default search action
Sihan Qing
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [e18]Sihan Qing, Chris Mitchell, Liqun Chen, Dongmei Liu:
Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings. Lecture Notes in Computer Science 10631, Springer 2018, ISBN 978-3-319-89499-7 [contents] - [e17]David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, Rongxing Lu, Zonghua Zhang, Ahmed Meddahi:
Information and Communications Security - 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings. Lecture Notes in Computer Science 11149, Springer 2018, ISBN 978-3-030-01949-5 [contents] - 2016
- [c37]Wei Fan, Zhujun Zhang, Tingting Wang, Bo Hu, Sihan Qing, Degang Sun:
Research on Security Algorithm of Virtual Machine Live Migration for KVM Virtualization System. ICICS 2016: 54-70 - [e16]Sihan Qing, Eiji Okamoto, Kwangjo Kim, Dongmei Liu:
Information and Communications Security - 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9543, Springer 2016, ISBN 978-3-319-29813-9 [contents] - [e15]Kwok-Yan Lam, Chi-Hung Chi, Sihan Qing:
Information and Communications Security - 18th International Conference, ICICS 2016, Singapore, November 29 - December 2, 2016, Proceedings. Lecture Notes in Computer Science 9977, Springer 2016, ISBN 978-3-319-50010-2 [contents] - 2015
- [j9]Ding Wang, Nan Wang, Ping Wang, Sihan Qing:
Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity. Inf. Sci. 321: 162-178 (2015) - [c36]Chuiyi Xie, Ying Huo, Sihan Qing, Shoushan Luo, Lingli Hu:
A Self-Matching Sliding Block Algorithm Applied to Deduplication in Distributed Storage System. ICICS 2015: 406-413 - 2014
- [c35]Sihan Qing:
Some issues regarding operating system security. ICIS 2014: 1 - [c34]Xingmin Cui, Da Yu, Patrick P. F. Chan, Lucas Chi Kwong Hui, Siu-Ming Yiu, Sihan Qing:
CoChecker: Detecting Capability and Sensitive Data Leaks from Component Chains in Android. ACISP 2014: 446-453 - [c33]Yichen Wei, Xu Fei, Xiaojun Chen, Jinqiao Shi, Sihan Qing:
Winnowing Multihashing Structure with Wildcard Query. APWeb Workshophs 2014: 265-281 - [c32]Yichen Wei, Fei Xu, Xiaojun Chen, Yiguo Pu, Jinqiao Shi, Sihan Qing:
Winnowing Double Structure for Wildcard Query in Payload Attribution. ISC 2014: 454-464 - 2013
- [c31]Qingni Shen, Mian Wan, Zhuangzhuang Zhang, Zhi Zhang, Sihan Qing, Zhonghai Wu:
A Covert Channel Using Event Channel State on Xen Hypervisor. ICICS 2013: 125-134 - [e14]Sihan Qing, Jianying Zhou, Dongmei Liu:
Information and Communications Security - 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings. Lecture Notes in Computer Science 8233, Springer 2013, ISBN 978-3-319-02725-8 [contents] - 2012
- [c30]Yangwei Li, Qingni Shen, Cong Zhang, Pengfei Sun, Ying Chen, Sihan Qing:
A Covert Channel Using Core Alternation. AINA Workshops 2012: 324-328 - [c29]Hao Xiong, Cong Zhang, Tsz Hon Yuen, Echo P. Zhang, Siu-Ming Yiu, Sihan Qing:
Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model. ICICS 2012: 119-130 - [c28]Ying Chen, Qingni Shen, Pengfei Sun, Yangwei Li, Zhong Chen, Sihan Qing:
Reliable Migration Module in Trusted Cloud Based on Security Level - Design and Implementation. IPDPS Workshops 2012: 2230-2236 - 2011
- [j8]Ennan Zhai, Huiping Sun, Sihan Qing, Zhong Chen:
Sorcery: Overcoming deceptive votes in P2P content sharing systems. Peer-to-Peer Netw. Appl. 4(2): 178-191 (2011) - [c27]Ennan Zhai, Qingni Shen, Yonggang Wang, Tao Yang, Liping Ding, Sihan Qing:
SecGuard: Secure and Practical Integrity Protection Model for Operating Systems. APWeb 2011: 370-375 - [c26]Song Luo, Qingni Shen, Yongming Jin, Yu Chen, Zhong Chen, Sihan Qing:
A Variant of Boyen-Waters Anonymous IBE Scheme. ICICS 2011: 42-56 - [c25]Xin Yang, Qingni Shen, Yahui Yang, Sihan Qing:
A Way of Key Management in Cloud Storage Based on Trusted Computing. NPC 2011: 135-145 - [c24]Ennan Zhai, Liping Ding, Sihan Qing:
