Jian-bin Hu
According to our database1,
Jian-bin Hu
authored at least 52 papers
between 2005 and 2017.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2017
Proceedings of the 2017 IEEE Symposium on Service-Oriented System Engineering, 2017
2016
Establish the Intrinsic Binding in Naming Space for Future Internet Using Combined Public Key.
Proceedings of the 11th International Conference on Future Internet Technologies, 2016
2015
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015
2014
Proceedings of the Web-Age Information Management - 15th International Conference, 2014
2013
Int. J. Netw. Secur., 2013
Proceedings of the Web-Age Information Management - 14th International Conference, 2013
MisDis: An Efficent Misbehavior Discovering Method Based on Accountability and State Machine in VANET.
Proceedings of the Web Technologies and Applications - 15th Asia-Pacific Web Conference, 2013
Proceedings of the 2013 10th Web Information System and Application Conference, 2013
2012
Further Improvement of An Authentication Scheme with User Anonymity for Wireless Communications.
Int. J. Netw. Secur., 2012
RGH: An Efficient RSU-Aided Group-Based Hierarchical Privacy Enhancement Protocol for VANETs.
Proceedings of the Web-Age Information Management - 13th International Conference, 2012
PKU-STRAW-L: A Simulative Platform Evaluate the Power-Saving Rate of the Intelligent Street Lamp System.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012
2011
Comput. Electr. Eng., 2011
New Fully Secure Hierarchical Identity-Based Encryption with Constant Size Ciphertexts.
Proceedings of the Information Security Practice and Experience, 2011
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2011
A traceable privacy-preserving authentication protocol for VANETs based on proxy re-signature.
Proceedings of the Eighth International Conference on Fuzzy Systems and Knowledge Discovery, 2011
Proceedings of the Foundations and Practice of Security, 2011
Proceedings of the Computational Intelligence in Security for Information Systems, 2011
Proceedings of the Web Technologies and Applications - 13th Asia-Pacific Web Conference, 2011
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications, 2011
2010
A Secure Routing Protocol and its application in Multi-sink Wireless Sensor Networks.
J. Networks, 2010
J. Comput. Sci. Technol., 2010
Int. J. Auton. Adapt. Commun. Syst., 2010
IACR Cryptol. ePrint Arch., 2010
Efficient Privacy-Preserving Authentication Protocol for Vehicular Communications with Trustworthy
CoRR, 2010
Proceedings of the Web-Age Information Management, 11th International Conference, 2010
Proceedings of the IEEE International Conference on Web Services, 2010
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010
Proceedings of the Information and Communications Security - 12th International Conference, 2010
Proceedings of IEEE International Conference on Communications, 2010
Proceedings of the Advances in Grid and Pervasive Computing, 5th International Conference, 2010
Proceedings of the Seventh International Conference on Fuzzy Systems and Knowledge Discovery, 2010
Proceedings of the Data and Applications Security and Privacy XXIV, 2010
Proceedings of the 5th ACM Symposium on Information, 2010
2009
Proceedings of the Third IEEE International Conference on Secure Software Integration and Reliability Improvement, 2009
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009
Proceedings of the Fifth International Conference on Networking and Services, 2009
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009
2008
Int. J. Pervasive Comput. Commun., 2008
Scalable Byzantine Fault Tolerant Public Key Authentication for Peer-to-Peer Networks.
Proceedings of the Euro-Par 2008, 2008
Proceedings of the Novel Algorithms and Techniques in Telecommunications and Networking, 2008
2007
An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols.
Proceedings of the Information Security Practice and Experience, 2007
Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), 2007
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007
2006
C4W: An Energy Efficient Public Key Cryptosystem for Large-Scale Wireless Sensor Networks.
Proceedings of the IEEE 3rd International Conference on Mobile Adhoc and Sensor Systems, 2006
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006
2005
Proceedings of the 2005 IEEE / WIC / ACM International Conference on Web Intelligence (WI 2005), 2005