Seguir
Huiping Sun
Huiping Sun
Dirección de correo verificada de ss.pku.edu.cn - Página principal
Título
Citado por
Citado por
Año
Cqarank: jointly model topics and expertise in community question answering
L Yang, M Qiu, S Gottipati, F Zhu, J Jiang, H Sun, Z Chen
Proceedings of the 22nd ACM international conference on Information …, 2013
2762013
Using trust and risk in access control for grid environment
Y Li, H Sun, Z Chen, J Ren, H Luo
2008 International Conference on Security Technology, 13-16, 2008
342008
Sorcery: Could we make P2P content sharing systems robust to deceivers?
E Zhai, R Chen, Z Cai, L Zhang, EK Lua, H Sun, S Qing, L Tang, Z Cheny
2009 IEEE Ninth International Conference on Peer-to-Peer Computing, 11-20, 2009
322009
Accelerating RSA with fine-grained parallelism using GPU
Y Yang, Z Guan, H Sun, Z Chen
Information Security Practice and Experience: 11th International Conference …, 2015
312015
RFID 标签所有权转移协议研究
金永明, 孙惠平, 关志, 陈钟
计算机研究与发展 48 (8), 1400-1405, 2011
292011
Permission-based abnormal application detection for Android
J Zhu, Z Guan, Y Yang, L Yu, H Sun, Z Chen
Information and Communications Security: 14th International Conference …, 2012
252012
Filtering spam in social tagging system with dynamic behavior analysis
B Liu, E Zhai, H Sun, Y Chen, Z Chen
2009 International Conference on Advances in Social Network Analysis and …, 2009
252009
Strategy proof trust management in wireless ad hoc network
H Sun, J Song
Canadian Conference on Electrical and Computer Engineering 2004 (IEEE Cat …, 2004
242004
PUF-based RFID authentication protocol against secret key leakage
Y Jin, W Xin, H Sun, Z Chen
Web Technologies and Applications: 14th Asia-Pacific Web Conference, APWeb …, 2012
212012
Spamclean: Towards spam-free tagging systems
E Zhai, H Sun, S Qing, Z Chen
2009 International Conference on Computational Science and Engineering 4 …, 2009
202009
Passapp: My app is my password!
H Sun, K Wang, X Li, N Qin, Z Chen
Proceedings of the 17th international conference on human-computer …, 2015
172015
Sorcery: Overcoming deceptive votes in P2P content sharing systems
E Zhai, H Sun, S Qing, Z Chen
Peer-to-Peer Networking and Applications 4, 178-191, 2011
152011
An efficient privacy-preserving RFID ownership transfer protocol
W Xin, Z Guan, T Yang, H Sun, Z Chen
Web Technologies and Applications: 15th Asia-Pacific Web Conference, APWeb …, 2013
122013
Hash-based tag ownership transfer protocol against traceability
Y Jin, H Sun, Z Chen
2009 IEEE International Conference on e-Business Engineering, 487-492, 2009
112009
PassPage: Graphical Password Authentication Scheme Based on Web Browsing Records
X Chu, H Sun, Z Chen
1st Asia USEC - Workshop on Usable Security with FC 2020, 2020
92020
A trust and risk framework to enhance reliable interaction in e-commerce
Y Li, M Zhao, H Sun, Z Chen
2008 IEEE International Conference on e-Business Engineering, 475-480, 2008
92008
Ownership transfer protocol for RFID tag
Y Jin, H Sun, Z Guan, Z Chen
Journal of Computer Research and Development 48 (8), 1400-1405, 2011
72011
Lightweight RFID mutual authentication protocol against feasible problems
Y Jin, H Sun, W Xin, S Luo, Z Chen
Information and Communications Security: 13th International Conference …, 2011
72011
SpamResist: making peer-to-peer tagging systems robust to spam
E Zhai, R Chen, EK Lua, L Zhang, H Sun, Z Cai, S Qing, Z Chen
GLOBECOM 2009-2009 IEEE Global Telecommunications Conference, 1-6, 2009
72009
Towards privacy-preserving RFID-based location-based services
W Xin, C Tang, T Yang, H Sun, Z Chen
2012 9th International Conference on Fuzzy Systems and Knowledge Discovery …, 2012
62012
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20