default search action
Huanguo Zhang
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j50]Jiaming Wen, Willy Susilo, Rupeng Yang, Zuoxia Yu, Huanguo Zhang:
Revocable ring signatures with CCA-anonymity from standard lattices. Comput. Stand. Interfaces 91: 103893 (2025) - 2024
- [j49]Jiaming Wen, Lu Bai, Zhichao Yang, Huanguo Zhang, Houzhen Wang, Debiao He:
LaRRS: Lattice-Based Revocable Ring Signature and Its Application for VANETs. IEEE Trans. Veh. Technol. 73(1): 739-753 (2024) - 2023
- [j48]Houzhen Wang, Jiaming Wen, Jinhui Liu, Huanguo Zhang:
ACKE: Asymmetric Computing Key Exchange Protocol for IoT Environments. IEEE Internet Things J. 10(20): 18273-18281 (2023) - [c65]Jiaming Wen, Houzhen Wang, Huanguo Zhang:
Post-quantum Sigma Protocols and Signatures from Low-Rank Matrix Completions. ProvSec 2023: 186-206 - 2022
- [j47]Jinhui Liu, Yong Yu, Hongliang Bi, Yanqi Zhao, Shijia Wang, Huanguo Zhang:
Post quantum secure fair data trading with deterability based on machine learning. Sci. China Inf. Sci. 65(7): 1-2 (2022) - [j46]Jinhui Liu, Yong Yu, Houzhen Wang, Huanguo Zhang:
Lattice-Based Self-Enhancement Authorized Accessible Privacy Authentication for Cyber-Physical Systems. Secur. Commun. Networks 2022: 8995704:1-8995704:9 (2022) - [j45]Sultan M. Zangi, Atta ur Rahman, Zhao-Xo Ji, Hazrat Ali, Huanguo Zhang:
Decoherence Effects in a Three-Level System under Gaussian Process. Symmetry 14(12): 2480 (2022) - 2020
- [j44]HouZhen Wang, Yan Guo, Huanguo Zhang:
A Method of Ultra-Large-Scale Matrix Inversion Using Block Recursion. Inf. 11(11): 523 (2020) - [j43]Yanbin Li, Ming Tang, Yuguang Li, Huanguo Zhang:
A pre-silicon logic level security verification flow for higher-order masking schemes against glitches on FPGAs. Integr. 70: 60-69 (2020) - [c64]Yan Tong, Huanguo Zhang, Zhengwei Ren, Shiwei Xu:
Invariance of Algebraic Immunity of Vectorial Boolean Functions under Equivalence Relations. BigDataSE 2020: 147-154 - [c63]Shiwei Xu, Yizhi Zhao, Zhengwei Ren, Lingjuan Wu, Yan Tong, Huanguo Zhang:
A Symbolic Model for Systematically Analyzing TEE-Based Protocols. ICICS 2020: 126-144 - [c62]Shiwei Xu, Xiaowen Cai, Yizhi Zhao, Zhengwei Ren, Lingjuan Wu, Huanguo Zhang, Le Du, Yan Tong:
zkrpChain: Privacy-preserving Data Auditing for Consortium Blockchains Based on Zero-knowledge Range Proofs. TrustCom 2020: 656-663
2010 – 2019
- 2019
- [j42]Zhaoxu Ji, Huanguo Zhang, Houzhen Wang:
Quantum Private Comparison Protocols With a Number of Multi-Particle Entangled States. IEEE Access 7: 44613-44621 (2019) - [j41]Wanqing Wu, Huanguo Zhang:
A quantum query algorithm for computing the degree of a perfect nonlinear Boolean function. Quantum Inf. Process. 18(3): 62 (2019) - [j40]Zhaoxu Ji, Huanguo Zhang, Houzhen Wang, Fusheng Wu, Jianwei Jia, Wanqing Wu:
Quantum protocols for secure multi-party summation. Quantum Inf. Process. 18(6): 168 (2019) - [i14]Zhaoxu Ji, Pei-Ru Fan, Hou-Zhen Wang, Huanguo Zhang:
Entanglement-based quantum private comparison protocol with bit-flipping. CoRR abs/1911.08075 (2019) - 2018
- [j39]Fusheng Wu, Huanguo Zhang, Mingtao Ni, Wang Jun, Ji Zhaoxu:
A Novel Key Agreement Protocol Based on RET Gadget Chains for Preventing Reused Code Attacks. IEEE Access 6: 70820-70830 (2018) - [j38]Yanbin Li, Ming Tang, Yuguang Li, Huanguo Zhang:
Several weaknesses of the implementation for the theoretically secure masking schemes under ISW framework. Integr. 60: 92-98 (2018) - [j37]Ming Tang, Yanbin Li, Dongyan Zhao, Yuguang Li, Fei Yan, Huanguo Zhang:
Leak Point Locating in Hardware Implementations of Higher-Order Masking Schemes. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 37(12): 3008-3019 (2018) - [j36]Ming Tang, Pengbo Wang, Xiaoqi Ma, Wenjie Chang, Huanguo Zhang, Guojun Peng, Jean-Luc Danger:
An Efficient SCA Leakage Model Construction Method Under Predictable Evaluation. IEEE Trans. Inf. Forensics Secur. 13(12): 3008-3018 (2018) - 2017
- [j35]Shaowu Mao, Pei Zhang, Houzhen Wang, Huanguo Zhang, Wanqing Wu:
Cryptanalysis of a lattice based key exchange protocol. Sci. China Inf. Sci. 60(2): 28101 (2017) - [j34]Wanqing Wu, Huanguo Zhang:
Quantum algorithm to solve function inversion with time-space trade-off. Quantum Inf. Process. 16(7): 171 (2017) - [j33]Yuan Shi, Huanguo Zhang, Juan Wang, Feng Xiao, Jianwei Huang, Daochen Zha, Hongxin Hu, Fei Yan, Bo Zhao:
CHAOS: An SDN-Based Moving Target Defense System. Secur. Commun. Networks 2017: 3659167:1-3659167:11 (2017) - [j32]Fusheng Wu, Huanguo Zhang, Wengqing Wang, Jianwei Jia, Shi Yuan:
A New Method to Analyze the Security of Protocol Implementations Based on Ideal Trace. Secur. Commun. Networks 2017: 7042835:1-7042835:15 (2017) - [c61]Juan Wang, Feng Xiao, Jianwei Huang, Daochen Zha, Chengyang Fan, Wei Hu, Huanguo Zhang:
A Security-Enhanced vTPM 2.0 for Cloud Computing. ICICS 2017: 557-569 - [i13]Juan Wang, Feng Xiao, Jianwei Huang, Daochen Zha, Hongxin Hu, Huanguo Zhang:
CHAOS: an SDN-based Moving Target Defense System. CoRR abs/1704.01482 (2017) - 2016
- [j31]Wanqing Wu, Huanguo Zhang, Houzhen Wang, Shaowu Mao, Shuomei Wu, Haiqing Han:
Cryptanalysis of an MOR cryptosystem based on a finite associative algebra. Sci. China Inf. Sci. 59(3): 32111:1-32111:9 (2016) - [j30]Jinhui Liu, Huanguo Zhang, Jianwei Jia, Houzhen Wang, Shaowu Mao, Wanqing Wu:
Cryptanalysis of an asymmetric cipher protocol using a matrix decomposition problem. Sci. China Inf. Sci. 59(5): 052109:1-052109:11 (2016) - [j29]Houzhen Wang, Huanguo Zhang, Shaohua Tang:
Key recovery on several matrix public-key encryption schemes. IET Inf. Secur. 10(3): 152-155 (2016) - [j28]Shaowu Mao, Huanguo Zhang, Wanqing Wu, Houzhen Wang:
Multi-bit LWE-based encryption scheme without decryption errors. Int. J. Embed. Syst. 8(1): 24-33 (2016) - [j27]Yang Xu, Dan Zhu, Huanguo Zhang, Xiaoyao Xie:
云环境下基于代数签名持有性审计的大数据安全存储方案 (Big Data Storage Security Scheme Based on Algebraic Signature Possession Audit in Cloud Environment). 计算机科学 43(10): 172-176 (2016) - [j26]Jun Song, ChunJiao He, Fan Yang, Huanguo Zhang:
A privacy-preserving distance-based incentive scheme in opportunistic VANETs. Secur. Commun. Networks 9(15): 2789-2801 (2016) - [j25]Fajiang Yu, Huanguo Zhang, Bo Zhao, Juan Wang, Liqiang Zhang, Fei Yan, Zhenlin Chen:
A formal analysis of Trusted Platform Module 2.0 hash-based message authentication code authorization under digital rights management scenario. Secur. Commun. Networks 9(15): 2802-2815 (2016) - [c60]Jinhui Liu, Huanguo Zhang, Jianwei Jia:
A Linear Algebra Attack on the Non-commuting Cryptography Class Based on Matrix Power Function. Inscrypt 2016: 343-354 - [c59]Fajiang Yu, Lie Chen, Huanguo Zhang:
Virtual TPM Dynamic Trust Extension Suitable for Frequent Migrations. Trustcom/BigDataSE/ISPA 2016: 57-65 - 2015
- [j24]Wanqing Wu, Huanguo Zhang, Houzhen Wang, Shaowu Mao, Jianwei Jia, Jinhui Liu:
A public key cryptosystem based on data complexity under quantum environment. Sci. China Inf. Sci. 58(11): 1-11 (2015) - [j23]Min Yang, Qingshu Meng, Zhang-yi Wang, Li Li, Huanguo Zhang:
On the coefficients of the polynomial in the number field sieve. Sci. China Inf. Sci. 58(11): 1-9 (2015) - [j22]Huanguo Zhang, Wenbao Han, Xuejia Lai, Dongdai Lin, Jianfeng Ma, Jianhua Li:
Survey on cyberspace security. Sci. China Inf. Sci. 58(11): 1-43 (2015) - [j21]Wanqing Wu, Huanguo Zhang, Shaowu Mao, Houzhen Wang:
Quantum algorithm to find invariant linear structure of MD hash functions. Quantum Inf. Process. 14(3): 813-829 (2015) - [j20]Wanqing Wu, Huanguo Zhang, Houzhen Wang, Shaowu Mao:
Polynomial-time quantum algorithms for finding the linear structures of Boolean function. Quantum Inf. Process. 14(4): 1215-1226 (2015) - [c58]Yu Liang, Xinjie Ma, Daoyuan Wu, Xiaoxiao Tang, Debin Gao, Guojun Peng, Chunfu Jia, Huanguo Zhang:
Stack Layout Randomization with Minimal Rewriting of Android Binaries. ICISC 2015: 229-245 - 2014
- [j19]Ming Tang, Zhenlong Qiu, Hongbo Peng, Xiaobo Hu, Yi Mu, Huanguo Zhang:
Toward reverse engineering on secret S-boxes in block ciphers. Sci. China Inf. Sci. 57(3): 1-18 (2014) - [j18]Ming Tang, Zhenlong Qiu, Weijie Li, Weijin Sun, Xiaobo Hu, Huanguo Zhang:
Power analysis based reverse engineering on the secret round function of block ciphers. Concurr. Comput. Pract. Exp. 26(8): 1531-1545 (2014) - [j17]Huanguo Zhang, Sha Lv, Wei Li, Xun Qu:
A Novel Face Recognition Method using Nearest Line Projection. J. Comput. 9(8): 1952-1958 (2014) - [c57]Guoheng Wei, Huanguo Zhang, Zheng Li:
Distance-Bounding Protocol with Time-Stamped Authentication for RFID. 3PGCIC 2014: 139-145 - [c56]Juan Wang, Bo Zhao, Huanguo Zhang, Fei Yan, Fajiang Yu, Liqiang Zhang, Hongxin Hu:
POSTER: An E2E Trusted Cloud Infrastructure. CCS 2014: 1517-1519 - [i12]Huanguo Zhang, Sha Lv, Wei Li, Xun Qu:
A Novel Face Recognition Method using Nearest Line Projection. CoRR abs/1402.5859 (2014) - 2013
- [c55]Bingyu Zou, Huanguo Zhang:
Integrity Protection and Attestation of Security Critical Executions on Virtualized Platform in Cloud Computing Environment. GreenCom/iThings/CPScom 2013: 2071-2075 - [c54]Jian Yang, Huanguo Zhang, Jianming Fu:
A Fuzzing Framework Based on Symbolic Execution and Combinatorial Testing. GreenCom/iThings/CPScom 2013: 2076-2080 - [c53]Fan Yang, Jinxia Wu, Shanyu Tang, Huanguo Zhang:
Dynamic Knowledge Repository-Based Security Auxiliary System of User Behavior. GreenCom/iThings/CPScom 2013: 2081-2084 - [c52]Hua Deng, Bo Qin, Ruiying Du, Huanguo Zhang, Lina Wang, Jianwei Liu, Jian Mao:
Finding Key Leakage in Hierarchical Distribution of Encrypted Data. INCoS 2013: 780-785 - [i11]Min Yang, Qingshu Meng, Zhang-yi Wang, Lina Wang, Huanguo Zhang:
polynomial selection for the number field sieve in geometric view. IACR Cryptol. ePrint Arch. 2013: 583 (2013) - 2012
- [j16]Chao Wang, Huanguo Zhang, Lili Liu:
Evolutionary cryptography theory based generating method for a secure Koblitz elliptic curve and its improvement by a hidden Markov models. Sci. China Inf. Sci. 55(4): 911-920 (2012) - [j15]Ming Tang, Zhenlong Qiu, Si Gao, Yi Mu, Shubo Liu, Huanguo Zhang, Yingzhen Jin:
Polar differential power attacks and evaluation. Sci. China Inf. Sci. 55(7): 1588-1604 (2012) - [c51]Ming Tang, Zhenlong Qiu, Weijie Li, Shubo Liu, Huanguo Zhang:
Power Analysis Based Reverse Engineering on the Secret Round Function of Block Ciphers. ICDKE 2012: 175-188 - [c50]Fan Yang, Huanguo Zhang, Fei Yan, Jian Yang:
Testing Method of Code Redundancy Simplification Based on Program Dependency Graph. TrustCom 2012: 1895-1900 - [i10]Min Yang, Qingshu Meng, Zhang-yi Wang, Huanguo Zhang:
Some observations to speed the polynomial selection in the number field sieve. IACR Cryptol. ePrint Arch. 2012: 599 (2012) - 2011
- [j14]Houzhen Wang, Huanguo Zhang, Zhang-yi Wang, Ming Tang:
Extended multivariate public key cryptosystems with secure encryption function. Sci. China Inf. Sci. 54(6): 1161-1171 (2011) - [j13]Huanguo Zhang, Chunlei Li, Ming Tang:
Capability of evolutionary cryptosystems against differential cryptanalysis. Sci. China Inf. Sci. 54(10): 1991-2000 (2011) - [j12]Huanguo Zhang, Chunlei Li, Ming Tang:
Evolutionary cryptography against multidimensional linear cryptanalysis. Sci. China Inf. Sci. 54(12): 2565-2577 (2011) - [j11]Yang Xu, Xiaoyao Xie, Huanguo Zhang:
Modeling and Analysis of Electronic Commerce Protocols Using Colored Petri Nets. J. Softw. 6(7): 1181-1187 (2011) - [c49]Fajiang Yu, Tong Li, Yang Lin, Huanguo Zhang:
Hierarchical-CPK-Based Trusted Computing Cryptography Scheme. ATC 2011: 149-163 - [i9]Ming Tang, Xiaorong Wang, Zhenlong Qiu, Si Gao, Huanguo Zhang, Qianhong Wu:
DPA Leakage Evaluation and Countermeasure Plug-in. IACR Cryptol. ePrint Arch. 2011: 77 (2011) - 2010
- [j10]Changxiang Shen, Huanguo Zhang, Huaimin Wang, Ji Wang, Bo Zhao, Fei Yan, Fajiang Yu, Liqiang Zhang, Mingdi Xu:
Research on trusted computing and its development. Sci. China Inf. Sci. 53(3): 405-433 (2010) - [j9]Huanguo Zhang, Fei Yan, Jianming Fu, Mingdi Xu, Yang Yang, Fan He, Jing Zhan:
Research on theory and key technology of trusted computing platform security testing and evaluation. Sci. China Inf. Sci. 53(3): 434-453 (2010) - [j8]Houzhen Wang, Huanguo Zhang, Haiming Guan, Haiqing Han:
A new perturbation algorithm and enhancing security of SFLASH signature scheme. Sci. China Inf. Sci. 53(4): 760-768 (2010) - [j7]Houzhen Wang, Huanguo Zhang, Qianhong Wu, Yu Zhang, Chunlei Li, Xinyu Zhang:
Design theory and method of multivariate hash function. Sci. China Inf. Sci. 53(10): 1977-1987 (2010) - [j6]Shubo Liu, Ming Tang, Si Gao, Huanguo Zhang:
Evolution Cipher against Differential Power Attack. J. Digit. Content Technol. its Appl. 4(7): 177-189 (2010) - [i8]Ming Tang, Qingshu Meng, Huanguo Zhang, Si Gao, Qin Dou, Fei Shen, Du Li:
Evolutionary Cipher against Differential Power Attack. IACR Cryptol. ePrint Arch. 2010: 167 (2010) - [i7]Hou-Zhen Wang, Huanguo Zhang:
Hash-based Multivariate Public Key Cryptosystems. IACR Cryptol. ePrint Arch. 2010: 296 (2010)
2000 – 2009
- 2009
- [j5]Min Yang, Qingshu Meng, Huanguo Zhang:
The evolutionary design of trace form bent functions in cryptography. Int. J. Inf. Comput. Secur. 3(1): 47-59 (2009) - [c48]Bo Zhao, Huanguo Zhang, Zhede Li:
A Trusted Start-Up Based on Embedded System. CIT (2) 2009: 242-246 - [c47]Yabin Liu, Huanguo Zhang, Liqiang Zhang, Bo Zhao:
Research on Unified Network Access Control Architecture. CIT (2) 2009: 295-299 - [c46]Fei Yan, Huanguo Zhang, Bo Zhao:
A Secure Multi-party Computing Model Based on Trusted Computing Platform. CIT (2) 2009: 318-322 - [c45]Wuping Chen, Lei Zhang, Bo Qin, Qianhong Wu, Huanguo Zhang:
Certificateless One-Way Authenticated Two-Party Key Agreement Protocol. IAS 2009: 483-486 - [c44]Zhiqiang Zhu, Mingdi Xu, Huanguo Zhang:
Research on Secure and Reconfigurable Architecture Based on Embedded Hardware. DASC 2009: 127-131 - [c43]Zhiqiang Zhu, Mingdi Xu, Huanguo Zhang:
Research and Implement of Secure Bootstrap for Virtual Machine Based on Trusted Computing Platform. DASC 2009: 514-519 - [c42]Shui Cao, Xueguang Zhou, Yan Sun, Huanguo Zhang:
Research on Chinese Key Words Mining with Malicious Jamming in English. IFITA (3) 2009: 109-112 - [c41]Ming Tang, Conglu Li, Yue Yu, Guo-ping Zhang, Huanguo Zhang:
Research and Implementation of Evolution Cipher Chip. ISCID (1) 2009: 32-35 - [c40]Yuhua Wang, HongYong Wang, Aihong Guan, Huanguo Zhang:
Evolutionary Design of Random Number Generator. JCAI 2009: 256-259 - 2008
- [j4]Qingshu Meng, Min Yang, Huanguo Zhang, Jingsong Cui:
A novel algorithm enumerating bent functions. Discret. Math. 308(23): 5576-5584 (2008) - [c39]Jianming Fu, Huijun Xiong, Zhou Li, Huanguo Zhang:
PerformTrust: Trust model integrated past and current performance in P2P file sharing systems. AICCSA 2008: 718-725 - [c38]Jing Chen, Huanguo Zhang, Junhui Hu:
An Efficiency Security Model of Routing Protocol in Wireless Sensor Networks. Asia International Conference on Modelling and Simulation 2008: 59-64 - [c37]Xiaoping Wu, Zhi-Dong Shen, Huanguo Zhang:
Secure Key Management of Mobile Agent System Using TPM-Based Technology on Trusted Computing Platform. CSSE (3) 2008: 1020-1023 - [c36]Yang Yang, Huanguo Zhang, Li Wan, Bingyu Zou:
Design and Implementation of an Integrity Measurement System Based on Windows Trusted Computing Platform. ICYCS 2008: 229-233 - [c35]Guojun Peng, Xuanchen Pan, Huanguo Zhang, Jianming Fu:
Dynamic Trustiness Authentication Framework Based on Software's Behavior Integrity. ICYCS 2008: 2283-2288 - [c34]Fan He, Huanguo Zhang, Mei Tang:
A Test Method of Trusted Computing Supporting Software. ICYCS 2008: 2330-2334 - [c33]Jing Zhan, Huanguo Zhang, Bingyu Zou, Xiaofei Li:
Research on Automated Testing of the Trusted Platform Model. ICYCS 2008: 2335-2339 - [c32]Xiantao Zhang, Anthony X. F. Xu, Qi Li, David K. Y. Yau, Sihan Qing, Huanguo Zhang:
A hash-TLB approach for MMU virtualization in xen/IA64. IPDPS 2008: 1-8 - [c31]Shuang Xiang, Mingdi Xu, Li Wang, Huanguo Zhang:
Design Secure Contexts Detect Based on Lattice for Grid Computing Environment. ISECS 2008: 110-113 - [c30]Liqiang Zhang, Huanguo Zhang:
An Introduction to Data Capturing. ISECS 2008: 457-461 - [c29]Juan Wang, Yajie Zhou, Huanguo Zhang:
The Simplified Inductive Approach to Verifying Security Protocols. ISECS 2008: 523-526 - [c28]Fan Yang, Jun Song, Huanguo Zhang:
Quantitative Cryptanalysis of Six-Round DES Using Evolutionary Algorithms. ISICA 2008: 134-141 - [c27]Jun Song, Fan Yang, Maocai Wang, Huanguo Zhang:
Cryptanalysis of Transposition Cipher Using Simulated Annealing Genetic Algorithm. ISICA 2008: 795-802 - [c26]Guoheng Wei, Xueguang Zhou, Huanguo Zhang:
A Trusted Computing Model Based on Code Authorization. ISIP 2008: 495-499 - [c25]Juan Wang, Jingwei Zhang, Huanguo Zhang:
Type Flaw Attacks and Prevention in Security Protocols. SNPD 2008: 340-343 - [c24]Meng Zhou, Xueguang Zhou, Huanguo Zhang:
Modeling and Calculation for Network System Survivability. WKDD 2008: 538-541 - [c23]Xiantao Zhang, Qi Li, Sihan Qing, Huanguo Zhang:
VNIDA: Building an IDS Architecture Using VMM-Based Non-Intrusive Approach. WKDD 2008: 594-600 - 2007
- [j3]Changxiang Shen, Huanguo Zhang, Dengguo Feng, Zhenfu Cao, Jiwu Huang:
Survey of information security. Sci. China Ser. F Inf. Sci. 50(3): 273-298 (2007) - [j2]Qingshu Meng, Huanguo Zhang, Min Yang, Zhang-yi Wang:
Analysis of affinely equivalent Boolean functions. Sci. China Ser. F Inf. Sci. 50(3): 299-306 (2007) - [j1]Qingshu Meng, Huanguo Zhang, Min Yang, Jingsong Cui:
On the degree of homogeneous bent functions. Discret. Appl. Math. 155(5): 665-669 (2007) - [c22]Jianming Fu, Binglan Chen, Huanguo Zhang:
A Worm Containment Model Based on Neighbor-Alarm. ATC 2007: 449-457 - [c21]Jing Zhan, Huanguo Zhang, Fei Yan:
Building Trusted Sub-domain for the Grid with Trusted Computing. Inscrypt 2007: 463-471 - [c20]Huanmei Guan, Huanguo Zhang, Ping Chen, Yajie Zhou:
Mobile Agents Integrity Research. I3E (1) 2007: 194-201 - [c19]Jun Song, Huanguo Zhang, Qingshu Meng, Zhang-yi Wang:
Cryptanalysis of Two-Round DES Using Genetic Algorithms. ISICA 2007: 583-590 - [c18]Bangju Wang, Huanguo Zhang, Zhang-yi Wang, Yuhua Wang:
Speeding Up Scalar Multiplication Using a New Signed Binary Representation for Integers. MCAM 2007: 277-285 - [c17]Liqiang Zhang, Lu Chen, Huanguo Zhang, Fei Yan:
Trusted Code Remote Execution through Trusted Computing and Virtualization. SNPD (1) 2007: 39-44 - [c16]Bangju Wang, Huanguo Zhang, Yuhua Wang:
Efficient Modular Exponentiation with Three-Moduli (2n 1, 2n+3). SNPD (3) 2007: 927-931 - [c15]Mingdi Xu, Jian He, Bo Zhang, Huanguo Zhang:
