Author of the publication

Algebra model and security analysis for cryptographic protocols.

, and . Science in China Series F: Information Sciences, 47 (2): 199-220 (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Huai, Jinpeng
add a person with the name Huai, Jinpeng
 

Other publications of authors with the same name

Efficient Data Retrieving in Distributed Data-streaming Environments., , , , and . Ad Hoc & Sensor Wireless Networks, 10 (2-3): 135-151 (2010)On the tradeoff of availability and consistency for quorum systems in data center networks., , , and . Computer Networks, (2015)CROWN: A service grid middleware with trust management mechanism., , , , and . Science in China Series F: Information Sciences, 49 (6): 731-758 (2006)AutoSyn: A new approach to automated synthesis of composite web services with correctness guarantee., , , , and . Science in China Series F: Information Sciences, 52 (9): 1534-1549 (2009)A New Architecture for OGSA-based Grid Information Service., , , and . IEEE SCC, page 575-578. IEEE Computer Society, (2004)A quantitative analysis of quorum system availability in data centers., , , and . IWQoS, page 99-104. IEEE, (2014)HotRestore: A Fast Restore System for Virtual Machine Cluster., , , , , , and . LISA, page 1-16. USENIX Association, (2014)Business Process Decomposition Based on Service Relevance Mining., , , and . Web Intelligence, page 573-580. IEEE Computer Society, (2010)Access Control Policy Negotiation for Remote Hot-deployed Grid Services., , and . e-Science, page 378-386. IEEE Computer Society, (2005)An Enhanced Exact Procedure for the CMST Problem., and . ICITA (2), page 704-709. IEEE Computer Society, (2005)