|
Search the dblp DataBase
Jianying Zhou:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Feng Bao, Guilin Wang, Jianying Zhou, Huafei Zhu
Analysis and Improvement of Micali's Fair Contract Signing Protocol. [Citation Graph (0, 0)][DBLP] ACISP, 2004, pp:176-187 [Conf]
- Jianying Zhou
Maintaining the Validity of Digital Signatures in B2B Applications. [Citation Graph (0, 0)][DBLP] ACISP, 2002, pp:303-315 [Conf]
- Jianying Zhou, Robert H. Deng, Feng Bao
Evolution of Fair Non-repudiation with TTP. [Citation Graph (0, 0)][DBLP] ACISP, 1999, pp:258-269 [Conf]
- Zhuowei Li, Amitabha Das, Jianying Zhou
Model Generalization and Its Implications on Intrusion Detection. [Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:222-237 [Conf]
- Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai
Privacy-Preserving Two-Party K-Means Clustering via Secure Approximation. [Citation Graph (0, 0)][DBLP] AINA Workshops (1), 2007, pp:385-391 [Conf]
- Jianying Zhou, Dieter Gollmann
Observations on Non-repudiation. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1996, pp:133-144 [Conf]
- Robert H. Deng, Jianying Zhou, Feng Bao
Defending against redirect attacks in mobile IP. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2002, pp:59-67 [Conf]
- Joonsang Baek, Willy Susilo, Jianying Zhou
New constructions of fuzzy identity-based encryption. [Citation Graph (0, 0)][DBLP] ASIACCS, 2007, pp:368-370 [Conf]
- Jianying Zhou, Dieter Gollmann
An Efficient Non-repudiation Protocol . [Citation Graph (0, 0)][DBLP] CSFW, 1997, pp:126-132 [Conf]
- A. Lakshminarayanan, Jianying Zhou
FlexiCert: Merging X.509 Identity Certificates and Attribute Certificates. [Citation Graph (0, 0)][DBLP] DEXA Workshops, 2003, pp:489-493 [Conf]
- Chunfu Tan, Jianying Zhou
An Electronic Payment Scheme Allowing Special Rates for Anonymous Regular Customers. [Citation Graph (0, 0)][DBLP] DEXA Workshops, 2002, pp:428-434 [Conf]
- Jianying Zhou
Efficient Signature Validation Based on a New PKI. [Citation Graph (0, 0)][DBLP] EC-Web, 2003, pp:94-103 [Conf]
- Jianying Zhou, Dieter Gollmann
Certified Electronic Mail. [Citation Graph (0, 0)][DBLP] ESORICS, 1996, pp:160-171 [Conf]
- Mildrey Carbonell, Jose Antonio Onieva, Javier Lopez, Deborah Galpert, Jianying Zhou
Timeout Estimation Using a Simulation Model for Non-repudiation Protocols. [Citation Graph (0, 0)][DBLP] ICCSA (1), 2004, pp:903-914 [Conf]
- Rodrigo Roman, Jianying Zhou, Javier Lopez
On the Security of Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] ICCSA (3), 2005, pp:681-690 [Conf]
- Min-Hua Shao, Jianying Zhou, Guilin Wang
On the Security of a Certified E-Mail Scheme with Temporal Authentication. [Citation Graph (0, 0)][DBLP] ICCSA (3), 2005, pp:701-710 [Conf]
- Kenji Imamoto, Jianying Zhou, Kouichi Sakurai
An Evenhanded Certified Email System for Contract Signing. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:1-13 [Conf]
- Jose Antonio Onieva, Jianying Zhou, Javier Lopez
Practical Service Charge for P2P Content Distribution. [Citation Graph (0, 0)][DBLP] ICICS, 2003, pp:112-123 [Conf]
- Di Ma, Robert H. Deng, HweeHwa Pang, Jianying Zhou
Authenticating Query Results in Data Publishing. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:376-388 [Conf]
- Guilin Wang, Feng Bao, Jianying Zhou
The Fairness of Perfect Concurrent Signatures. [Citation Graph (0, 0)][DBLP] ICICS, 2006, pp:435-451 [Conf]
- Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng
Security Remarks on a Group Signature Scheme with Member Deletion. [Citation Graph (0, 0)][DBLP] ICICS, 2003, pp:72-83 [Conf]
- Jianying Zhou
On the Security of a Multi-party Certified Email Protocol. [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:40-52 [Conf]
- Jianying Zhou, Feng Bao, Robert H. Deng
An Efficient Public-Key Framework. [Citation Graph (0, 0)][DBLP] ICICS, 2003, pp:88-99 [Conf]
- Jianying Zhou, Chunfu Tan
Playing Lottery on the Internet. [Citation Graph (0, 0)][DBLP] ICICS, 2001, pp:189-201 [Conf]
- Huafei Zhu, Jianying Zhou
Finding Compact Reliable Broadcast in Unknown Fixed-Identity Networks (Short Paper). [Citation Graph (0, 0)][DBLP] ICICS, 2006, pp:72-81 [Conf]
- Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng
Security Analysis of Some Proxy Signatures. [Citation Graph (0, 0)][DBLP] ICISC, 2003, pp:305-319 [Conf]
- JungHoon Ha, Jianying Zhou, Sang-Jae Moon
A Robust Double Auction Protocol Based on a Hybrid Trust Model. [Citation Graph (0, 0)][DBLP] ICISS, 2005, pp:77-90 [Conf]
- Tanmoy Kanti Das, Jianying Zhou
Cryptanalysis of Barni et al. Watermarking Scheme. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2005, pp:197-208 [Conf]
- Jose Antonio Onieva, Jianying Zhou, Javier Lopez
Attacking an Asynchronous Multi-party Contract Signing Protocol. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2005, pp:311-321 [Conf]
- Guilin Wang, Feng Bao, Jianying Zhou
On the Security of a Certified E-Mail Scheme. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2004, pp:48-60 [Conf]
- Shiqun Li, Jianying Zhou, Xiangxue Li, Kefei Chen
An Authentication Protocol for Pervasive Computing. [Citation Graph (0, 0)][DBLP] ISPA, 2005, pp:553-563 [Conf]
- Chunhua Su, Jianying Zhou, Feng Bao, Tsuyoshi Takagi, Kouichi Sakurai
Two-Party Privacy-Preserving Agglomerative Document Clustering. [Citation Graph (0, 0)][DBLP] ISPEC, 2007, pp:193-208 [Conf]
- Michal Ren, Tanmoy Kanti Das, Jianying Zhou
Diverging Keys in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:257-269 [Conf]
- Jianying Zhou, Feng Bao, Robert H. Deng
Validating Digital Signatures without TTP's Time-Stamping and Certificate Revocation. [Citation Graph (0, 0)][DBLP] ISC, 2003, pp:96-110 [Conf]
- Tanmoy Kanti Das, Jianying Zhou, Subhamoy Maitra
Cryptanalysis of a Wavelet Based Watermarking Scheme. [Citation Graph (0, 0)][DBLP] IWDW, 2004, pp:192-203 [Conf]
- Ying Qiu, Jianying Zhou, Robert H. Deng
Security Analysis and Improvement of Return Routability Protocol. [Citation Graph (0, 0)][DBLP] MADNES, 2005, pp:174-181 [Conf]
- Jianying Zhou, Kwok-Yan Lam
Undeniable Billing in Mobile Communication. [Citation Graph (0, 0)][DBLP] MOBICOM, 1998, pp:284-290 [Conf]
- Zhuowei Li, Amitabha Das, Jianying Zhou
USAID: Unifying Signature-Based and Anomaly-Based Intrusion Detection. [Citation Graph (0, 0)][DBLP] PAKDD, 2005, pp:702-712 [Conf]
- Jianying Zhou, Robert H. Deng, Feng Bao
Some Remarks on a Fair Exchange Protocol. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2000, pp:46-57 [Conf]
- Jianying Zhou, Kwok-Yan Lam
A Secure Pay-per View Scheme for Web-Based Video Service. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1999, pp:315-326 [Conf]
- Subhamoy Maitra, Tanmoy Kanti Das, Jianying Zhou
An Information Hiding Framework for Lightweight Mobile Devices with Digital Camera. [Citation Graph (0, 0)][DBLP] PReMI, 2005, pp:491-496 [Conf]
- Feng Bao, Robert H. Deng, Jianying Zhou
Electronic Payment Systems with Fair On-line Verification. [Citation Graph (0, 0)][DBLP] SEC, 2000, pp:451-460 [Conf]
- Jose Antonio Onieva, Jianying Zhou, Mildrey Carbonell, Javier Lopez
A Multi-Party Non-Repudiation Protocol for Exchange of Different Messages. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:37-48 [Conf]
- Rodrigo Roman, Jianying Zhou, Javier Lopez
Protection Against Spam Using Pre-Challenges. [Citation Graph (0, 0)][DBLP] SEC, 2005, pp:281-294 [Conf]
- Jianying Zhou, Jose Antonio Onieva, Javier Lopez
A Synchronous Multi-Party Contract Signing Protocol Improving Lower Bound of Steps. [Citation Graph (0, 0)][DBLP] SEC, 2006, pp:221-232 [Conf]
- Shane Balfe, Shiqun Li, Jianying Zhou
Pervasive Trusted Computing. [Citation Graph (0, 0)][DBLP] SecPerU, 2006, pp:88-94 [Conf]
- Jianying Zhou, Dieter Gollmann
A Fair Non-repudiation Protocol. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1996, pp:55-61 [Conf]
- JungHoon Ha, Jianying Zhou, Sang-Jae Moon
An Improved Double Auction Protocol Against False Bids. [Citation Graph (0, 0)][DBLP] TrustBus, 2005, pp:274-287 [Conf]
- Guilin Wang, Jianying Zhou, Robert H. Deng
On the Security of the Lee-Hwang Group-Oriented Undeniable Signature Schemes. [Citation Graph (0, 0)][DBLP] TrustBus, 2004, pp:289-298 [Conf]
- Jose Antonio Onieva, Jianying Zhou, Mildrey Carbonell, Javier Lopez
Intermediary Non-repudiation Protocols. [Citation Graph (0, 0)][DBLP] CEC, 2003, pp:207-214 [Conf]
- Jianying Zhou, Jose Antonio Onieva, Javier Lopez
Analysis of a Free Roaming Agent Result-Truncation Defense Scheme. [Citation Graph (0, 0)][DBLP] CEC, 2004, pp:221-226 [Conf]
- Shiqun Li, Shane Balfe, Jianying Zhou, Kefei Chen
Enforcing Trust in Pervasive Computing with Trusted Computing Technology. [Citation Graph (0, 0)][DBLP] CRITIS, 2006, pp:195-209 [Conf]
- Kui Ren, Wenjing Lou, Kai Zeng, Feng Bao, Jianying Zhou, Robert H. Deng
Routing optimization security in mobile IPv6. [Citation Graph (0, 0)][DBLP] Computer Networks, 2006, v:50, n:13, pp:2401-2419 [Journal]
- Steve Kremer, Olivier Markowitch, Jianying Zhou
An intensive survey of fair non-repudiation protocols. [Citation Graph (0, 0)][DBLP] Computer Communications, 2002, v:25, n:17, pp:1606-1621 [Journal]
- Jose Antonio Onieva, Jianying Zhou, Javier Lopez
Non-repudiation protocols for multiple entities. [Citation Graph (0, 0)][DBLP] Computer Communications, 2004, v:27, n:16, pp:1608-1616 [Journal]
- Jianying Zhou
Computer Security; D. Gollmann. [Citation Graph (0, 0)][DBLP] Computer Communications, 1999, v:22, n:13, pp:1274-1275 [Journal]
- Jianying Zhou, Kwok-Yan Lam
Securing digital signatures for non-repudiation. [Citation Graph (0, 0)][DBLP] Computer Communications, 1999, v:22, n:8, pp:710-716 [Journal]
- Jianying Zhou
Further analysis of the Internet key exchange protocol. [Citation Graph (0, 0)][DBLP] Computer Communications, 2000, v:23, n:17, pp:1606-1612 [Journal]
- Rodrigo Roman, Jianying Zhou, Javier Lopez
An anti-spam scheme using pre-challenges. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:15, pp:2739-2749 [Journal]
- Min-Hua Shao, Guilin Wang, Jianying Zhou
Some common attacks against certified email protocols and the countermeasures. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:15, pp:2759-2769 [Journal]
- Rodrigo Roman, Javier Lopez, Jianying Zhou
Casual virtual private network. [Citation Graph (0, 0)][DBLP] Comput. Syst. Sci. Eng., 2005, v:20, n:3, pp:- [Journal]
- Jose Antonio Onieva, Jianying Zhou, Javier Lopez, Mildrey Carbonell
Agent-mediated non-repudiation protocols. [Citation Graph (0, 0)][DBLP] Electronic Commerce Research and Applications, 2004, v:3, n:2, pp:152-162 [Journal]
- Jianying Zhou, Feng Bao, Robert H. Deng
Minimizing TTP's involvement in signature validation. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2006, v:5, n:1, pp:37-47 [Journal]
- Jianying Zhou, Javier Lopez
Preface. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2006, v:5, n:2, pp:65-66 [Journal]
- Jianying Zhou, Meng-Chow Kang
Preface. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2006, v:14, n:5, pp:389-390 [Journal]
- Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng
Comments on "A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem". [Citation Graph (0, 0)][DBLP] IEEE Trans. Knowl. Data Eng., 2004, v:16, n:10, pp:1309-1311 [Journal]
- Tanmoy Kanti Das, Subhamoy Maitra, Jianying Zhou
Cryptanalysis of Chu's DCT based watermarking scheme. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Multimedia, 2006, v:8, n:3, pp:629-632 [Journal]
- Shiqun Li, Guilin Wang, Jianying Zhou, Kefei Chen
Undeniable Mobile Billing Schemes. [Citation Graph (0, 0)][DBLP] EuroPKI, 2007, pp:338-345 [Conf]
- Mildrey Carbonell, José María Sierra, Jose Antonio Onieva, Javier Lopez, Jianying Zhou
Estimation of TTP Features in Non-repudiation Service. [Citation Graph (0, 0)][DBLP] ICCSA (2), 2007, pp:549-558 [Conf]
- Liying Li, Jianying Zhou, Ning Xiao
DDoS Attack Detection Algorithms Based on Entropy Computing. [Citation Graph (0, 0)][DBLP] ICICS, 2007, pp:452-466 [Conf]
- Ying Qiu, Feng Bao, Jianying Zhou
Firewall for Dynamic IP Address in Mobile IPv6. [Citation Graph (0, 0)][DBLP] ICICS, 2007, pp:467-479 [Conf]
- Zhuowei Li, Amitabha Das, Jianying Zhou
Towards Automatic Assembly of Privacy-Preserved Intrusion Signatures. [Citation Graph (0, 0)][DBLP] TrustBus, 2007, pp:54-64 [Conf]
- JungHoon Ha, Jianying Zhou, Sang-Jae Moon
A secure double auction protocol against false bids. [Citation Graph (0, 0)][DBLP] Decision Support Systems, 2007, v:44, n:1, pp:147-158 [Journal]
A New Scheme for Distributed Density Estimation based Privacy-Preserving Clustering. [Citation Graph (, )][DBLP]
Conditional Proxy Broadcast Re-Encryption. [Citation Graph (, )][DBLP]
Generic Constructions of Stateful Public Key Encryption and Their Applications. [Citation Graph (, )][DBLP]
A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack. [Citation Graph (, )][DBLP]
An Efficient Identity-Based Online/Offline Encryption Scheme. [Citation Graph (, )][DBLP]
A New Approach for Anonymous Password Authentication. [Citation Graph (, )][DBLP]
Practical ID-based encryption for wireless sensor network. [Citation Graph (, )][DBLP]
A New Formal Proof Model for RFID Location Privacy. [Citation Graph (, )][DBLP]
Short Generic Transformation to Strongly Unforgeable Signature in the Standard Model. [Citation Graph (, )][DBLP]
Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks. [Citation Graph (, )][DBLP]
Online/Offline Ring Signature Scheme. [Citation Graph (, )][DBLP]
Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing. [Citation Graph (, )][DBLP]
Certificate-Based Signature Schemes without Pairings or Random Oracles. [Citation Graph (, )][DBLP]
Implementation and performance analysis for key divergent and evolution protocols in wireless sensor network. [Citation Graph (, )][DBLP]
Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework). [Citation Graph (, )][DBLP]
Efficient Certificate-Based Encryption in the Standard Model. [Citation Graph (, )][DBLP]
Evaluating the Effects of Model Generalization on Intrusion Detection Performance. [Citation Graph (, )][DBLP]
Realizing Stateful Public Key Encryption in Wireless Sensor Network. [Citation Graph (, )][DBLP]
An Asynchronous Node Replication Attack in Wireless Sensor Networks. [Citation Graph (, )][DBLP]
Using Certificate-based Binding Update Protocol to Hide the Movement of Mobile Nodes in MIPv6. [Citation Graph (, )][DBLP]
Self-enforcing Private Inference Control. [Citation Graph (, )][DBLP]
Certificate-based sequential aggregate signature. [Citation Graph (, )][DBLP]
On the efficient implementation of fair non-repudiation. [Citation Graph (, )][DBLP]
On the validity of digital signatures. [Citation Graph (, )][DBLP]
Multiparty nonrepudiation: A survey. [Citation Graph (, )][DBLP]
Search in 0.032secs, Finished in 0.036secs
|