Sledovat
Huiping Sun
Huiping Sun
E-mailová adresa ověřena na: ss.pku.edu.cn - Domovská stránka
Název
Citace
Citace
Rok
Cqarank: jointly model topics and expertise in community question answering
L Yang, M Qiu, S Gottipati, F Zhu, J Jiang, H Sun, Z Chen
Proceedings of the 22nd ACM international conference on Information …, 2013
2572013
Sorcery: Could we make P2P content sharing systems robust to deceivers?
E Zhai, R Chen, Z Cai, L Zhang, EK Lua, H Sun, S Qing, L Tang, Z Cheny
2009 IEEE Ninth International Conference on Peer-to-Peer Computing, 11-20, 2009
322009
Using trust and risk in access control for grid environment
Y Li, H Sun, Z Chen, J Ren, H Luo
2008 International Conference on Security Technology, 13-16, 2008
312008
RFID 标签所有权转移协议研究
金永明, 孙惠平, 关志, 陈钟
计算机研究与发展 48 (8), 1400-1405, 2011
302011
Accelerating RSA with fine-grained parallelism using GPU
Y Yang, Z Guan, H Sun, Z Chen
Information Security Practice and Experience: 11th International Conference …, 2015
292015
Filtering spam in social tagging system with dynamic behavior analysis
B Liu, E Zhai, H Sun, Y Chen, Z Chen
2009 International Conference on Advances in Social Network Analysis and …, 2009
252009
Permission-Based Abnormal Application Detection for Android.
J Zhu, Z Guan, Y Yang, L Yu, H Sun, Z Chen
ICICS, 228-239, 2012
242012
Strategy proof trust management in wireless ad hoc network
H Sun, J Song
Canadian Conference on Electrical and Computer Engineering 2004 (IEEE Cat …, 2004
242004
PUF-based RFID authentication protocol against secret key leakage
Y Jin, W Xin, H Sun, Z Chen
Web Technologies and Applications: 14th Asia-Pacific Web Conference, APWeb …, 2012
212012
Spamclean: Towards spam-free tagging systems
E Zhai, H Sun, S Qing, Z Chen
2009 International Conference on Computational Science and Engineering 4 …, 2009
202009
Sorcery: Overcoming deceptive votes in P2P content sharing systems
E Zhai, H Sun, S Qing, Z Chen
Peer-to-Peer Networking and Applications 4, 178-191, 2011
152011
Passapp: My app is my password!
H Sun, K Wang, X Li, N Qin, Z Chen
Proceedings of the 17th International Conference on Human-Computer …, 2015
142015
An efficient privacy-preserving RFID ownership transfer protocol
W Xin, Z Guan, T Yang, H Sun, Z Chen
Web Technologies and Applications: 15th Asia-Pacific Web Conference, APWeb …, 2013
102013
Hash-based tag ownership transfer protocol against traceability
Y Jin, H Sun, Z Chen
2009 IEEE International Conference on e-Business Engineering, 487-492, 2009
102009
Ownership transfer protocol for RFID tag
Y Jin, H Sun, Z Guan, Z Chen
Journal of Computer Research and Development 48 (8), 1400-1405, 2011
72011
Lightweight RFID mutual authentication protocol against feasible problems
Y Jin, H Sun, W Xin, S Luo, Z Chen
Information and Communications Security: 13th International Conference …, 2011
72011
SpamResist: making peer-to-peer tagging systems robust to spam
E Zhai, R Chen, EK Lua, L Zhang, H Sun, Z Cai, S Qing, Z Chen
GLOBECOM 2009-2009 IEEE Global Telecommunications Conference, 1-6, 2009
72009
A trust and risk framework to enhance reliable interaction in e-commerce
Y Li, M Zhao, H Sun, Z Chen
2008 IEEE International Conference on e-Business Engineering, 475-480, 2008
72008
Towards privacy-preserving RFID-based location-based services
W Xin, C Tang, T Yang, H Sun, Z Chen
2012 9th International Conference on Fuzzy Systems and Knowledge Discovery …, 2012
62012
Analysis and design of distance-bounding protocols for RFID
W Xin, HP Sun, Z Chen
Journal of Computer Research and Development 50 (11), 2358-2366, 2013
52013
Systém momentálně nemůže danou operaci provést. Zkuste to znovu později.
Články 1–20