hu and Zhong Chen}, editor = {Andrzej Skowron and Rakesh Agrawal and Michael Luck and Takahira Yamaguchi and Pierre Morizet{-}Mahoudeaux and Jiming Liu and Ning Zhong}, title = {A Formal Language for Access Control Policies in Distributed Environment}, booktitle = {2005 {IEEE} / {WIC} / {ACM} International Conference on Web Intelligence {(WI} 2005), 19-22 September 2005, Compiegne, France}, pages = {766--769}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/WI.2005.2}, doi = {10.1109/WI.2005.2}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/webi/LiuHC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.