2008 |
20 | EE | ZhenChao Zhu,
Yuqing Zhang,
Fengjiao Wang:
The Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure Version.
ProvSec 2008: 210-225 |
19 | EE | Fengjiao Wang,
Yuqing Zhang:
A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography.
Computer Communications 31(10): 2142-2149 (2008) |
18 | EE | Qixu Liu,
Yuqing Zhang:
TFTP vulnerability finding technique based on fuzzing.
Computer Communications 31(14): 3420-3426 (2008) |
2007 |
17 | EE | Yuqing Zhang,
Qun Wang,
Jianfeng Zou,
Xuezhi Tao,
Libin Zhang:
Research on User Applying Mode for Video Conference System.
SNPD (1) 2007: 537-542 |
2006 |
16 | EE | Yuqing Zhang,
Suping Jia:
Common Program Analysis of Two-Party Security Protocols Using SMV.
APWeb Workshops 2006: 923-930 |
2005 |
15 | EE | Yuqing Zhang,
Zhiling Wang,
Bo Yang:
The Running-Mode Analysis of Two-Party Optimistic Fair Exchange Protocols.
CIS (2) 2005: 137-142 |
14 | | Yuqing Zhang,
Zhiling Wang,
Jianyao Wu,
Qingkuan Dong:
Running-mode Analysis of the Lu-Smolka-SET protocol.
CSREA EEE 2005: 151-160 |
13 | | Yuqing Zhang,
Chunling Wang,
Shimin Wei:
Using SMV for Cryptographic Protocol Analysis: A Case Study.
FCS 2005: 150-153 |
12 | | Yuqing Zhang,
Tiejun Zhang:
The Analysis of Peer-to-Peer Network Security.
GCA 2005: 131-150 |
11 | EE | Dehua Zhang,
Yuqing Zhang,
Zhou Yiyu:
Research of Security Architecture for P2P Network Based on Trust Management System.
GCC 2005: 184-189 |
10 | EE | Hong Wang,
Yuqing Zhang,
Dengguo Feng:
Short Threshold Signature Schemes Without Random Oracles.
INDOCRYPT 2005: 297-310 |
9 | | Yuqing Zhang,
Xiuying Liu,
Bo Yang:
Running-mode Analysis of the SSL Protocol.
International Conference on Internet Computing 2005: 308-311 |
8 | EE | Yong Ma,
Bo Meng,
Yuqing Zhang:
Deep into the Framework for Different Coarse-grained P2P Computing Based on JXTA.
SKG 2005: 74 |
7 | | Yuqing Zhang,
Xiuying Liu,
Dengguo Feng:
An approach to the formal verification of the three-principal security protocols.
Security and Management 2005: 163-169 |
2004 |
6 | | Dehua Zhang,
Yuqing Zhang,
Zhou Yiyu:
SAP2P: A P2P Network Security Architecture Based on Trust Management System.
PDPTA 2004: 849-855 |
5 | EE | Yuqing Zhang,
Xiuying Liu:
An approach to the formal verification of the three-principal cryptographic protocols.
Operating Systems Review 38(1): 35-42 (2004) |
4 | EE | Yuqing Zhang,
Xiuying Liu:
Running-mode analysis of the Security Socket Layer protocol.
Operating Systems Review 38(2): 34-40 (2004) |
2003 |
3 | EE | Yuqing Zhang,
Dehua Zhang:
Authentication and Access Control in P2P Network.
GCC (1) 2003: 468-470 |
2001 |
2 | | Yuqing Zhang,
Chunling Wang,
Jianping Wu,
Xing Li:
Using SMV for Cryptographic Protocol Analysis: A Case Study.
Operating Systems Review 35(2): 43-50 (2001) |
1999 |
1 | | Yuqing Zhang,
Jihong Li,
Guozhen Xiao:
An Approach to the Formal Verification of the Two-Party Crypographic Protocols.
Operating Systems Review 33(4): 48-51 (1999) |