Certificateless and identity-based authenticated asymmetric group key agreement
Zhang, Lei, Wu, Qianhong, Qin, Bo, Deng, Hua, Li, Jiangtao, Liu, Jianwei, Shi, Wenchang
Published in International journal of information security (01.10.2017)
Published in International journal of information security (01.10.2017)
Get full text
Journal Article
Versatile lightweight key distribution for big data privacy in vehicular ad hoc networks
Qin, Bo, Wang, Linxiao, Wang, Yujue, Wu, Qianhong, Shi, Wenchang, Liang, Bin
Published in Concurrency and computation (01.07.2016)
Published in Concurrency and computation (01.07.2016)
Get full text
Journal Article
Network traffic monitoring, analysis and anomaly detection [Guest Editorial]
Wang, Wei, Zhang, Xiangliang, Shi, Wenchang, Lian, Shiguo, Feng, Dengguo
Published in IEEE network (01.05.2011)
Published in IEEE network (01.05.2011)
Get full text
Journal Article
A Paid Message Forwarding Scheme Based on Social Network
Geng, Yifu, Qin, Bo, Shi, Wenchang, Wu, Qianhong
Published in Information Security and Cryptology (2021)
Published in Information Security and Cryptology (2021)
Get full text
Book Chapter
Understanding and analyzing network traffic
Wang, Wei, Zhang, Xiangliang, Shi, Wenchang, Lian, Shiguo, Feng, Dengguo
Published in IEEE network (01.01.2012)
Published in IEEE network (01.01.2012)
Get full text
Journal Article
An Approach for Compliance Validation of Trusted Computing Applications
Qi Cui, Wenchang Shi
Published in First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008) (01.01.2008)
Published in First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008) (01.01.2008)
Get full text
Conference Proceeding
Trust-oriented Access Control based on Sources of Information Flow
Hui Feng, Weinan Li, Wenchang Shi, Zhaohui Liang, Bin Liang
Published in 13th International Conference on Advanced Communication Technology (ICACT2011) (01.02.2011)
Get full text
Published in 13th International Conference on Advanced Communication Technology (ICACT2011) (01.02.2011)
Conference Proceeding
Legitimation der kreislaufeffektiven Holzbauweise – Nachweis der Klimaschutzwirkung
Graf, Jürgen, Hao, Boran, Birk, Stephan, Poteschkin, Viktor, Shi, Wenchang, Klopfer, Reiner, Jagsch, Christina, Ciesla, Eva‐Maria
Published in Die Bautechnik (01.11.2024)
Published in Die Bautechnik (01.11.2024)
Get full text
Journal Article
Locating Third-party Library Functions in Obfuscated Applications
Yuan, Jiangfeng, Li, Haoxiang, You, Wei, Huang, Jianjun, Shi, Wenchang, Liang, Bin
Published in Ji suan ji ke xue (01.01.2023)
Get full text
Published in Ji suan ji ke xue (01.01.2023)
Journal Article
Operating system mechanisms for TPM-based lifetime measurement of process integrity
Xiao Li, Wenchang Shi, Zhaohui Liang, Bin Liang, Zhiyong Shan
Published in 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems (01.10.2009)
Published in 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems (01.10.2009)
Get full text
Conference Proceeding
Design and Implementation of a Network Supporting Environment for Virtual Experimental Platforms
Qi Cui, Wenchang Shi, Yu Wang
Published in 2009 WRI International Conference on Communications and Mobile Computing (01.01.2009)
Published in 2009 WRI International Conference on Communications and Mobile Computing (01.01.2009)
Get full text
Conference Proceeding
Portal monitoring based anti-malware framework: design and implementation
Yanjun Wu, Wenchang Shi
Published in 2006 IEEE International Performance Computing and Communications Conference (2006)
Published in 2006 IEEE International Performance Computing and Communications Conference (2006)
Get full text
Conference Proceeding