dblp.uni-trier.dewww.uni-trier.de

Yuqing Zhang

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
20EEZhenChao Zhu, Yuqing Zhang, Fengjiao Wang: The Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure Version. ProvSec 2008: 210-225
19EEFengjiao Wang, Yuqing Zhang: A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography. Computer Communications 31(10): 2142-2149 (2008)
18EEQixu Liu, Yuqing Zhang: TFTP vulnerability finding technique based on fuzzing. Computer Communications 31(14): 3420-3426 (2008)
2007
17EEYuqing Zhang, Qun Wang, Jianfeng Zou, Xuezhi Tao, Libin Zhang: Research on User Applying Mode for Video Conference System. SNPD (1) 2007: 537-542
2006
16EEYuqing Zhang, Suping Jia: Common Program Analysis of Two-Party Security Protocols Using SMV. APWeb Workshops 2006: 923-930
2005
15EEYuqing Zhang, Zhiling Wang, Bo Yang: The Running-Mode Analysis of Two-Party Optimistic Fair Exchange Protocols. CIS (2) 2005: 137-142
14 Yuqing Zhang, Zhiling Wang, Jianyao Wu, Qingkuan Dong: Running-mode Analysis of the Lu-Smolka-SET protocol. CSREA EEE 2005: 151-160
13 Yuqing Zhang, Chunling Wang, Shimin Wei: Using SMV for Cryptographic Protocol Analysis: A Case Study. FCS 2005: 150-153
12 Yuqing Zhang, Tiejun Zhang: The Analysis of Peer-to-Peer Network Security. GCA 2005: 131-150
11EEDehua Zhang, Yuqing Zhang, Zhou Yiyu: Research of Security Architecture for P2P Network Based on Trust Management System. GCC 2005: 184-189
10EEHong Wang, Yuqing Zhang, Dengguo Feng: Short Threshold Signature Schemes Without Random Oracles. INDOCRYPT 2005: 297-310
9 Yuqing Zhang, Xiuying Liu, Bo Yang: Running-mode Analysis of the SSL Protocol. International Conference on Internet Computing 2005: 308-311
8EEYong Ma, Bo Meng, Yuqing Zhang: Deep into the Framework for Different Coarse-grained P2P Computing Based on JXTA. SKG 2005: 74
7 Yuqing Zhang, Xiuying Liu, Dengguo Feng: An approach to the formal verification of the three-principal security protocols. Security and Management 2005: 163-169
2004
6 Dehua Zhang, Yuqing Zhang, Zhou Yiyu: SAP2P: A P2P Network Security Architecture Based on Trust Management System. PDPTA 2004: 849-855
5EEYuqing Zhang, Xiuying Liu: An approach to the formal verification of the three-principal cryptographic protocols. Operating Systems Review 38(1): 35-42 (2004)
4EEYuqing Zhang, Xiuying Liu: Running-mode analysis of the Security Socket Layer protocol. Operating Systems Review 38(2): 34-40 (2004)
2003
3EEYuqing Zhang, Dehua Zhang: Authentication and Access Control in P2P Network. GCC (1) 2003: 468-470
2001
2 Yuqing Zhang, Chunling Wang, Jianping Wu, Xing Li: Using SMV for Cryptographic Protocol Analysis: A Case Study. Operating Systems Review 35(2): 43-50 (2001)
1999
1 Yuqing Zhang, Jihong Li, Guozhen Xiao: An Approach to the Formal Verification of the Two-Party Crypographic Protocols. Operating Systems Review 33(4): 48-51 (1999)

Coauthor Index

1Qingkuan Dong [14]
2Dengguo Feng [7] [10]
3Suping Jia [16]
4Jihong Li [1]
5Xing Li [2]
6Qixu Liu [18]
7Xiuying Liu [4] [5] [7] [9]
8Yong Ma [8]
9Bo Meng [8]
10Xuezhi Tao [17]
11Chunling Wang [2] [13]
12Fengjiao Wang [19] [20]
13Hong Wang [10]
14Qun Wang [17]
15Zhiling Wang [14] [15]
16Shimin Wei [13]
17Jianping Wu [2]
18Jianyao Wu [14]
19Guozhen Xiao [1]
20Bo Yang [9] [15]
21Zhou Yiyu [6] [11]
22Dehua Zhang [3] [6] [11]
23Libin Zhang [17]
24Tiejun Zhang [12]
25ZhenChao Zhu [20]
26Jianfeng Zou [17]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)