胡建斌
职称:副教授
研究所:软件研究所
研究领域:
办公电话:86-10-62765809
电子邮件:hujianbin@pku.edu.cn
学院主页:https://eecs.pku.edu.cn/info/1338/7112.htm
我们收录了 "胡建斌" 的 53 篇 paper:
- New Construction of Identity-based Proxy Re-encryption., 2020-05-11
- FBSR: feedback-based secure routing protocol for wireless sensor networks., 2020-04-16
- A Secure Routing Protocol and its application in Multi-sink Wireless Sensor Networks., 2020-04-01
- When ABE Meets RSS., 2020-03-12
- Security Flaw of an ECC-based Signcryption Scheme with Anonymity., 2020-03-12
- Further Improvement of An Authentication Scheme with User Anonymity for Wireless Communications., 2020-03-12
- On the security of an identity based multi-proxy signature scheme., 2020-02-19
- Privacy Protection in Social Networks Using l-Diversity., 2019-10-31
- Ciphertext Policy Attribute-Based Proxy Re-encryption., 2019-10-31
- Context-Aware Service Modeling and Rule Evolution., 2019-02-21
- Vulnerabilities Scoring Approach for Cloud SaaS., 2019-02-15
- Making Tagging Systems Resistant to Tricky Spam Attacks., 2019-02-15
- Modeling Context-aware Legal Computing with Bigraphs., 2019-02-14
- Sitab: Combating Spam in Tagging Systems via Users' Implicit Tagging Behavior., 2019-02-13
- Hybrid Overlay Structure Based on Virtual Node., 2019-02-12
- Securing key issuing in peer-to-peer networks., 2018-11-06
- A holistic mechanism against file pollution in peer-to-peer networks., 2018-11-06
- Establish the Intrinsic Binding in Naming Space for Future Internet Using Combined Public Key., 2018-11-06
- New construction of identity-based proxy re-encryption., 2018-11-06
- Identity-based encryption based on DHIES., 2018-11-06
- Efficient Privacy-Preserving Authentication Protocol for Vehicular Communications with Trustworthy, 2018-08-13
- An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols., 2018-02-21
- SKIP: A Secure Key Issuing Scheme for Peer-to-Peer Networks., 2018-02-21
- Scalable Byzantine Fault Tolerant Public Key Authentication for Peer-to-Peer Networks., 2018-02-21
- CuboidTrust: A Global Reputation-Based Trust Model in Peer-to-Peer Networks., 2018-02-21
- Towards Risk Evaluation of Denial-of-Service Vulnerabilities in Security Protocols., 2018-02-21
- Automatic Data Extraction from Web Discussion Forums., 2018-02-21
- Produre: A Novel Proximity Discovery Mechanism in Location Tagging System., 2018-02-21
- PKU-STRAW-L: A Simulative Platform Evaluate the Power-Saving Rate of the Intelligent Street Lamp System., 2018-02-21
- A New Method to Generate Attack Graphs., 2018-02-21
- A traceable privacy-preserving authentication protocol for VANETs based on proxy re-signature., 2018-02-21
- Feedback: Towards Dynamic Behavior and Secure Routing forWireless Sensor Networks., 2018-02-21
- A Traceable Certificateless Threshold Proxy Signature Scheme from Bilinear Pairings., 2018-02-21
- Automatic Construction and Optimization of Layered Network Attack Graph., 2018-02-21
- Resisting relay attacks on vehicular Passive Keyless Entry and start systems., 2018-02-21
- MisDis: An Efficent Misbehavior Discovering Method Based on Accountability and State Machine in VANET., 2018-02-21
- New Fully Secure Hierarchical Identity-Based Encryption with Constant Size Ciphertexts., 2018-02-21
- Implementing Attribute-Based Encryption in Web Services., 2018-02-21
- iSac: Intimacy Based Access Control for Social Network Sites., 2018-02-21
- DSpam: Defending Against Spam in Tagging Systems via Users' Reliability., 2018-02-21
- Sensitive Edges Protection in Social Networks., 2018-02-21
- C4W: An Energy Efficient Public Key Cryptosystem for Large-Scale Wireless Sensor Networks., 2018-02-21
- A Novel Commutative Blinding Identity Based Encryption Scheme., 2018-02-21
- A Formal Language for Access Control Policies in Distributed Environment., 2018-02-21
- Need for Symmetry: Addressing Privacy Risks in Online Social Networks., 2018-02-21
- Filtering false data via authentic consensus in vehicle ad hoc networks., 2018-02-21
- Claper: Recommend classical papers to beginners., 2018-02-21
- SWORDS: Improving Sensor Networks Immunity under Worm Attacks., 2018-02-21
- Edges Protection in Multiple Releases of Social Network Data., 2018-02-21
- Evaluating Network Security With Two-Layer Attack Graphs., 2018-02-21
- RGH: An Efficient RSU-Aided Group-Based Hierarchical Privacy Enhancement Protocol for VANETs., 2018-02-21
- An Adjacency Matrixes-Based Model for Network Security Analysis., 2018-02-21
- Data-Centric Trust Framework for High Integrity Wireless Sensor Networks., 2017-05-26