Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Shan Chun is active.

Publication


Featured researches published by Shan Chun.


First International Conference on Real Time Intelligent Systems | 2016

A Secure Pairing-Free Certificate-Less Authenticated Key Agreement Protocol

Shan Chun; Hu Kangwen; Xue Jingfeng; Hu Changzhen; Ma Rui

Pairing-free certificate-less two-party authenticated key agreement (CT-AKA) protocol is computation-efficient, easily manageable, and less key escrow dependent compared to traditional pairing-based identity-based protocol. In this paper, we propose four types of attacks on CT-AKA, present a pairing-free CT-AKA protocol and analyze its security in Lippold model. Compared with relevant CT-AKA protocols, our protocol is more efficient, secure and practical to apply.


Archive | 2015

Code static analysis method oriented to security check

Hu Changzhen; Shan Chun; Wu Luxia; Yu Zequn; Ma Rui


Archive | 2014

Regularization state machine model design method with stateful protocol

Hu Changzhen; Ma Rui; Han Xue; Shan Chun; Wang Yong


Archive | 2014

Method and system for predicting software defects

Hu Changzhen; Xue Jingfeng; Wang Nanshuai; Shan Chun; Hu Jingjing


International journal of security and its applications | 2016

A XSS Attack Detection Method based on Skip List

Shan Chun; Cui Jing; Hu Changzhen; Xue Jingfeng; Wang Hao; Mhagama Raphael


International journal of security and its applications | 2016

Research on the Defense Method of Vtable Hijacking

Wang Zixiang; Shan Chun; Xue Jingfeng; Sun Shiyouhu Changzhen


Archive | 2014

Software defect prediction method and system

Hu Changzhen; Shan Chun; Chen Boyang; Ma Rui; Wang Yong


Archive | 2014

Software defect measuring method based on complex network

Hu Changzhen; Zhao Xiaolin; Chen-Xiang Lingyi; Wang Yong; Shan Chun


Archive | 2017

Multidimensional network security measurement method based on TOPSIS

Zhao Xiaolin; Xue Jingfeng; Lin Qingyu; Shan Chun; Zeng Chonghan


Archive | 2017

Method and device for detecting privacy data leakage

Hu Changzhen; Ma Rui; Wang Xiajing; Li Bo; Shan Chun; Chen Siyu

Collaboration


Dive into the Shan Chun's collaboration.

Top Co-Authors

Avatar

Hu Changzhen

Beijing Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Ma Rui

Beijing Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Xue Jingfeng

Beijing Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Hu Kangwen

Beijing Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge