Weili Han
Geciteerd door
Geciteerd door
Value-centric design of the internet-of-things solution for food supply chain: Value creation, sensor portfolio and information fusion
Z Pang, Q Chen, W Han, L Zheng
Information Systems Frontiers, 1-31, 2012
Anti-phishing based on automated individual white-list
Y Cao, W Han, Y Le
Proceedings of the 4th ACM workshop on Digital identity management, 51-60, 2008
Permission based Android security: Issues and countermeasures
Z Fang, W Han, Y Li
computers & security 43, 205-218, 2014
Geochemical and geochronological constraints on the suture location between the North and South China blocks in the Dabie Orogen, Central China
SG Li, F Huang, YH Nie, WL Han, G Long, HM Li, SQ Zhang, ZH Zhang
Physics and Chemistry of the Earth, Part A: Solid Earth and Geodesy 26 (9 …, 2001
An Internet-of-Things solution for food safety and quality control: A pilot project in China
Y Liu, W Han, Y Zhang, L Li, J Wang, L Zheng
Journal of Industrial Information Integration 3, 1-7, 2016
A survey on policy languages in network and security management
W Han, C Lei
Computer Networks 56 (1), 477-489, 2012
A robust detection of the sybil attack in urban vanets
C Chen, X Wang, W Han, B Zang
2009 29th IEEE International Conference on Distributed Computing Systems …, 2009
A {Large-Scale} Empirical Analysis of Chinese Web Passwords
Z Li, W Han, W Xu
23rd USENIX Security Symposium (USENIX Security 14), 559-574, 2014
Content recommendation system based on private dynamic user profile
T Chen, WL Han, HD Wang, YX Zhou, B Xu, BY Zang
2007 International conference on machine learning and cybernetics 4, 2112-2118, 2007
An access control language for a general provenance model
Q Ni, S Xu, E Bertino, R Sandhu, W Han
Secure Data Management, 68-88, 2009
Application-specific digital forensics investigative model in internet of things (iot)
T Zia, P Liu, W Han
Proceedings of the 12th International Conference on Availability …, 2017
Using automated individual white-list to protect web digital identities
W Han, Y Cao, E Bertino, J Yong
Expert Systems with Applications 39 (15), 11861-11869, 2012
Technologies, applications, and governance in the internet of things
L Zheng, H Zhang, W Han, X Zhou, J He, Z Zhang, Y Gu, J Wang
Internet of Things-Global Technological and Societal Trends from Smart …, 2022
Zero-sum password cracking game: A large-scale empirical study on the crackability, correlation, and security of passwords
S Ji, S Yang, X Hu, W Han, Z Li, R Beyah
IEEE transactions on dependable and secure computing 14 (5), 550-564, 2015
Shadow attacks based on password reuses: A quantitative empirical analysis
W Han, Z Li, M Ni, G Gu, W Xu
IEEE Transactions on Dependable and Secure Computing 15 (2), 309-320, 2016
Regional patterns and vulnerability analysis of chinese web passwords
W Han, Z Li, L Yuan, W Xu
IEEE Transactions on Information Forensics and Security 11 (2), 258-272, 2015
加快新工科建设, 推进工程教育改革创新——“综合性高校工程教育发展战略研讨会” 综述
胡波, 冯辉, 韩伟力, 徐雷
复旦教育论坛, 20-28, 2017
FETMS: Fast and efficient trust management scheme for information-centric networking in Internet of Things
W Fang, M Xu, C Zhu, W Han, W Zhang, JJPC Rodrigues
IEEE access 7, 13476-13485, 2019
The design of an electronic pedigree system for food safety
W Han, Y Gu, W Wang, Y Zhang, Y Yin, J Wang, LR Zheng
Information Systems Frontiers, 1-13, 2012
Context-sensitive access control model and implementation
W Han, J Zhang, X Yao
The Fifth International Conference on Computer and Information Technology …, 2005
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20