Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Jianying Zhou
Other persons with the same name
2010 – today
- 2013
[j51]Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou: Efficient Linkable and/or Threshold Ring Signature Without Random Oracles. Comput. J. 56(4): 407-421 (2013)
[j50]Gerard Draper-Gil, Josep Lluís Ferrer-Gomila, M. Francisca Hinarejos, Jianying Zhou: An Asynchronous Optimistic Protocol for Atomic Multi-Two-Party Contract Signing. Comput. J. 56(10): 1258-1267 (2013)
[j49]Aldar C.-F. Chan, Jianying Zhou: On smart grid cybersecurity standardization: Issues of designing with NISTIR 7628. IEEE Communications Magazine 51(1): 58-65 (2013)
[j48]Rodrigo Roman, Jianying Zhou, Javier Lopez: On the features and challenges of security and privacy in distributed internet of things. Computer Networks 57(10): 2266-2279 (2013)
[j47]Abror Abduvaliyev, Al-Sakib Khan Pathan, Jianying Zhou, Rodrigo Roman, Wai-Choong Wong: On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks. IEEE Communications Surveys and Tutorials 15(3): 1223-1237 (2013)
[j46]Gerard Draper-Gil, Jianying Zhou, Josep Lluís Ferrer-Gomila, M. Francisca Hinarejos: An optimistic fair exchange protocol with active intermediaries. Int. J. Inf. Sec. 12(4): 299-318 (2013)
[j45]Wei Wu, Jianying Zhou, Yang Xiang, Li Xu: How to achieve non-repudiation of origin with privacy protection in cloud computing. J. Comput. Syst. Sci. 79(8): 1200-1213 (2013)
[c109]Yi-Ruei Chen, Cheng-Kang Chu, Wen-Guey Tzeng, Jianying Zhou: CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing. ACNS 2013: 37-52
[c108]Jin Han, Su Mon Kywe, Qiang Yan, Feng Bao, Robert H. Deng, Debin Gao, Yingjiu Li, Jianying Zhou: Launching Generic Attacks on iOS with Approved Third-Party Applications. ACNS 2013: 272-289
[c107]Qiang Yan, Jin Han, Yingjiu Li, Jianying Zhou, Robert H. Deng: Designing leakage-resilient password entry on touchscreen mobile devices. ASIACCS 2013: 37-48
[c106]Jia Xu, Ee-Chien Chang, Jianying Zhou: Weak leakage-resilient client-side deduplication of encrypted data in cloud storage. ASIACCS 2013: 195-206
[c105]Cheng-Kang Chu, Joseph K. Liu, Jun Wen Wong, Yunlei Zhao, Jianying Zhou: Privacy-preserving smart metering with regional statistics and personal enquiry services. ASIACCS 2013: 369-380
[c104]Jin Han, Qiang Yan, Debin Gao, Jianying Zhou, Robert H. Deng: Comparing Mobile Privacy Protection through Cross-Platform Applications. NDSS 2013
[i18]Yi-Ruei Chen, Cheng-Kang Chu, Wen-Guey Tzeng, Jianying Zhou: CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing. IACR Cryptology ePrint Archive 2013: 208 (2013)
[i17]Jia Xu, Jianying Zhou: Leakage Resilient Proofs of Ownership in Cloud Storage, Revisited. IACR Cryptology ePrint Archive 2013: 514 (2013)- 2012
[j44]Chunhua Su, Yingjiu Li, Yunlei Zhao, Robert H. Deng, Yiming Zhao, Jianying Zhou: A Survey on Privacy Frameworks for RFID Authentication. IEICE Transactions 95-D(1): 2-11 (2012)
[j43]Jangseong Kim, Joonsang Baek, Jianying Zhou, Taeshik Shon: An Efficient and Secure Service Discovery Protocol for Ubiquitous Computing Environments. IEICE Transactions 95-D(1): 117-125 (2012)
[j42]Jianying Zhou, Xuejia Lai, Hui Li: Message from the Guest Editors. Int. J. Inf. Sec. 11(5): 291-292 (2012)
[j41]Wen Tao Zhu, Jianying Zhou, Robert H. Deng, Feng Bao: Detecting node replication attacks in wireless sensor networks: A survey. J. Network and Computer Applications 35(3): 1022-1034 (2012)
[j40]Wen Tao Zhu, Jianying Zhou, Robert H. Deng, Feng Bao: Detecting node replication attacks in mobile sensor networks: theory and approaches. Security and Communication Networks 5(5): 496-507 (2012)
[j39]Xinyi Huang, Cheng-Kang Chu, Hung-Min Sun, Jianying Zhou, Robert H. Deng: Enhanced authentication for commercial video services. Security and Communication Networks 5(11): 1248-1259 (2012)
[c103]Sherman S. M. Chow, Cheng-Kang Chu, Xinyi Huang, Jianying Zhou, Robert H. Deng: Dynamic Secure Cloud Storage with Provenance. Cryptography and Security 2012: 442-464
[c102]Cheng-Kang Chu, Joseph K. Liu, Xinyi Huang, Jianying Zhou: Verifier-local revocation group signatures with time-bound keys. ASIACCS 2012: 26-27
[c101]Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou: Enhancing Location Privacy for Electric Vehicles (at the Right time). ESORICS 2012: 397-414
[c100]Tsz Hon Yuen, Joseph K. Liu, Xinyi Huang, Man Ho Au, Willy Susilo, Jianying Zhou: Forward Secure Attribute-Based Signatures. ICICS 2012: 167-177
[c99]Yanjiang Yang, Haibing Lu, Jian Weng, Xuhua Ding, Jianying Zhou: A Generic Approach for Providing Revocation Support in Secret Handshake. ICICS 2012: 276-284
[e18]Feng Bao, Pierangela Samarati, Jianying Zhou (Eds.): Applied Cryptography and Network Security - 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings. Lecture Notes in Computer Science 7341, Springer 2012, ISBN 978-3-642-31283-0
[e17]Pierangela Samarati, Wenjing Lou, Jianying Zhou (Eds.): SECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications. SciTePress 2012, ISBN 978-989-8565-24-2
[i16]Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou: Enhancing Location Privacy for Electric Vehicles (at the right time). IACR Cryptology ePrint Archive 2012: 342 (2012)- 2011
[j38]Cristina Alcaraz, Javier Lopez, Jianying Zhou, Rodrigo Roman: Secure SCADA framework for the protection of energy control systems. Concurrency and Computation: Practice and Experience 23(12): 1431-1442 (2011)
[j37]Wen Tao Zhu, Yang Xiang, Jianying Zhou, Robert H. Deng, Feng Bao: Secure localization with attack detection in wireless sensor networks. Int. J. Inf. Sec. 10(3): 155-171 (2011)
[j36]Sushil Jajodia, Jianying Zhou: Message from the Guest Editors. Int. J. Inf. Sec. 10(5): 267-268 (2011)
[j35]Yingjiu Li, Jianying Zhou: Guest editors' preface. Journal of Computer Security 19(2): 227-228 (2011)
[j34]Yanjiang Yang, Jianying Zhou, Robert H. Deng, Feng Bao: Better security enforcement in trusted computing enabled heterogeneous wireless sensor networks. Security and Communication Networks 4(1): 11-22 (2011)
[j33]Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu, Jianying Zhou, Robert H. Deng: Preserving Transparency and Accountability in Optimistic Fair Exchange of Digital Signatures. IEEE Transactions on Information Forensics and Security 6(2): 498-512 (2011)
[j32]Xinyi Huang, Yang Xiang, Ashley Chonka, Jianying Zhou, Robert H. Deng: A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems. IEEE Trans. Parallel Distrib. Syst. 22(8): 1390-1397 (2011)
[c98]Joseph K. Liu, Cheng-Kang Chu, Jianying Zhou: Identity-Based Server-Aided Decryption. ACISP 2011: 337-352
[c97]Sherman S. M. Chow, Joseph K. Liu, Jianying Zhou: Identity-based online/offline key encapsulation and encryption. ASIACCS 2011: 52-60
[c96]Joonsang Baek, Jianying Zhou: Compact identity-based encryption without strong symmetric cipher. ASIACCS 2011: 61-70
[c95]Cheng-Kang Chu, Wen Tao Zhu, Sherman S. M. Chow, Jianying Zhou, Robert H. Deng: Secure mobile subscription of sensor-encrypted data. ASIACCS 2011: 228-237
[c94]Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou: Threshold ring signature without random oracles. ASIACCS 2011: 261-267
[c93]Joonsang Baek, Cheng-Kang Chu, Jianying Zhou: On Shortening Ciphertexts: New Constructions for Compact Public Key and Stateful Encryption Schemes. CT-RSA 2011: 302-318
[c92]Joseph K. Liu, Tsz Hon Yuen, Jianying Zhou: Forward Secure Ring Signature without Random Oracles. ICICS 2011: 1-14
[c91]Wen Tao Zhu, Robert H. Deng, Jianying Zhou, Feng Bao: Applying Time-Bound Hierarchical Key Assignment in Wireless Sensor Networks. ICICS 2011: 306-318
[c90]Joseph K. Liu, Feng Bao, Jianying Zhou: Short and Efficient Certificate-Based Signature. Networking Workshops 2011: 167-178
[e16]Xuejia Lai, Jianying Zhou, Hui Li (Eds.): Information Security, 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011. Proceedings. Lecture Notes in Computer Science 7001, Springer 2011, ISBN 978-3-642-24860-3
[e15]Claudio Agostino Ardagna, Jianying Zhou (Eds.): Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings. Lecture Notes in Computer Science 6633, Springer 2011, ISBN 978-3-642-21039-6
[i15]Joseph K. Liu, Feng Bao, Jianying Zhou: Short and Efficient Certificate-Based Signature. IACR Cryptology ePrint Archive 2011: 192 (2011)
[i14]Joseph K. Liu, Tsz Hon Yuen, Jianying Zhou: Forward Secure Ring Signature without Random Oracles. IACR Cryptology ePrint Archive 2011: 472 (2011)- 2010
[j31]Wen Tao Zhu, Robert H. Deng, Jianying Zhou, Feng Bao: Time-Bound Hierarchical Key Assignment: An Overview. IEICE Transactions 93-D(5): 1044-1052 (2010)
[j30]Joseph K. Liu, Joonsang Baek, Jianying Zhou, Yanjiang Yang, Jun Wen Wong: Efficient online/offline identity-based signature for wireless sensor network. Int. J. Inf. Sec. 9(4): 287-296 (2010)
[c89]Yanjiang Yang, Jianying Zhou, Jun Wen Wong, Feng Bao: Towards practical anonymous password authentication. ACSAC 2010: 59-68
[c88]Cheng-Kang Chu, Joseph K. Liu, Jianying Zhou, Feng Bao, Robert H. Deng: Practical ID-based encryption for wireless sensor network. ASIACCS 2010: 337-340
[c87]Joseph K. Liu, Joonsang Baek, Jianying Zhou: Online/Offline Identity-Based Signcryption Revisited. Inscrypt 2010: 36-51
[c86]Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou: Short Generic Transformation to Strongly Unforgeable Signature in the Standard Model. ESORICS 2010: 168-181
[c85]Jangseong Kim, Joonsang Baek, Kwangjo Kim, Jianying Zhou: A Privacy-Preserving Secure Service Discovery Protocol for Ubiquitous Computing Environments. EuroPKI 2010: 45-60
[c84]Gerard Draper-Gil, Jianying Zhou, Josep Lluís Ferrer-Gomila: An Agent-Mediated Fair Exchange Protocol. ICICS 2010: 235-250
[e14]Jianying Zhou, Moti Yung (Eds.): Applied Cryptography and Network Security, 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010. Proceedings. Lecture Notes in Computer Science 6123, 2010, ISBN 978-3-642-13707-5
[e13]Sushil Jajodia, Jianying Zhou (Eds.): Security and Privacy in Communication Networks - 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 50, Springer 2010, ISBN 978-3-642-16160-5
[i13]Cheng-Kang Chu, Joseph K. Liu, Jianying Zhou, Feng Bao, Robert H. Deng: Practical ID-based Encryption for Wireless Sensor Network. IACR Cryptology ePrint Archive 2010: 2 (2010)
[i12]Joseph K. Liu, Joonsang Baek, Jianying Zhou, Yanjiang Yang, Jun Wen Wong: Efficient Online/Offline Identity-Based Signature for Wireless Sensor Network. IACR Cryptology ePrint Archive 2010: 3 (2010)
[i11]Sherman S. M. Chow, Joseph K. Liu, Jianying Zhou: Identity-Based Online/Offline Key Encapsulation and Encryption. IACR Cryptology ePrint Archive 2010: 194 (2010)
[i10]Joseph K. Liu, Joonsang Baek, Jianying Zhou: Online/Offline Identity-Based Signcryption Revisited. IACR Cryptology ePrint Archive 2010: 274 (2010)
2000 – 2009
- 2009
[b1]Jose Antonio Onieva, Javier Lopez, Jianying Zhou: Secure Multi-Party Non-Repudiation Protocols and Applications. Advances in Information Security 43, Springer 2009, ISBN 978-0-387-75629-5, pp. 1-47
[j29]Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai: Security and Correctness Analysis on Privacy-Preserving k-Means Clustering Schemes. IEICE Transactions 92-A(4): 1246-1250 (2009)
[j28]Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai: Distributed Noise Generation for Density Estimation Based Clustering without Trusted Third Party. IEICE Transactions 92-A(8): 1868-1871 (2009)
[j27]Shiqun Li, Guilin Wang, Jianying Zhou, Kefei Chen: Fair and Secure Mobile Billing Systems. Wireless Personal Communications 51(1): 81-93 (2009)
[c83]Cheng-Kang Chu, Jian Weng, Sherman S. M. Chow, Jianying Zhou, Robert H. Deng: Conditional Proxy Broadcast Re-Encryption. ACISP 2009: 327-342
[c82]Joonsang Baek, Willy Susilo, Joseph K. Liu, Jianying Zhou: A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack. ACNS 2009: 143-155
[c81]Joseph K. Liu, Jianying Zhou: An Efficient Identity-Based Online/Offline Encryption Scheme. ACNS 2009: 156-167
[c80]Yanjiang Yang, Jianying Zhou, Jian Weng, Feng Bao: A New Approach for Anonymous Password Authentication. ACSAC 2009: 199-208
[c79]Yanjiang Yang, Jian Weng, Jianying Zhou, Ying Qiu: Optionally Identifiable Private Handshakes. Inscrypt 2009: 164-178
[c78]Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou: Online/Offline Ring Signature Scheme. ICICS 2009: 80-90
[c77]Yanjiang Yang, Jianying Zhou, Robert H. Deng, Feng Bao: Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks. ICICS 2009: 135-149
[c76]Yanjiang Yang, Robert H. Deng, Jianying Zhou, Ying Qiu: Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing. ISPEC 2009: 384-395
[c75]Yanjiang Yang, Yingjiu Li, Jian Weng, Jianying Zhou, Feng Bao: Self-enforcing Private Inference Control. ProvSec 2009: 260-274
[c74]Yanjiang Yang, Jianying Zhou, Robert H. Deng, Feng Bao: Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks. SecureComm 2009: 285-295
[c73]Joseph K. Liu, Joonsang Baek, Jianying Zhou: Certificate-based sequential aggregate signature. WISEC 2009: 21-28
[e12]Yan Chen, Tassos Dimitriou, Jianying Zhou (Eds.): Security and Privacy in Communication Networks - 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 19, Springer 2009, ISBN 978-3-642-05283-5- 2008
[j26]Zhuowei Li, Amitabha Das, Jianying Zhou, Jagdish Chandra Patra: Variable-length signatures for intrusion detection. Comput. Syst. Sci. Eng. 23(3) (2008)
[j25]Jose Antonio Onieva, Jianying Zhou, Javier Lopez: Multiparty nonrepudiation: A survey. ACM Comput. Surv. 41(1) (2008)
[j24]Kenji Imamoto, Jianying Zhou, Kouichi Sakurai: Achieving evenhandedness in certified email system for contract signing. Int. J. Inf. Sec. 7(6): 383-394 (2008)
[c72]Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai: A New Scheme for Distributed Density Estimation based Privacy-Preserving Clustering. ARES 2008: 112-119
[c71]Joonsang Baek, Jianying Zhou, Feng Bao: Generic Constructions of Stateful Public Key Encryption and Their Applications. ACNS 2008: 75-93
[c70]JungHoon Ha, Sang-Jae Moon, Jianying Zhou, JaeCheol Ha: A New Formal Proof Model for RFID Location Privacy. ESORICS 2008: 267-281
[c69]Joseph K. Liu, Joonsang Baek, Willy Susilo, Jianying Zhou: Certificate-Based Signature Schemes without Pairings or Random Oracles. ISC 2008: 285-297
[c68]Han Chiang Tan, Jun Wen Wong, Jianying Zhou: Implementation and performance analysis for key divergent and evolution protocols in wireless sensor network. MobiQuitous 2008
[c67]Joseph K. Liu, Jianying Zhou: Efficient Certificate-Based Encryption in the Standard Model. SCN 2008: 144-155
[c66]Joonsang Baek, David Galindo, Willy Susilo, Jianying Zhou: Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework). SCN 2008: 358-374
