Year |
Citation |
Score |
2017 |
Zuo Y, Liu J. A reputation-based model for mobile agent migration for information search and retrieval International Journal of Information Management. 37: 357-366. DOI: 10.1016/J.Ijinfomgt.2017.04.002 |
0.372 |
|
2013 |
Zuo Y. Survivability enhancing techniques for RFID systems Mobile and Handheld Computing Solutions For Organizations and End-Users. 37-53. DOI: 10.4018/Jhcr.2011010102 |
0.378 |
|
2013 |
Zuo Y, Panda B. Composition and combination-based object trust evaluation for knowledge management in virtual organizations Vine. 43: 296-321. DOI: 10.1108/Vine-03-2012-0004 |
0.535 |
|
2012 |
Zuo Y. Automatic Proof of Survivability Compliance -Approaches and Techniques International Journal of Computer Theory and Engineering. 740-744. DOI: 10.7763/Ijcte.2012.V4.569 |
0.302 |
|
2012 |
Zuo Y. Survivability experiment and attack characterization for RFID Ieee Transactions On Dependable and Secure Computing. 9: 289-302. DOI: 10.1109/Tdsc.2011.30 |
0.354 |
|
2010 |
Zuo Y. Secure and private search protocols for RFID systems Information Systems Frontiers. 12: 507-519. DOI: 10.1007/S10796-009-9208-6 |
0.36 |
|
2009 |
Zuo Y, Hu WC. Trust-based information risk management in a supply chain network International Journal of Information Systems and Supply Chain Management. 2: 19-34. DOI: 10.4018/Jisscm.2009070102 |
0.304 |
|
2007 |
Zuo Y. Component comparison based information quality assurance International Journal of Information Quality. 1: 295-313. DOI: 10.1504/Ijiq.2007.016393 |
0.364 |
|
2007 |
Zuo Y, O'Keefe T. Post-release information privacy protection: A framework and next-generation privacy-enhanced operating system Information Systems Frontiers. 9: 451-467. DOI: 10.1007/S10796-007-9057-0 |
0.345 |
|
2006 |
Zuo Y, Panda B. Distributed database damage assessment paradigm Information Management and Computer Security. 14: 116-139. DOI: 10.1108/09685220610655870 |
0.564 |
|
2006 |
Zuo Y, Panda B. A trust-based model for information integrity in open systems Ifip International Federation For Information Processing. 193. |
0.517 |
|
2005 |
Zuo Y, Panda B. External object trust zone mapping for information clustering Proceedings of the 3rd International Workshop On Security in Information Systems, Wosis 2005, in Conjunction With Iceis 2005. 196-206. |
0.519 |
|
2005 |
Zuo Y, Panda B. A Trust-Based Model for Information Integrity in Open Systems Ifip Advances in Information and Communication Technology. 193: 337-354. |
0.517 |
|
2004 |
Zuo Y, Panda B. Damage discovery in distributed database systems Ifip Advances in Information and Communication Technology. 144: 111-123. |
0.517 |
|
2004 |
Zuo Y, Panda B. Fuzzy dependency and its applications in damage assessment and recovery Proceedings Fron the Fifth Annual Ieee System, Man and Cybernetics Information Assurance Workshop, Smc. 350-357. |
0.471 |
|
Show low-probability matches. |