| 2008 |
| 20 | EE | ZhenChao Zhu,
Yuqing Zhang,
Fengjiao Wang:
The Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure Version.
ProvSec 2008: 210-225 |
| 19 | EE | Fengjiao Wang,
Yuqing Zhang:
A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography.
Computer Communications 31(10): 2142-2149 (2008) |
| 18 | EE | Qixu Liu,
Yuqing Zhang:
TFTP vulnerability finding technique based on fuzzing.
Computer Communications 31(14): 3420-3426 (2008) |
| 2007 |
| 17 | EE | Yuqing Zhang,
Qun Wang,
Jianfeng Zou,
Xuezhi Tao,
Libin Zhang:
Research on User Applying Mode for Video Conference System.
SNPD (1) 2007: 537-542 |
| 2006 |
| 16 | EE | Yuqing Zhang,
Suping Jia:
Common Program Analysis of Two-Party Security Protocols Using SMV.
APWeb Workshops 2006: 923-930 |
| 2005 |
| 15 | EE | Yuqing Zhang,
Zhiling Wang,
Bo Yang:
The Running-Mode Analysis of Two-Party Optimistic Fair Exchange Protocols.
CIS (2) 2005: 137-142 |
| 14 | | Yuqing Zhang,
Zhiling Wang,
Jianyao Wu,
Qingkuan Dong:
Running-mode Analysis of the Lu-Smolka-SET protocol.
CSREA EEE 2005: 151-160 |
| 13 | | Yuqing Zhang,
Chunling Wang,
Shimin Wei:
Using SMV for Cryptographic Protocol Analysis: A Case Study.
FCS 2005: 150-153 |
| 12 | | Yuqing Zhang,
Tiejun Zhang:
The Analysis of Peer-to-Peer Network Security.
GCA 2005: 131-150 |
| 11 | EE | Dehua Zhang,
Yuqing Zhang,
Zhou Yiyu:
Research of Security Architecture for P2P Network Based on Trust Management System.
GCC 2005: 184-189 |
| 10 | EE | Hong Wang,
Yuqing Zhang,
Dengguo Feng:
Short Threshold Signature Schemes Without Random Oracles.
INDOCRYPT 2005: 297-310 |
| 9 | | Yuqing Zhang,
Xiuying Liu,
Bo Yang:
Running-mode Analysis of the SSL Protocol.
International Conference on Internet Computing 2005: 308-311 |
| 8 | EE | Yong Ma,
Bo Meng,
Yuqing Zhang:
Deep into the Framework for Different Coarse-grained P2P Computing Based on JXTA.
SKG 2005: 74 |
| 7 | | Yuqing Zhang,
Xiuying Liu,
Dengguo Feng:
An approach to the formal verification of the three-principal security protocols.
Security and Management 2005: 163-169 |
| 2004 |
| 6 | | Dehua Zhang,
Yuqing Zhang,
Zhou Yiyu:
SAP2P: A P2P Network Security Architecture Based on Trust Management System.
PDPTA 2004: 849-855 |
| 5 | EE | Yuqing Zhang,
Xiuying Liu:
An approach to the formal verification of the three-principal cryptographic protocols.
Operating Systems Review 38(1): 35-42 (2004) |
| 4 | EE | Yuqing Zhang,
Xiuying Liu:
Running-mode analysis of the Security Socket Layer protocol.
Operating Systems Review 38(2): 34-40 (2004) |
| 2003 |
| 3 | EE | Yuqing Zhang,
Dehua Zhang:
Authentication and Access Control in P2P Network.
GCC (1) 2003: 468-470 |
| 2001 |
| 2 | | Yuqing Zhang,
Chunling Wang,
Jianping Wu,
Xing Li:
Using SMV for Cryptographic Protocol Analysis: A Case Study.
Operating Systems Review 35(2): 43-50 (2001) |
| 1999 |
| 1 | | Yuqing Zhang,
Jihong Li,
Guozhen Xiao:
An Approach to the Formal Verification of the Two-Party Crypographic Protocols.
Operating Systems Review 33(4): 48-51 (1999) |