The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Yuqing Zhang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yuqing Zhang, Suping Jia
    Common Program Analysis of Two-Party Security Protocols Using SMV. [Citation Graph (0, 0)][DBLP]
    APWeb Workshops, 2006, pp:923-930 [Conf]
  2. Yuqing Zhang, Zhiling Wang, Bo Yang
    The Running-Mode Analysis of Two-Party Optimistic Fair Exchange Protocols. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:137-142 [Conf]
  3. Yuqing Zhang, Zhiling Wang, Jianyao Wu, Qingkuan Dong
    Running-mode Analysis of the Lu-Smolka-SET protocol. [Citation Graph (0, 0)][DBLP]
    CSREA EEE, 2005, pp:151-160 [Conf]
  4. Yuqing Zhang, Xiuying Liu, Dengguo Feng
    An approach to the formal verification of the three-principal security protocols. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:163-169 [Conf]
  5. Yuqing Zhang, Chunling Wang, Shimin Wei
    Using SMV for Cryptographic Protocol Analysis: A Case Study. [Citation Graph (0, 0)][DBLP]
    FCS, 2005, pp:150-153 [Conf]
  6. Yuqing Zhang, Tiejun Zhang
    The Analysis of Peer-to-Peer Network Security. [Citation Graph (0, 0)][DBLP]
    GCA, 2005, pp:131-150 [Conf]
  7. Yuqing Zhang, Dehua Zhang
    Authentication and Access Control in P2P Network. [Citation Graph (0, 0)][DBLP]
    GCC (1), 2003, pp:468-470 [Conf]
  8. Dehua Zhang, Yuqing Zhang, Zhou Yiyu
    Research of Security Architecture for P2P Network Based on Trust Management System. [Citation Graph (0, 0)][DBLP]
    GCC, 2005, pp:184-189 [Conf]
  9. Yuqing Zhang, Xiuying Liu, Bo Yang
    Running-mode Analysis of the SSL Protocol. [Citation Graph (0, 0)][DBLP]
    International Conference on Internet Computing, 2005, pp:308-311 [Conf]
  10. Hong Wang, Yuqing Zhang, Dengguo Feng
    Short Threshold Signature Schemes Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2005, pp:297-310 [Conf]
  11. Dehua Zhang, Yuqing Zhang, Zhou Yiyu
    SAP2P: A P2P Network Security Architecture Based on Trust Management System. [Citation Graph (0, 0)][DBLP]
    PDPTA, 2004, pp:849-855 [Conf]
  12. Yong Ma, Bo Meng, Yuqing Zhang
    Deep into the Framework for Different Coarse-grained P2P Computing Based on JXTA. [Citation Graph (0, 0)][DBLP]
    SKG, 2005, pp:74- [Conf]
  13. Yuqing Zhang, Xiuying Liu
    An approach to the formal verification of the three-principal cryptographic protocols. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2004, v:38, n:1, pp:35-42 [Journal]
  14. Yuqing Zhang, Xiuying Liu
    Running-mode analysis of the Security Socket Layer protocol. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2004, v:38, n:2, pp:34-40 [Journal]
  15. Yuqing Zhang, Jihong Li, Guozhen Xiao
    An Approach to the Formal Verification of the Two-Party Crypographic Protocols. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1999, v:33, n:4, pp:48-51 [Journal]
  16. Yuqing Zhang, Chunling Wang, Jianping Wu, Xing Li
    Using SMV for Cryptographic Protocol Analysis: A Case Study. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2001, v:35, n:2, pp:43-50 [Journal]

  17. A Provable Secure Key Management Program for Wireless Sensor Network. [Citation Graph (, )][DBLP]


  18. A New Provably Secure Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-Key Cryptography. [Citation Graph (, )][DBLP]


  19. Secure and Efficient Key Management Protocol in Ad Hoc Networks. [Citation Graph (, )][DBLP]


  20. Automatic Vulnerability Locating in Binary Patches. [Citation Graph (, )][DBLP]


  21. New ID-Based and Threshold Key Distribution Protocol in MANET Using a Multi-signcryption Scheme. [Citation Graph (, )][DBLP]


  22. An Integrated Approach to Worm Detection and Automatic Signature Generation. [Citation Graph (, )][DBLP]


  23. Eliminating Human Specification in Static Analysis. [Citation Graph (, )][DBLP]


  24. A Client-Based and Server-Enhanced Defense Mechanism for Cross-Site Request Forgery. [Citation Graph (, )][DBLP]


  25. Research on User Applying Mode for Video Conference System. [Citation Graph (, )][DBLP]


  26. The Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure Version. [Citation Graph (, )][DBLP]


  27. A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography. [Citation Graph (, )][DBLP]


  28. TFTP vulnerability finding technique based on fuzzing. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002