Name
Affiliation
Papers
ZHI GUAN
Peking Univ, Sch Elect Engn & Comp Sci, Inst Software,Minist Educ, Key Lab High Confidence Software Technol, Beijing, Peoples R China
27
Collaborators
Citations 
PageRank 
55
76
10.75
Referers 
Referees 
References 
233
702
292
Search Limit
100702
Title
Citations
PageRank
Year
FASTBLOCK: Accelerating Blockchains via Hardware Transactional Memory00.342021
LightLedger: A Novel Blockchain-Based Domain Certificate Authentication and Validation Scheme00.342021
EShield: protect smart contracts against reverse engineering10.412020
Kaya: A Testing Framework For Blockchain-Based Decentralized Applications00.342020
Towards automated testing of blockchain-based decentralized applications00.342019
Peer-to-peer file sharing in next generation eXpressive Internet Architecture00.342019
EASYFLOW: Keep Ethereum Away From Overflow.00.342018
Analysis of Man-In-The-Middle of Attack on Bitcoin Address.00.342018
Seamless service migration for human-centered computing in future Internet architecture00.342017
Privacy Protection against Query Prediction in Location-Based Services00.342014
Cache-Aware Query Processing With User Privacy Protection In Location-Based Services00.342014
Accelerating AES in JavaScript with WebGL10.382013
Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys140.562013
An Efficient Privacy-Preserving RFID Ownership Transfer Protocol.40.412013
An efficient certificateless aggregate signature with constant pairing computations331.112013
Authenticating Users Of Recommender Systems Using Naive Bayes00.342013
A Hybrid Approach for Privacy Preservation in Location Based Queries.10.352013
Exploiting Consumer Reviews for Product Feature Ranking70.442012
Information-theoretic modeling of false data filtering schemes in wireless sensor networks40.402012
Produre: A novel proximity discovery mechanism in location tagging system00.342011
Mobile Browser as a Second Factor for Web Authentication00.342011
Towards Risk Evaluation of Denial-of-Service Vulnerabilities in Security Protocols.10.352010
Identity-based encryption based on DHIES30.412010
Pseudo-randomness Inside Web Browsers00.342008
WebIBC: Identity Based Cryptography for Client Side Security in Web Applications50.452008
Efficient Identity-Based Key Issue with TPM10.382008
An economical model for the risk evaluation of DoS vulnerabilities in cryptography protocols10.362007