Towards a Reliable Spam-Proof Tagging System. SSIRI 2011: 174-181 - [e13]Sihan Qing, Willy Susilo, Guilin Wang, Dongmei Liu:
Information and Communications Security - 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. Proceedings. Lecture Notes in Computer Science 7043, Springer 2011, ISBN 978-3-642-25242-6 [contents] - 2010
- [e12]Miguel Soriano, Sihan Qing, Javier López:
Information and Communications Security - 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010. Proceedings. Lecture Notes in Computer Science 6476, Springer 2010, ISBN 978-3-642-17649-4 [contents]
2000 – 2009
- 2009
- [c23]Ennan Zhai, Huiping Sun, Sihan Qing, Zhong Chen:
SpamClean: Towards Spam-Free Tagging Systems. CSE (4) 2009: 429-435 - [c22]Ennan Zhai, Ruichuan Chen, Eng Keong Lua, Long Zhang, Huiping Sun, Zhuhua Cai, Sihan Qing, Zhong Chen:
SpamResist: Making Peer-to-Peer Tagging Systems Robust to Spam. GLOBECOM 2009: 1-6 - [c21]Ennan Zhai, Ruichuan Chen, Zhuhua Cai, Long Zhang, Eng Keong Lua, Huiping Sun, Sihan Qing, Liyong Tang, Zhong Chen:
Sorcery: Could We Make P2P Content Sharing Systems Robust to Deceivers?. Peer-to-Peer Computing 2009: 11-20 - [e11]Sihan Qing, Chris J. Mitchell, Guilin Wang:
Information and Communications Security, 11th International Conference, ICICS 2009, Beijing, China, December 14-17, 2009. Proceedings. Lecture Notes in Computer Science 5927, Springer 2009, ISBN 978-3-642-11144-0 [contents] - 2008
- [c20]Hong-Yong Jia, Sihan Qing, Lize Gu, Yixian Yang:
Efficient Universally Composable Password-Based Key Exchange. CIS (2) 2008: 293-298 - [c19]Xiantao Zhang, Anthony X. F. Xu, Qi Li, David K. Y. Yau, Sihan Qing, Huanguo Zhang:
A hash-TLB approach for MMU virtualization in xen/IA64. IPDPS 2008: 1-8 - [c18]Dongmei Liu, Sihan Qing, Pengfei Li, ChunYang Yuan:
A Practical Certified E-Mail System with Temporal Authentication Based on Transparent TSS. SNPD 2008: 285-290 - [c17]Xiantao Zhang, Qi Li, Sihan Qing, Huanguo Zhang:
VNIDA: Building an IDS Architecture Using VMM-Based Non-Intrusive Approach. WKDD 2008: 594-600 - [e10]Sihan Qing, Hideki Imai, Guilin Wang:
Information and Communications Security, 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings. Lecture Notes in Computer Science 4861, Springer 2008, ISBN 978-3-540-77047-3 [contents] - 2007
- [j7]Sihan Qing, Changxiang Shen:
Design of secure operating systems with high security levels. Sci. China Ser. F Inf. Sci. 50(3): 399-418 (2007) - [c16]Jianjun Shen, Sihan Qing:
A dynamic information flow model of secure systems. AsiaCCS 2007: 341-343 - 2006
- [j6]Sihan Qing, Gaicheng Li:
Formal analysis and design of multi-party fair exchange protocols. Sci. China Ser. F Inf. Sci. 49(2): 155-174 (2006) - [j5]Qingguang Ji, Sihan Qing, Yeping He:
A formal model for integrity protection based on DTE technique. Sci. China Ser. F Inf. Sci. 49(5): 545-565 (2006) - [c15]Liuying Tang, Sihan Qing:
A Practical Alternative to Domain and Type Enforcement Integrity Formal Models. Inscrypt 2006: 225-237 - [c14]Qi Li, Xinwen Zhang, Sihan Qing, Mingwei Xu:
Supporting Ad-hoc Collaboration with Group-based RBAC Model. CollaborateCom 2006 - [e9]Peng Ning, Sihan Qing, Ninghui Li:
Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings. Lecture Notes in Computer Science 4307, Springer 2006, ISBN 3-540-49496-0 [contents] - 2005
- [j4]Qingguang Ji, Sihan Qing, Yeping He:
A new formal model for privilege control with supporting POSIX capability mechanism. Sci. China Ser. F Inf. Sci. 48(1): 46-66 (2005) - [j3]Sihan Qing, Gaicheng Li:
A formal model of fair exchange protocols. Sci. China Ser. F Inf. Sci. 48(4): 499-512 (2005) - [j2]Sihan Qing, Weiping Wen:
A survey and trends on Internet worms. Comput. Secur. 24(4): 334-346 (2005) - [c13]Jianjun Shen, Sihan Qing, Qingni Shen, Liping Li:
Covert Channel Identification Founded on Information Flow Analysis. CIS (2) 2005: 381-387 - [c12]Guilin Wang, Sihan Qing:
Security Flaws in Several Group Signatures Proposed by Popescu. ICCSA (3) 2005: 711-718 - [c11]Qi Li, Jingpu Shi, Sihan Qing:
An Administration Model of DRBAC on the Web. ICEBE 2005: 364-367 - [c10]Jianjun Shen, Sihan Qing, Qingni Shen, Liping Li:
Optimization of Covert Channel Identification. IEEE Security in Storage Workshop 2005: 95-108 - [e8]Sihan Qing, Wenbo Mao, Javier López, Guilin Wang:
Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings. Lecture Notes in Computer Science 3783, Springer 2005, ISBN 3-540-30934-9 [contents] - [e7]Ryôichi Sasaki, Sihan Qing, Eiji Okamoto, Hiroshi Yoshiura:
Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30 - June 1, 2005, Chiba, Japan. IFIP 181, Springer 2005, ISBN 0-387-25658-X [contents] - 2004
- [c9]Yongbin Zhou, Zhenfeng Zhang, Sihan Qing, Juan Liu:
A New CEMBS Based on RSA Signatures and Its Application in Constructing Fair Exchange Protocol. EEE 2004: 560-564 - [e6]Javier López, Sihan Qing, Eiji Okamoto:
Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings. Lecture Notes in Computer Science 3269, Springer 2004, ISBN 3-540-23563-9 [contents] - 2003
- [j1]Qingguang Ji, Sihan Qing, Yongbin Zhou, Dengguo Feng:
Study on Strand Space Model Theory. J. Comput. Sci. Technol. 18(5): 553-570 (2003) - [e5]Sihan Qing, Dieter Gollmann, Jianying Zhou:
Information and Communications Security, 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings. Lecture Notes in Computer Science 2836, Springer 2003, ISBN 3-540-20150-5 [contents] - [i1]Guilin Wang, Sihan Qing:
Security Flaws in Several Group Signatures Proposed by Popescu. IACR Cryptol. ePrint Arch. 2003: 207 (2003) - 2002
- [e4]Robert H. Deng, Sihan Qing, Feng Bao, Jianying Zhou:
Information and Communications Security, 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings. Lecture Notes in Computer Science 2513, Springer 2002, ISBN 3-540-00164-6 [contents] - 2001
- [c8]Zhimin Song, Sihan Qing:
Applying NCP Logic to the Analysis of SSL 3.0. ICICS 2001: 155-166 - [c7]Guilin Wang, Sihan Qing, Mingsheng Wang, Zhanfei Zhou:
Threshold Undeniable RSA Signature Scheme. ICICS 2001: 221-232 - [c6]Yeping He, Sihan Qing:
Square Attack on Reduced Camellia Cipher. ICICS 2001: 238-245 - [e3]Sihan Qing, Tatsuaki Okamoto, Jianying Zhou:
Information and Communications Security, Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001. Lecture Notes in Computer Science 2229, Springer 2001, ISBN 3-540-42880-1 [contents] - 2000
- [c5]Jianchun Jiang, Weifeng Chen, Sihan Qing, Dengguo Feng:
The Defense Framework for Large-scale Computer Network System. SEC 2000: 69-78 - [c4]Wenling Wu, Dengguo Feng, Sihan Qing:
Power Analysis of RC6 and Serpent. SEC 2000: 201-209 - [c3]Mingsheng Wang, Sihan Qing, Dengguo Feng:
A Simple Algorithm for Computing Several Sequences Synthesis. SEC 2000: 211-220 - [c2]Shaoquan Jiang, Dengguo Feng, Sihan Qing:
Analysis and Design of E-voting Protocol. SEC 2000: 281-290 - [e2]Sihan Qing, Jan H. P. Eloff:
Information Security for Global Information Infrastructures, IFIP TC11 Fifteenth Annual Working Conference on Information Security, August 22-24, 2000, Beijing, China. IFIP Conference Proceedings 175, Kluwer 2000, ISBN 0-7923-7914-4 [contents]
1990 – 1999
- 1999
- [c1]Wenling Wu, Bao Li, Dengguo Feng, Sihan Qing:
Cryptanalysis of some AES Candidate Algorithms. ICICS 1999: 13-21 - 1997
- [e1]Yongfei Han, Tatsuaki Okamoto, Sihan Qing:
Information and Communication Security, First International Conference, ICICS'97, Beijing, China, November 11-14, 1997, Proceedings. Lecture Notes in Computer Science 1334, Springer 1997, ISBN 3-540-63696-X [contents]
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:48 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint