Sihan Qing
According to our database1,
Sihan Qing
authored at least 46 papers
between 1999 and 2016.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2016
Research on Security Algorithm of Virtual Machine Live Migration for KVM Virtualization System.
Proceedings of the Information and Communications Security - 18th International Conference, 2016
2015
Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity.
Inf. Sci., 2015
A Self-Matching Sliding Block Algorithm Applied to Deduplication in Distributed Storage System.
Proceedings of the Information and Communications Security - 17th International Conference, 2015
2014
Proceedings of the Information Security - 17th International Conference, 2014
Proceedings of the Web Technologies and Applications, 2014
CoChecker: Detecting Capability and Sensitive Data Leaks from Component Chains in Android.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014
Proceedings of the 2014 IEEE/ACIS 13th International Conference on Computer and Information Science, 2014
2013
Proceedings of the Information and Communications Security - 15th International Conference, 2013
2012
Reliable Migration Module in Trusted Cloud Based on Security Level - Design and Implementation.
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
2011
Peer-to-Peer Netw. Appl., 2011
Proceedings of the Fifth International Conference on Secure Software Integration and Reliability Improvement, 2011
Proceedings of the Network and Parallel Computing - 8th IFIP International Conference, 2011
Proceedings of the Information and Communications Security - 13th International Conference, 2011
Proceedings of the Web Technologies and Applications - 13th Asia-Pacific Web Conference, 2011
2009
Proceedings of the Proceedings P2P 2009, 2009
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
2008
Proceedings of the International Workshop on Knowledge Discovery and Data Mining, 2008
A Practical Certified E-Mail System with Temporal Authentication Based on Transparent TSS.
Proceedings of the Ninth ACIS International Conference on Software Engineering, 2008
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008
2007
Sci. China Ser. F Inf. Sci., 2007
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007
2006
Sci. China Ser. F Inf. Sci., 2006
Sci. China Ser. F Inf. Sci., 2006
Proceedings of the 2nd International ICST Conference on Collaborative Computing: Networking, 2006
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006
2005
Sci. China Ser. F Inf. Sci., 2005
Proceedings of the 3rd International IEEE Security in Storage Workshop (SISW 2005), 2005
Proceedings of the 2005 IEEE International Conference on e-Business Engineering (ICEBE 2005), 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
2004
A New CEMBS Based on RSA Signatures and Its Application in Constructing Fair Exchange Protocol.
Proceedings of the 2004 IEEE International Conference on e-Technology, 2004
2003
IACR Cryptol. ePrint Arch., 2003
2001
Proceedings of the Information and Communications Security, Third International Conference, 2001
Proceedings of the Information and Communications Security, Third International Conference, 2001
Proceedings of the Information and Communications Security, Third International Conference, 2001
2000
Power Analysis of RC6 and Serpent.
Proceedings of the Information Security for Global Information Infrastructures, 2000
Analysis and Design of E-voting Protocol.
Proceedings of the Information Security for Global Information Infrastructures, 2000
A Simple Algorithm for Computing Several Sequences Synthesis.
Proceedings of the Information Security for Global Information Infrastructures, 2000
The Defense Framework for Large-scale Computer Network System.
Proceedings of the Information Security for Global Information Infrastructures, 2000
1999
Proceedings of the Information and Communication Security, Second International Conference, 1999