A New Data Protecting Scheme Based on TPM. SNPD (3) 2007: 943-947 - [c14]Yuan Yuan, Yan Tong, Huanguo Zhang:
Complete Mapping Polynomials over Finite Field F16. WAIFI 2007: 147-158 - 2006
- [c13]Fei Yan, Weizhong Qiang, Zhi-Dong Shen, Chunrun Chen, Huanguo Zhang, Deqing Zou:
Daonity: An Experience on Enhancing Grid Security by Trusted Computing Technology. ATC 2006: 227-235 - [c12]Fajiang Yu, Huanguo Zhang, Fei Yan, Song Gao:
An Improved Global Trust Value Computing Method in P2P System. ATC 2006: 258-267 - [c11]Zhi-Dong Shen, Fei Yan, Weizhong Qiang, Xiaoping Wu, Huanguo Zhang:
Grid System Integrated with Trusted Computing Platform. IMSCCS (1) 2006: 619-625 - [c10]Zhi-Dong Shen, Xiaoping Wu, Yuhua Wang, Wen-Ling Peng, Huanguo Zhang:
Group Key Management in Grid Environment. IMSCCS (1) 2006: 626-631 - [c9]Wenbo Mao, Andrew P. Martin, Hai Jin, Huanguo Zhang:
Innovations for Grid Security from Trusted Computing. Security Protocols Workshop 2006: 132-149 - [i6]Zhang-yi Wang, Huanguo Zhang, Zhongping Qin, Qingshu Meng:
Cryptanalysis of 4-Pass HAVAL. IACR Cryptol. ePrint Arch. 2006: 161 (2006) - 2005
- [c8]Bo Meng, Huanguo Zhang:
An Electronic Commerce System Prototype and Its Implementations. CIT 2005: 966-970 - [c7]Yichun Liu, Jianming Fu, Huanguo Zhang:
An Optimistic Fair Protocol for P2P Chained Transaction. ASIAN 2005: 136-145 - [c6]Bo Meng, Huanguo Zhang:
Research on accountability in electronic transaction. CSCWD (2) 2005: 745-749 - [c5]Bo Meng, Huanguo Zhang, Qianxing Xiong:
The Practical Detailed Requirements of Accountability and Its Application in the Electronic Payment Protocols. EEE 2005: 556-561 - [c4]Jianming Fu, Lei Zhang, Weinan Li, Huanguo Zhang:
An Adaptive Service Strategy Based on User Rating in P2P. GCC 2005: 860-870 - [i5]Qingshu Meng, Min Yang, Huanguo Zhang, Yuzhen Liu:
Analysis of Affinely Equivalent Boolean Functions. IACR Cryptol. ePrint Arch. 2005: 25 (2005) - [i4]Qingshu Meng, Huanguo Zhang, Jingsong Cui, Min Yang:
almost enumeration of 8-variable bent functions. IACR Cryptol. ePrint Arch. 2005: 100 (2005) - [i3]Min Yang, Qingshu Meng, Huanguo Zhang:
Evolutionary Design of Trace Form Bent Functions. IACR Cryptol. ePrint Arch. 2005: 322 (2005) - 2004
- [c3]Jianming Fu, Xian Yi, Huanguo Zhang:
Modeling the Behavior of Ada Tasks and Verifying Its Safety. CIT 2004: 676-680 - [c2]Min Yang, Huanguo Zhang, Jianming Fu, Fei Yan:
A Framework for Adaptive Anomaly Detection Based on Support Vector Data Description. NPC 2004: 443-450 - [i2]Qingshu Meng, Min Yang, Huanguo Zhang, Jingsong Cui:
A novel algorithm enumerating Bent functions. IACR Cryptol. ePrint Arch. 2004: 274 (2004) - [i1]Qingshu Meng, Huanguo Zhang, Min Yang, Jingsong Cui:
ON THE DEGREE OF HOMOGENEOUS BENT FUNCTIONS. IACR Cryptol. ePrint Arch. 2004: 284 (2004) - 2003
- [c1]Min Luo, Lina Wang, Huanguo Zhang, Jin Chen:
A Research on Intrusion Detection Based on Unsupervised Clustering and Support Vector Machine. ICICS 2003: 325-336
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint