The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jianying Zhou: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Feng Bao, Guilin Wang, Jianying Zhou, Huafei Zhu
    Analysis and Improvement of Micali's Fair Contract Signing Protocol. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:176-187 [Conf]
  2. Jianying Zhou
    Maintaining the Validity of Digital Signatures in B2B Applications. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:303-315 [Conf]
  3. Jianying Zhou, Robert H. Deng, Feng Bao
    Evolution of Fair Non-repudiation with TTP. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:258-269 [Conf]
  4. Zhuowei Li, Amitabha Das, Jianying Zhou
    Model Generalization and Its Implications on Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:222-237 [Conf]
  5. Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai
    Privacy-Preserving Two-Party K-Means Clustering via Secure Approximation. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:385-391 [Conf]
  6. Jianying Zhou, Dieter Gollmann
    Observations on Non-repudiation. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:133-144 [Conf]
  7. Robert H. Deng, Jianying Zhou, Feng Bao
    Defending against redirect attacks in mobile IP. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:59-67 [Conf]
  8. Joonsang Baek, Willy Susilo, Jianying Zhou
    New constructions of fuzzy identity-based encryption. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:368-370 [Conf]
  9. Jianying Zhou, Dieter Gollmann
    An Efficient Non-repudiation Protocol . [Citation Graph (0, 0)][DBLP]
    CSFW, 1997, pp:126-132 [Conf]
  10. A. Lakshminarayanan, Jianying Zhou
    FlexiCert: Merging X.509 Identity Certificates and Attribute Certificates. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2003, pp:489-493 [Conf]
  11. Chunfu Tan, Jianying Zhou
    An Electronic Payment Scheme Allowing Special Rates for Anonymous Regular Customers. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2002, pp:428-434 [Conf]
  12. Jianying Zhou
    Efficient Signature Validation Based on a New PKI. [Citation Graph (0, 0)][DBLP]
    EC-Web, 2003, pp:94-103 [Conf]
  13. Jianying Zhou, Dieter Gollmann
    Certified Electronic Mail. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1996, pp:160-171 [Conf]
  14. Mildrey Carbonell, Jose Antonio Onieva, Javier Lopez, Deborah Galpert, Jianying Zhou
    Timeout Estimation Using a Simulation Model for Non-repudiation Protocols. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:903-914 [Conf]
  15. Rodrigo Roman, Jianying Zhou, Javier Lopez
    On the Security of Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2005, pp:681-690 [Conf]
  16. Min-Hua Shao, Jianying Zhou, Guilin Wang
    On the Security of a Certified E-Mail Scheme with Temporal Authentication. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2005, pp:701-710 [Conf]
  17. Kenji Imamoto, Jianying Zhou, Kouichi Sakurai
    An Evenhanded Certified Email System for Contract Signing. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:1-13 [Conf]
  18. Jose Antonio Onieva, Jianying Zhou, Javier Lopez
    Practical Service Charge for P2P Content Distribution. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:112-123 [Conf]
  19. Di Ma, Robert H. Deng, HweeHwa Pang, Jianying Zhou
    Authenticating Query Results in Data Publishing. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:376-388 [Conf]
  20. Guilin Wang, Feng Bao, Jianying Zhou
    The Fairness of Perfect Concurrent Signatures. [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:435-451 [Conf]
  21. Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng
    Security Remarks on a Group Signature Scheme with Member Deletion. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:72-83 [Conf]
  22. Jianying Zhou
    On the Security of a Multi-party Certified Email Protocol. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:40-52 [Conf]
  23. Jianying Zhou, Feng Bao, Robert H. Deng
    An Efficient Public-Key Framework. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:88-99 [Conf]
  24. Jianying Zhou, Chunfu Tan
    Playing Lottery on the Internet. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:189-201 [Conf]
  25. Huafei Zhu, Jianying Zhou
    Finding Compact Reliable Broadcast in Unknown Fixed-Identity Networks (Short Paper). [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:72-81 [Conf]
  26. Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng
    Security Analysis of Some Proxy Signatures. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:305-319 [Conf]
  27. JungHoon Ha, Jianying Zhou, Sang-Jae Moon
    A Robust Double Auction Protocol Based on a Hybrid Trust Model. [Citation Graph (0, 0)][DBLP]
    ICISS, 2005, pp:77-90 [Conf]
  28. Tanmoy Kanti Das, Jianying Zhou
    Cryptanalysis of Barni et al. Watermarking Scheme. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2005, pp:197-208 [Conf]
  29. Jose Antonio Onieva, Jianying Zhou, Javier Lopez
    Attacking an Asynchronous Multi-party Contract Signing Protocol. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2005, pp:311-321 [Conf]
  30. Guilin Wang, Feng Bao, Jianying Zhou
    On the Security of a Certified E-Mail Scheme. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:48-60 [Conf]
  31. Shiqun Li, Jianying Zhou, Xiangxue Li, Kefei Chen
    An Authentication Protocol for Pervasive Computing. [Citation Graph (0, 0)][DBLP]
    ISPA, 2005, pp:553-563 [Conf]
  32. Chunhua Su, Jianying Zhou, Feng Bao, Tsuyoshi Takagi, Kouichi Sakurai
    Two-Party Privacy-Preserving Agglomerative Document Clustering. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:193-208 [Conf]
  33. Michal Ren, Tanmoy Kanti Das, Jianying Zhou
    Diverging Keys in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:257-269 [Conf]
  34. Jianying Zhou, Feng Bao, Robert H. Deng
    Validating Digital Signatures without TTP's Time-Stamping and Certificate Revocation. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:96-110 [Conf]
  35. Tanmoy Kanti Das, Jianying Zhou, Subhamoy Maitra
    Cryptanalysis of a Wavelet Based Watermarking Scheme. [Citation Graph (0, 0)][DBLP]
    IWDW, 2004, pp:192-203 [Conf]
  36. Ying Qiu, Jianying Zhou, Robert H. Deng
    Security Analysis and Improvement of Return Routability Protocol. [Citation Graph (0, 0)][DBLP]
    MADNES, 2005, pp:174-181 [Conf]
  37. Jianying Zhou, Kwok-Yan Lam
    Undeniable Billing in Mobile Communication. [Citation Graph (0, 0)][DBLP]
    MOBICOM, 1998, pp:284-290 [Conf]
  38. Zhuowei Li, Amitabha Das, Jianying Zhou
    USAID: Unifying Signature-Based and Anomaly-Based Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    PAKDD, 2005, pp:702-712 [Conf]
  39. Jianying Zhou, Robert H. Deng, Feng Bao
    Some Remarks on a Fair Exchange Protocol. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:46-57 [Conf]
  40. Jianying Zhou, Kwok-Yan Lam
    A Secure Pay-per View Scheme for Web-Based Video Service. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1999, pp:315-326 [Conf]
  41. Subhamoy Maitra, Tanmoy Kanti Das, Jianying Zhou
    An Information Hiding Framework for Lightweight Mobile Devices with Digital Camera. [Citation Graph (0, 0)][DBLP]
    PReMI, 2005, pp:491-496 [Conf]
  42. Feng Bao, Robert H. Deng, Jianying Zhou
    Electronic Payment Systems with Fair On-line Verification. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:451-460 [Conf]
  43. Jose Antonio Onieva, Jianying Zhou, Mildrey Carbonell, Javier Lopez
    A Multi-Party Non-Repudiation Protocol for Exchange of Different Messages. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:37-48 [Conf]
  44. Rodrigo Roman, Jianying Zhou, Javier Lopez
    Protection Against Spam Using Pre-Challenges. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:281-294 [Conf]
  45. Jianying Zhou, Jose Antonio Onieva, Javier Lopez
    A Synchronous Multi-Party Contract Signing Protocol Improving Lower Bound of Steps. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:221-232 [Conf]
  46. Shane Balfe, Shiqun Li, Jianying Zhou
    Pervasive Trusted Computing. [Citation Graph (0, 0)][DBLP]
    SecPerU, 2006, pp:88-94 [Conf]
  47. Jianying Zhou, Dieter Gollmann
    A Fair Non-repudiation Protocol. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:55-61 [Conf]
  48. JungHoon Ha, Jianying Zhou, Sang-Jae Moon
    An Improved Double Auction Protocol Against False Bids. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:274-287 [Conf]
  49. Guilin Wang, Jianying Zhou, Robert H. Deng
    On the Security of the Lee-Hwang Group-Oriented Undeniable Signature Schemes. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2004, pp:289-298 [Conf]
  50. Jose Antonio Onieva, Jianying Zhou, Mildrey Carbonell, Javier Lopez
    Intermediary Non-repudiation Protocols. [Citation Graph (0, 0)][DBLP]
    CEC, 2003, pp:207-214 [Conf]
  51. Jianying Zhou, Jose Antonio Onieva, Javier Lopez
    Analysis of a Free Roaming Agent Result-Truncation Defense Scheme. [Citation Graph (0, 0)][DBLP]
    CEC, 2004, pp:221-226 [Conf]
  52. Shiqun Li, Shane Balfe, Jianying Zhou, Kefei Chen
    Enforcing Trust in Pervasive Computing with Trusted Computing Technology. [Citation Graph (0, 0)][DBLP]
    CRITIS, 2006, pp:195-209 [Conf]
  53. Kui Ren, Wenjing Lou, Kai Zeng, Feng Bao, Jianying Zhou, Robert H. Deng
    Routing optimization security in mobile IPv6. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2006, v:50, n:13, pp:2401-2419 [Journal]
  54. Steve Kremer, Olivier Markowitch, Jianying Zhou
    An intensive survey of fair non-repudiation protocols. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2002, v:25, n:17, pp:1606-1621 [Journal]
  55. Jose Antonio Onieva, Jianying Zhou, Javier Lopez
    Non-repudiation protocols for multiple entities. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2004, v:27, n:16, pp:1608-1616 [Journal]
  56. Jianying Zhou
    Computer Security; D. Gollmann. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1999, v:22, n:13, pp:1274-1275 [Journal]
  57. Jianying Zhou, Kwok-Yan Lam
    Securing digital signatures for non-repudiation. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1999, v:22, n:8, pp:710-716 [Journal]
  58. Jianying Zhou
    Further analysis of the Internet key exchange protocol. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2000, v:23, n:17, pp:1606-1612 [Journal]
  59. Rodrigo Roman, Jianying Zhou, Javier Lopez
    An anti-spam scheme using pre-challenges. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:15, pp:2739-2749 [Journal]
  60. Min-Hua Shao, Guilin Wang, Jianying Zhou
    Some common attacks against certified email protocols and the countermeasures. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:15, pp:2759-2769 [Journal]
  61. Rodrigo Roman, Javier Lopez, Jianying Zhou
    Casual virtual private network. [Citation Graph (0, 0)][DBLP]
    Comput. Syst. Sci. Eng., 2005, v:20, n:3, pp:- [Journal]
  62. Jose Antonio Onieva, Jianying Zhou, Javier Lopez, Mildrey Carbonell
    Agent-mediated non-repudiation protocols. [Citation Graph (0, 0)][DBLP]
    Electronic Commerce Research and Applications, 2004, v:3, n:2, pp:152-162 [Journal]
  63. Jianying Zhou, Feng Bao, Robert H. Deng
    Minimizing TTP's involvement in signature validation. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2006, v:5, n:1, pp:37-47 [Journal]
  64. Jianying Zhou, Javier Lopez
    Preface. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2006, v:5, n:2, pp:65-66 [Journal]
  65. Jianying Zhou, Meng-Chow Kang
    Preface. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2006, v:14, n:5, pp:389-390 [Journal]
  66. Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng
    Comments on "A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem". [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2004, v:16, n:10, pp:1309-1311 [Journal]
  67. Tanmoy Kanti Das, Subhamoy Maitra, Jianying Zhou
    Cryptanalysis of Chu's DCT based watermarking scheme. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Multimedia, 2006, v:8, n:3, pp:629-632 [Journal]
  68. Shiqun Li, Guilin Wang, Jianying Zhou, Kefei Chen
    Undeniable Mobile Billing Schemes. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2007, pp:338-345 [Conf]
  69. Mildrey Carbonell, José María Sierra, Jose Antonio Onieva, Javier Lopez, Jianying Zhou
    Estimation of TTP Features in Non-repudiation Service. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:549-558 [Conf]
  70. Liying Li, Jianying Zhou, Ning Xiao
    DDoS Attack Detection Algorithms Based on Entropy Computing. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:452-466 [Conf]
  71. Ying Qiu, Feng Bao, Jianying Zhou
    Firewall for Dynamic IP Address in Mobile IPv6. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:467-479 [Conf]
  72. Zhuowei Li, Amitabha Das, Jianying Zhou
    Towards Automatic Assembly of Privacy-Preserved Intrusion Signatures. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:54-64 [Conf]
  73. JungHoon Ha, Jianying Zhou, Sang-Jae Moon
    A secure double auction protocol against false bids. [Citation Graph (0, 0)][DBLP]
    Decision Support Systems, 2007, v:44, n:1, pp:147-158 [Journal]

  74. A New Scheme for Distributed Density Estimation based Privacy-Preserving Clustering. [Citation Graph (, )][DBLP]


  75. Conditional Proxy Broadcast Re-Encryption. [Citation Graph (, )][DBLP]


  76. Generic Constructions of Stateful Public Key Encryption and Their Applications. [Citation Graph (, )][DBLP]


  77. A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack. [Citation Graph (, )][DBLP]


  78. An Efficient Identity-Based Online/Offline Encryption Scheme. [Citation Graph (, )][DBLP]


  79. A New Approach for Anonymous Password Authentication. [Citation Graph (, )][DBLP]


  80. Practical ID-based encryption for wireless sensor network. [Citation Graph (, )][DBLP]


  81. A New Formal Proof Model for RFID Location Privacy. [Citation Graph (, )][DBLP]


  82. Short Generic Transformation to Strongly Unforgeable Signature in the Standard Model. [Citation Graph (, )][DBLP]


  83. Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  84. Online/Offline Ring Signature Scheme. [Citation Graph (, )][DBLP]


  85. Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing. [Citation Graph (, )][DBLP]


  86. Certificate-Based Signature Schemes without Pairings or Random Oracles. [Citation Graph (, )][DBLP]


  87. Implementation and performance analysis for key divergent and evolution protocols in wireless sensor network. [Citation Graph (, )][DBLP]


  88. Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework). [Citation Graph (, )][DBLP]


  89. Efficient Certificate-Based Encryption in the Standard Model. [Citation Graph (, )][DBLP]


  90. Evaluating the Effects of Model Generalization on Intrusion Detection Performance. [Citation Graph (, )][DBLP]


  91. Realizing Stateful Public Key Encryption in Wireless Sensor Network. [Citation Graph (, )][DBLP]


  92. An Asynchronous Node Replication Attack in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  93. Using Certificate-based Binding Update Protocol to Hide the Movement of Mobile Nodes in MIPv6. [Citation Graph (, )][DBLP]


  94. Self-enforcing Private Inference Control. [Citation Graph (, )][DBLP]


  95. Certificate-based sequential aggregate signature. [Citation Graph (, )][DBLP]


  96. On the efficient implementation of fair non-repudiation. [Citation Graph (, )][DBLP]


  97. On the validity of digital signatures. [Citation Graph (, )][DBLP]


  98. Multiparty nonrepudiation: A survey. [Citation Graph (, )][DBLP]


Search in 0.032secs, Finished in 0.036secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002