[c65]Joonsang Baek, Han Chiang Tan, Jianying Zhou, Jun Wen Wong: Realizing Stateful Public Key Encryption in Wireless Sensor Network. SEC 2008: 95-107
[c64]Jianying Zhou, Tanmoy Kanti Das, Javier Lopez: An Asynchronous Node Replication Attack in Wireless Sensor Networks. SEC 2008: 125-139
[i9]Joseph K. Liu, Joonsang Baek, Willy Susilo, Jianying Zhou: Certificate-Based Signature Schemes without Pairings or Random Oracles. IACR Cryptology ePrint Archive 2008: 275 (2008)
[i8]Joonsang Baek, Willy Susilo, Joseph K. Liu, Jianying Zhou: A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack. IACR Cryptology ePrint Archive 2008: 449 (2008)- 2007
[j23]JungHoon Ha, Jianying Zhou, Sang-Jae Moon: A secure double auction protocol against false bids. Decision Support Systems 44(1): 147-158 (2007)
[j22]Jianying Zhou, Wee-Yung Chin, Rodrigo Roman, Javier Lopez: An effective multi-layered defense framework against spam. Inf. Sec. Techn. Report 12(3): 179-185 (2007)
[j21]Jose Antonio Onieva, Javier Lopez, Rodrigo Roman, Jianying Zhou, Stefanos Gritzalis: Integration of non-repudiation services in mobile DRM scenarios. Telecommunication Systems 35(3-4): 161-176 (2007)
[c63]Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai: Privacy-Preserving Two-Party K-Means Clustering via Secure Approximation. AINA Workshops (1) 2007: 385-391
[c62]Joonsang Baek, Willy Susilo, Jianying Zhou: New constructions of fuzzy identity-based encryption. ASIACCS 2007: 368-370
[c61]Shiqun Li, Guilin Wang, Jianying Zhou, Kefei Chen: Undeniable Mobile Billing Schemes. EuroPKI 2007: 338-345
[c60]Mildrey Carbonell, José María Sierra, Jose Antonio Onieva, Javier Lopez, Jianying Zhou: Estimation of TTP Features in Non-repudiation Service. ICCSA (2) 2007: 549-558
[c59]Liying Li, Jianying Zhou, Ning Xiao: DDoS Attack Detection Algorithms Based on Entropy Computing. ICICS 2007: 452-466
[c58]Ying Qiu, Feng Bao, Jianying Zhou: Firewall for Dynamic IP Address in Mobile IPv6. ICICS 2007: 467-479
[c57]Chunhua Su, Jianying Zhou, Feng Bao, Tsuyoshi Takagi, Kouichi Sakurai: Two-Party Privacy-Preserving Agglomerative Document Clustering. ISPEC 2007: 193-208
[c56]Zhuowei Li, Amitabha Das, Jianying Zhou: Evaluating the Effects of Model Generalization on Intrusion Detection Performance. SEC 2007: 421-432
[c55]Zhuowei Li, Amitabha Das, Jianying Zhou: Towards Automatic Assembly of Privacy-Preserved Intrusion Signatures. TrustBus 2007: 54-64
[c54]Han Chiang Tan, Jianying Zhou, Ying Qiu: A Mobile Firewall Framework - Design and Implementation. WCNC 2007: 2945-2950
[i7]Joonsang Baek, Willy Susilo, Jianying Zhou: New Constructions of Fuzzy Identity-Based Encryption. IACR Cryptology ePrint Archive 2007: 47 (2007)- 2006
[j20]Kui Ren, Wenjing Lou, Kai Zeng, Feng Bao, Jianying Zhou, Robert H. Deng: Routing optimization security in mobile IPv6. Computer Networks 50(13): 2401-2419 (2006)
[j19]Rodrigo Roman, Jianying Zhou, Javier Lopez: An anti-spam scheme using pre-challenges. Computer Communications 29(15): 2739-2749 (2006)
[j18]Min-Hua Shao, Guilin Wang, Jianying Zhou: Some common attacks against certified email protocols and the countermeasures. Computer Communications 29(15): 2759-2769 (2006)
[j17]Min-Hua Shao, Jianying Zhou: Protecting mobile-agent data collection against blocking attacks. Computer Standards & Interfaces 28(5): 600-611 (2006)
[j16]Jianying Zhou, Feng Bao, Robert H. Deng: Minimizing TTP's involvement in signature validation. Int. J. Inf. Sec. 5(1): 37-47 (2006)
[j15]
[j14]JungHoon Ha, Jianying Zhou, Sang-Jae Moon: Improved Double Auction Protocol based on a Hybrid Trust Model. JCP 1(2): 33-41 (2006)
[j13]
[j12]Tanmoy Kanti Das, Subhamoy Maitra, Jianying Zhou: Cryptanalysis of Chu's DCT based watermarking scheme. IEEE Transactions on Multimedia 8(3): 629-632 (2006)
[c53]Shiqun Li, Shane Balfe, Jianying Zhou, Kefei Chen: Enforcing Trust in Pervasive Computing with Trusted Computing Technology. CRITIS 2006: 195-209
[c52]Huafei Zhu, Jianying Zhou: Finding Compact Reliable Broadcast in Unknown Fixed-Identity Networks (Short Paper). ICICS 2006: 72-81
[c51]Guilin Wang, Feng Bao, Jianying Zhou: The Fairness of Perfect Concurrent Signatures. ICICS 2006: 435-451
[c50]Michal Ren, Tanmoy Kanti Das, Jianying Zhou: Diverging Keys in Wireless Sensor Networks. ISC 2006: 257-269
[c49]Jianying Zhou, Jose Antonio Onieva, Javier Lopez: A Synchronous Multi-Party Contract Signing Protocol Improving Lower Bound of Steps. SEC 2006: 221-232
[c48]
[c47]Ying Qiu, Jianying Zhou, Feng Bao, Robert H. Deng: Using Certificate-based Binding Update Protocol to Hide the Movement of Mobile Nodes in MIPv6. VTC Spring 2006: 828-830
[e11]Jianying Zhou, Moti Yung, Feng Bao (Eds.): Applied Cryptography and Network Security, 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings. Lecture Notes in Computer Science 3989, 2006, ISBN 3-540-34703-8
[e10]Kefei Chen, Robert H. Deng, Xuejia Lai, Jianying Zhou (Eds.): Information Security Practice and Experience, Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings. Lecture Notes in Computer Science 3903, Springer 2006, ISBN 3-540-33052-6
[i6]Guilin Wang, Feng Bao, Jianying Zhou: The Fairness of Perfect Concurrent Signatures. IACR Cryptology ePrint Archive 2006: 226 (2006)- 2005
[j11]Rodrigo Roman, Javier Lopez, Jianying Zhou: Casual virtual private network. Comput. Syst. Sci. Eng. 20(3) (2005)
[j10]Jianying Zhou, Jose Antonio Onieva, Javier Lopez: Optimized multi-party certified email protocols. Inf. Manag. Comput. Security 13(5): 350-366 (2005)
[c46]Zhuowei Li, Amitabha Das, Jianying Zhou: Model Generalization and Its Implications on Intrusion Detection. ACNS 2005: 222-237
[c45]Rodrigo Roman, Jianying Zhou, Javier Lopez: On the Security of Wireless Sensor Networks. ICCSA (3) 2005: 681-690
[c44]Min-Hua Shao, Jianying Zhou, Guilin Wang: On the Security of a Certified E-Mail Scheme with Temporal Authentication. ICCSA (3) 2005: 701-710
[c43]Kenji Imamoto, Jianying Zhou, Kouichi Sakurai: An Evenhanded Certified Email System for Contract Signing. ICICS 2005: 1-13
[c42]Di Ma, Robert H. Deng, HweeHwa Pang, Jianying Zhou: Authenticating Query Results in Data Publishing. ICICS 2005: 376-388
[c41]JungHoon Ha, Jianying Zhou, Sang-Jae Moon: A Robust Double Auction Protocol Based on a Hybrid Trust Model. ICISS 2005: 77-90
[c40]Tanmoy Kanti Das, Jianying Zhou: Cryptanalysis of Barni et al. Watermarking Scheme. INDOCRYPT 2005: 197-208
[c39]Jose Antonio Onieva, Jianying Zhou, Javier Lopez: Attacking an Asynchronous Multi-party Contract Signing Protocol. INDOCRYPT 2005: 311-321
[c38]Shiqun Li, Jianying Zhou, Xiangxue Li, Kefei Chen: An Authentication Protocol for Pervasive Computing. ISPA 2005: 553-563
[c37]Ying Qiu, Jianying Zhou, Robert H. Deng: Security Analysis and Improvement of Return Routability Protocol. MADNES 2005: 174-181
[c36]Zhuowei Li, Amitabha Das, Jianying Zhou: USAID: Unifying Signature-Based and Anomaly-Based Intrusion Detection. PAKDD 2005: 702-712
[c35]Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng: An efficient certified e-mail scheme suitable for wireless mobile environments. PIMRC 2005: 1994-1998
[c34]Subhamoy Maitra, Tanmoy Kanti Das, Jianying Zhou: An Information Hiding Framework for Lightweight Mobile Devices with Digital Camera. PReMI 2005: 491-496
[c33]Rodrigo Roman, Jianying Zhou, Javier Lopez: Protection Against Spam Using Pre-Challenges. SEC 2005: 281-294
