Author of the publication

A Dynamic Anonymous P2P Reputation System Based on Trusted Computing Technology.

, , , and . GLOBECOM, page 332-337. IEEE, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancing DDoS Flood Attack Detection via Intelligent Fuzzy Logic., , , and . Informatica (Slovenia), 34 (4): 497-507 (2010)An Anonymity Scheme Based on Pseudonym in P2P Networks., , , , and . e-Forensics, volume 56 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 287-293. Springer, (2010)Finding community structure in complex network based on latent variables., , , and . CHINACOM, page 239-244. IEEE, (2012)A LoSS Based On-line Detection of Abnormal Traffic Using Dynamic Detection Threshold., , , and . ICICS, volume 5927 of Lecture Notes in Computer Science, page 283-292. Springer, (2009)A Dynamic Anonymous P2P Reputation System Based on Trusted Computing Technology., , , and . GLOBECOM, page 332-337. IEEE, (2007)A Low Cost and Reliable Anonymity Scheme in P2P Reputation Systems with Trusted Third Parties., , , and . GLOBECOM, page 2201-2205. IEEE, (2008)A Community Divisive Algorithm Using Local Weak Links., , , and . ICITCS, page 1-5. IEEE Computer Society, (2014)Impact of Feedback on Trust in P2P Networks., , , and . J. Networks, 7 (8): 1182-1188 (2012)Real-Time and Self-adaptive Method for Abnormal Traffic Detection Based on Self-similarity., , , and . WISM, volume 5854 of Lecture Notes in Computer Science, page 383-392. Springer, (2009)An Anti-attack Model Based on Complex Network Theory in P2P networks, , , , and . CoRR, (2011)