[c32]JungHoon Ha, Jianying Zhou, Sang-Jae Moon: An Improved Double Auction Protocol Against False Bids. TrustBus 2005: 274-287
[e9]Robert H. Deng, Feng Bao, HweeHwa Pang, Jianying Zhou (Eds.): Information Security Practice and Experience, First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings. Lecture Notes in Computer Science 3439, Springer 2005, ISBN 3-540-25584-2
[e8]Jianying Zhou, Javier Lopez, Robert H. Deng, Feng Bao (Eds.): Information Security, 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings. Lecture Notes in Computer Science 3650, Springer 2005, ISBN 3-540-29001-X
[e7]Jianying Zhou, Meng-Chow Kang, Feng Bao, HweeHwa Pang (Eds.): Applied Public Key Infrastructure - 4th International Workshop: IWAP 2005, Singapore, September 21-23, 2005. Frontiers in Artificial Intelligence and Applications 128, IOS Press 2005, ISBN 978-1-58603-550-1- 2004
[j9]Jose Antonio Onieva, Jianying Zhou, Javier Lopez: Non-repudiation protocols for multiple entities. Computer Communications 27(16): 1608-1616 (2004)
[j8]Jose Antonio Onieva, Jianying Zhou, Javier Lopez, Mildrey Carbonell: Agent-mediated non-repudiation protocols. Electronic Commerce Research and Applications 3(2): 152-162 (2004)
[j7]Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng: Comments on "A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem". IEEE Trans. Knowl. Data Eng. 16(10): 1309-1311 (2004)
[c31]Feng Bao, Guilin Wang, Jianying Zhou, Huafei Zhu: Analysis and Improvement of Micali's Fair Contract Signing Protocol. ACISP 2004: 176-187
[c30]Mildrey Carbonell, Jose Antonio Onieva, Javier Lopez, Deborah Galpert, Jianying Zhou: Timeout Estimation Using a Simulation Model for Non-repudiation Protocols. ICCSA (1) 2004: 903-914
[c29]
[c28]Guilin Wang, Feng Bao, Jianying Zhou: On the Security of a Certified E-Mail Scheme. INDOCRYPT 2004: 48-60
[c27]Tanmoy Kanti Das, Jianying Zhou, Subhamoy Maitra: Cryptanalysis of a Wavelet Based Watermarking Scheme. IWDW 2004: 192-203
[c26]
[c25]Guilin Wang, Jianying Zhou, Robert H. Deng: On the Security of the Lee-Hwang Group-Oriented Undeniable Signature Schemes. TrustBus 2004: 289-298
[c24]
[c23]Jianying Zhou, Jose Antonio Onieva, Javier Lopez: Analysis of a Free Roaming Agent Result-Truncation Defense Scheme. CEC 2004: 221-226
[e6]Markus Jakobsson, Moti Yung, Jianying Zhou (Eds.): Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings. Lecture Notes in Computer Science 3089, Springer 2004, ISBN 3-540-22217-0
[e5]Feng Bao, Robert H. Deng, Jianying Zhou (Eds.): Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004. Lecture Notes in Computer Science 2947, Springer 2004, ISBN 3-540-21018-0
[i5]Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng: Comments on a Threshold Proxy Signature Scheme Based on the RSA Cryptosystem. IACR Cryptology ePrint Archive 2004: 54 (2004)- 2003
[c22]Anantharaman Lakshminarayanan, Jianying Zhou: FlexiCert: Merging X.509 Identity Certificates and Attribute Certificates. DEXA Workshops 2003: 489-493
[c21]
[c20]Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng: Security Remarks on a Group Signature Scheme with Member Deletion. ICICS 2003: 72-83
[c19]
[c18]Jose Antonio Onieva, Jianying Zhou, Javier Lopez: Practical Service Charge for P2P Content Distribution. ICICS 2003: 112-123
[c17]Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng: Security Analysis of Some Proxy Signatures. ICISC 2003: 305-319
[c16]Jianying Zhou, Feng Bao, Robert H. Deng: Validating Digital Signatures without TTP's Time-Stamping and Certificate Revocation. ISC 2003: 96-110
[c15]Jose Antonio Onieva, Jianying Zhou, Mildrey Carbonell, Javier Lopez: A Multi-Party Non-Repudiation Protocol for Exchange of Different Messages. SEC 2003: 37-48
[c14]Jose Antonio Onieva, Jianying Zhou, Mildrey Carbonell, Javier Lopez: Intermediary Non-repudiation Protocols. CEC 2003: 207-214
[e4]Jianying Zhou, Moti Yung, Yongfei Han (Eds.): Applied Cryptography and Network Security, First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings. Lecture Notes in Computer Science 2846, Springer 2003, ISBN 3-540-20208-0
[e3]Sihan Qing, Dieter Gollmann, Jianying Zhou (Eds.): Information and Communications Security, 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings. Lecture Notes in Computer Science 2836, Springer 2003, ISBN 3-540-20150-5
[i4]Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng: Security Analysis of Some Proxy Signatures. IACR Cryptology ePrint Archive 2003: 196 (2003)
[i3]Jianying Zhou: On the Security of a Multi-Party Certified Email Protocol. IACR Cryptology ePrint Archive 2003: 256 (2003)- 2002
[j6]Steve Kremer, Olivier Markowitch, Jianying Zhou: An intensive survey of fair non-repudiation protocols. Computer Communications 25(17): 1606-1621 (2002)
[c13]Jianying Zhou: Maintaining the Validity of Digital Signatures in B2B Applications. ACISP 2002: 303-315
[c12]Robert H. Deng, Jianying Zhou, Feng Bao: Defending against redirect attacks in mobile IP. ACM Conference on Computer and Communications Security 2002: 59-67
[c11]Chunfu Tan, Jianying Zhou: An Electronic Payment Scheme Allowing Special Rates for Anonymous Regular Customers. DEXA Workshops 2002: 428-434
[e2]Robert H. Deng, Sihan Qing, Feng Bao, Jianying Zhou (Eds.): Information and Communications Security, 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings. Lecture Notes in Computer Science 2513, Springer 2002, ISBN 3-540-00164-6
[i2]Guilin Wang, Jianying Zhou, Robert H. Deng: Cryptanalysis of the Lee-Hwang Group-Oriented Undeniable Signature Schemes. IACR Cryptology ePrint Archive 2002: 150 (2002)
[i1]Jianying Zhou, Feng Bao, Robert H. Deng: Validating Digital Signatures without Time-Stamping and Certificate Revocation. IACR Cryptology ePrint Archive 2002: 156 (2002)- 2001
[c10]
[e1]Sihan Qing, Tatsuaki Okamoto, Jianying Zhou (Eds.): Information and Communications Security, Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001. Lecture Notes in Computer Science 2229, Springer 2001, ISBN 3-540-42880-1- 2000
[j5]Jianying Zhou, Robert H. Deng: On the validity of digital signatures. Computer Communication Review 30(2): 29-34 (2000)
[j4]Jianying Zhou: Further analysis of the Internet key exchange protocol. Computer Communications 23(17): 1606-1612 (2000)
[c9]Jianying Zhou, Robert H. Deng, Feng Bao: Some Remarks on a Fair Exchange Protocol. Public Key Cryptography 2000: 46-57
[c8]Feng Bao, Robert H. Deng, Jianying Zhou: Electronic Payment Systems with Fair On-line Verification. SEC 2000: 451-460
1990 – 1999
- 1999
[j3]Jianying Zhou, Kwok-Yan Lam: Securing digital signatures for non-repudiation. Computer Communications 22(8): 710-716 (1999)
[j2]
[c7]Jianying Zhou, Robert H. Deng, Feng Bao: Evolution of Fair Non-repudiation with TTP. ACISP 1999: 258-269
[c6]Jianying Zhou, Kwok-Yan Lam: A Secure Pay-per View Scheme for Web-Based Video Service. Public Key Cryptography 1999: 315-326- 1998
[j1]Cheng-Hwee You, Jianying Zhou, Kwok-Yan Lam: On the efficient implementation of fair non-repudiation. Computer Communication Review 28(5): 50-60 (1998)
[c5]- 1997
[c4]- 1996
[c3]
[c2]
[c1]Jianying Zhou, Dieter Gollmann: A Fair Non-repudiation Protocol. IEEE Symposium on Security and Privacy 1996: 55-61
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-16 21:29 CEST by the dblp team



