![]() | ![]() |
other persons with the same name:
2009 | ||
---|---|---|
99 | EE | Yanjiang Yang, Robert H. Deng, Jianying Zhou, Ying Qiu: Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing. ISPEC 2009: 384-395 |
98 | EE | Joseph K. Liu, Joonsang Baek, Jianying Zhou: Certificate-based sequential aggregate signature. WISEC 2009: 21-28 |
2008 | ||
97 | EE | Joonsang Baek, Jianying Zhou, Feng Bao: Generic Constructions of Stateful Public Key Encryption and Their Applications. ACNS 2008: 75-93 |
96 | EE | Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai: A New Scheme for Distributed Density Estimation based Privacy-Preserving Clustering. ARES 2008: 112-119 |
95 | EE | JungHoon Ha, Sang-Jae Moon, Jianying Zhou, JaeCheol Ha: A New Formal Proof Model for RFID Location Privacy. ESORICS 2008: 267-281 |
94 | EE | Joseph K. Liu, Joonsang Baek, Willy Susilo, Jianying Zhou: Certificate-Based Signature Schemes without Pairings or Random Oracles. ISC 2008: 285-297 |
93 | EE | Joseph K. Liu, Jianying Zhou: Efficient Certificate-Based Encryption in the Standard Model. SCN 2008: 144-155 |
92 | EE | Joonsang Baek, David Galindo, Willy Susilo, Jianying Zhou: Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework). SCN 2008: 358-374 |
91 | EE | Jianying Zhou, Tanmoy Kanti Das, Javier Lopez: An Asynchronous Node Replication Attack in Wireless Sensor Networks. SEC 2008: 125-139 |
90 | EE | Joonsang Baek, Han Chiang Tan, Jianying Zhou, Jun Wen Wong: Realizing Stateful Public Key Encryption in Wireless Sensor Network. SEC 2008: 95-107 |
89 | EE | Jose Antonio Onieva, Jianying Zhou, Javier Lopez: Multiparty nonrepudiation: A survey. ACM Comput. Surv. 41(1): (2008) |
88 | EE | Kenji Imamoto, Jianying Zhou, Kouichi Sakurai: Achieving evenhandedness in certified email system for contract signing. Int. J. Inf. Sec. 7(6): 383-394 (2008) |
2007 | ||
87 | EE | Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai: Privacy-Preserving Two-Party K-Means Clustering via Secure Approximation. AINA Workshops (1) 2007: 385-391 |
86 | EE | Joonsang Baek, Willy Susilo, Jianying Zhou: New constructions of fuzzy identity-based encryption. ASIACCS 2007: 368-370 |
85 | EE | Shiqun Li, Guilin Wang, Jianying Zhou, Kefei Chen: Undeniable Mobile Billing Schemes. EuroPKI 2007: 338-345 |
84 | EE | Mildrey Carbonell, José María Sierra, Jose Antonio Onieva, Javier Lopez, Jianying Zhou: Estimation of TTP Features in Non-repudiation Service. ICCSA (2) 2007: 549-558 |
83 | EE | Liying Li, Jianying Zhou, Ning Xiao: DDoS Attack Detection Algorithms Based on Entropy Computing. ICICS 2007: 452-466 |
82 | EE | Ying Qiu, Feng Bao, Jianying Zhou: Firewall for Dynamic IP Address in Mobile IPv6. ICICS 2007: 467-479 |
81 | EE | Chunhua Su, Jianying Zhou, Feng Bao, Tsuyoshi Takagi, Kouichi Sakurai: Two-Party Privacy-Preserving Agglomerative Document Clustering. ISPEC 2007: 193-208 |
80 | EE | Zhuowei Li, Amitabha Das, Jianying Zhou: Evaluating the Effects of Model Generalization on Intrusion Detection Performance. SEC 2007: 421-432 |
79 | EE | Zhuowei Li, Amitabha Das, Jianying Zhou: Towards Automatic Assembly of Privacy-Preserved Intrusion Signatures. TrustBus 2007: 54-64 |
78 | EE | JungHoon Ha, Jianying Zhou, Sang-Jae Moon: A secure double auction protocol against false bids. Decision Support Systems 44(1): 147-158 (2007) |
77 | EE | Jose Antonio Onieva, Javier Lopez, Rodrigo Roman, Jianying Zhou, Stefanos Gritzalis: Integration of non-repudiation services in mobile DRM scenarios. Telecommunication Systems 35(3-4): 161-176 (2007) |
2006 | ||
76 | Jianying Zhou, Moti Yung, Feng Bao: Applied Cryptography and Network Security, 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings ACNS 2006 | |
75 | Kefei Chen, Robert H. Deng, Xuejia Lai, Jianying Zhou: Information Security Practice and Experience, Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings Springer 2006 | |
74 | EE | Shiqun Li, Shane Balfe, Jianying Zhou, Kefei Chen: Enforcing Trust in Pervasive Computing with Trusted Computing Technology. CRITIS 2006: 195-209 |
73 | EE | Guilin Wang, Feng Bao, Jianying Zhou: The Fairness of Perfect Concurrent Signatures. ICICS 2006: 435-451 |
72 | EE | Huafei Zhu, Jianying Zhou: Finding Compact Reliable Broadcast in Unknown Fixed-Identity Networks (Short Paper). ICICS 2006: 72-81 |
71 | EE | Michal Ren, Tanmoy Kanti Das, Jianying Zhou: Diverging Keys in Wireless Sensor Networks. ISC 2006: 257-269 |
70 | EE | Jianying Zhou, Jose Antonio Onieva, Javier Lopez: A Synchronous Multi-Party Contract Signing Protocol Improving Lower Bound of Steps. SEC 2006: 221-232 |
69 | EE | Shane Balfe, Shiqun Li, Jianying Zhou: Pervasive Trusted Computing. SecPerU 2006: 88-94 |
68 | EE | Ying Qiu, Jianying Zhou, Feng Bao, Robert H. Deng: Using Certificate-based Binding Update Protocol to Hide the Movement of Mobile Nodes in MIPv6. VTC Spring 2006: 828-830 |
67 | EE | Rodrigo Roman, Jianying Zhou, Javier Lopez: An anti-spam scheme using pre-challenges. Computer Communications 29(15): 2739-2749 (2006) |
66 | EE | Min-Hua Shao, Guilin Wang, Jianying Zhou: Some common attacks against certified email protocols and the countermeasures. Computer Communications 29(15): 2759-2769 (2006) |
65 | EE | Kui Ren, Wenjing Lou, Kai Zeng, Feng Bao, Jianying Zhou, Robert H. Deng: Routing optimization security in mobile IPv6. Computer Networks 50(13): 2401-2419 (2006) |
64 | EE | Tanmoy Kanti Das, Subhamoy Maitra, Jianying Zhou: Cryptanalysis of Chu's DCT based watermarking scheme. IEEE Transactions on Multimedia 8(3): 629-632 (2006) |
63 | EE | Jianying Zhou, Feng Bao, Robert H. Deng: Minimizing TTP's involvement in signature validation. Int. J. Inf. Sec. 5(1): 37-47 (2006) |
62 | EE | Jianying Zhou, Javier Lopez: Preface. Int. J. Inf. Sec. 5(2): 65-66 (2006) |
61 | EE | JungHoon Ha, Jianying Zhou, Sang-Jae Moon: Improved Double Auction Protocol based on a Hybrid Trust Model. JCP 1(2): 33-41 (2006) |
60 | EE | Jianying Zhou, Meng-Chow Kang: Preface. Journal of Computer Security 14(5): 389-390 (2006) |
2005 | ||
59 | Robert H. Deng, Feng Bao, HweeHwa Pang, Jianying Zhou: Information Security Practice and Experience, First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings Springer 2005 | |
58 | Jianying Zhou, Javier Lopez, Robert H. Deng, Feng Bao: Information Security, 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings Springer 2005 | |
57 | EE | Zhuowei Li, Amitabha Das, Jianying Zhou: Model Generalization and Its Implications on Intrusion Detection. ACNS 2005: 222-237 |
56 | EE | Rodrigo Roman, Jianying Zhou, Javier Lopez: On the Security of Wireless Sensor Networks. ICCSA (3) 2005: 681-690 |
55 | EE | Min-Hua Shao, Jianying Zhou, Guilin Wang: On the Security of a Certified E-Mail Scheme with Temporal Authentication. ICCSA (3) 2005: 701-710 |
54 | EE | Kenji Imamoto, Jianying Zhou, Kouichi Sakurai: An Evenhanded Certified Email System for Contract Signing. ICICS 2005: 1-13 |
53 | EE | Di Ma, Robert H. Deng, HweeHwa Pang, Jianying Zhou: Authenticating Query Results in Data Publishing. ICICS 2005: 376-388 |
52 | EE | JungHoon Ha, Jianying Zhou, Sang-Jae Moon: A Robust Double Auction Protocol Based on a Hybrid Trust Model. ICISS 2005: 77-90 |
51 | EE | Tanmoy Kanti Das, Jianying Zhou: Cryptanalysis of Barni et al. Watermarking Scheme. INDOCRYPT 2005: 197-208 |
50 | EE | Jose Antonio Onieva, Jianying Zhou, Javier Lopez: Attacking an Asynchronous Multi-party Contract Signing Protocol. INDOCRYPT 2005: 311-321 |
49 | EE | Shiqun Li, Jianying Zhou, Xiangxue Li, Kefei Chen: An Authentication Protocol for Pervasive Computing. ISPA 2005: 553-563 |
48 | EE | Ying Qiu, Jianying Zhou, Robert H. Deng: Security Analysis and Improvement of Return Routability Protocol. MADNES 2005: 174-181 |
47 | EE | Zhuowei Li, Amitabha Das, Jianying Zhou: USAID: Unifying Signature-Based and Anomaly-Based Intrusion Detection. PAKDD 2005: 702-712 |
46 | EE | Subhamoy Maitra, Tanmoy Kanti Das, Jianying Zhou: An Information Hiding Framework for Lightweight Mobile Devices with Digital Camera. PReMI 2005: 491-496 |
45 | Rodrigo Roman, Jianying Zhou, Javier Lopez: Protection Against Spam Using Pre-Challenges. SEC 2005: 281-294 | |
44 | EE | JungHoon Ha, Jianying Zhou, Sang-Jae Moon: An Improved Double Auction Protocol Against False Bids. TrustBus 2005: 274-287 |
43 | Rodrigo Roman, Javier Lopez, Jianying Zhou: Casual virtual private network. Comput. Syst. Sci. Eng. 20(3): (2005) | |
2004 | ||
42 | Feng Bao, Robert H. Deng, Jianying Zhou: Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004 Springer 2004 | |
41 | Markus Jakobsson, Moti Yung, Jianying Zhou: Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings Springer 2004 | |
40 | EE | Feng Bao, Guilin Wang, Jianying Zhou, Huafei Zhu: Analysis and Improvement of Micali's Fair Contract Signing Protocol. ACISP 2004: 176-187 |
39 | EE | Jianying Zhou, Jose Antonio Onieva, Javier Lopez: Analysis of a Free Roaming Agent Result-Truncation Defense Scheme. CEC 2004: 221-226 |
38 | EE | Mildrey Carbonell, Jose Antonio Onieva, Javier Lopez, Deborah Galpert, Jianying Zhou: Timeout Estimation Using a Simulation Model for Non-repudiation Protocols. ICCSA (1) 2004: 903-914 |
37 | EE | Jianying Zhou: On the Security of a Multi-party Certified Email Protocol. ICICS 2004: 40-52 |
36 | EE | Guilin Wang, Feng Bao, Jianying Zhou: On the Security of a Certified E-Mail Scheme. INDOCRYPT 2004: 48-60 |
35 | EE | Tanmoy Kanti Das, Jianying Zhou, Subhamoy Maitra: Cryptanalysis of a Wavelet Based Watermarking Scheme. IWDW 2004: 192-203 |
34 | EE | Guilin Wang, Jianying Zhou, Robert H. Deng: On the Security of the Lee-Hwang Group-Oriented Undeniable Signature Schemes. TrustBus 2004: 289-298 |
33 | EE | Jose Antonio Onieva, Jianying Zhou, Javier Lopez: Non-repudiation protocols for multiple entities. Computer Communications 27(16): 1608-1616 (2004) |
32 | EE | Jose Antonio Onieva, Jianying Zhou, Javier Lopez, Mildrey Carbonell: Agent-mediated non-repudiation protocols. Electronic Commerce Research and Applications 3(2): 152-162 (2004) |
31 | EE | Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng: Comments on "A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem". IEEE Trans. Knowl. Data Eng. 16(10): 1309-1311 (2004) |
2003 | ||
30 | Sihan Qing, Dieter Gollmann, Jianying Zhou: Information and Communications Security, 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings Springer 2003 | |
29 | Jianying Zhou, Moti Yung, Yongfei Han: Applied Cryptography and Network Security, First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings Springer 2003 | |
28 | EE | Jose Antonio Onieva, Jianying Zhou, Mildrey Carbonell, Javier Lopez: Intermediary Non-repudiation Protocols. CEC 2003: 207-214 |
27 | EE | Anantharaman Lakshminarayanan, Jianying Zhou: FlexiCert: Merging X.509 Identity Certificates and Attribute Certificates. DEXA Workshops 2003: 489-493 |
26 | EE | Jianying Zhou: Efficient Signature Validation Based on a New PKI. EC-Web 2003: 94-103 |
25 | EE | Jose Antonio Onieva, Jianying Zhou, Javier Lopez: Practical Service Charge for P2P Content Distribution. ICICS 2003: 112-123 |
24 | EE | Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng: Security Remarks on a Group Signature Scheme with Member Deletion. ICICS 2003: 72-83 |
23 | EE | Jianying Zhou, Feng Bao, Robert H. Deng: An Efficient Public-Key Framework. ICICS 2003: 88-99 |
22 | EE | Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng: Security Analysis of Some Proxy Signatures. ICISC 2003: 305-319 |
21 | EE | Jianying Zhou, Feng Bao, Robert H. Deng: Validating Digital Signatures without TTP's Time-Stamping and Certificate Revocation. ISC 2003: 96-110 |
20 | Jose Antonio Onieva, Jianying Zhou, Mildrey Carbonell, Javier Lopez: A Multi-Party Non-Repudiation Protocol for Exchange of Different Messages. SEC 2003: 37-48 | |
2002 | ||
19 | Robert H. Deng, Sihan Qing, Feng Bao, Jianying Zhou: Information and Communications Security, 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings Springer 2002 | |
18 | EE | Jianying Zhou: Maintaining the Validity of Digital Signatures in B2B Applications. ACISP 2002: 303-315 |
17 | EE | Robert H. Deng, Jianying Zhou, Feng Bao: Defending against redirect attacks in mobile IP. ACM Conference on Computer and Communications Security 2002: 59-67 |
16 | EE | Chunfu Tan, Jianying Zhou: An Electronic Payment Scheme Allowing Special Rates for Anonymous Regular Customers. DEXA Workshops 2002: 428-434 |
15 | EE | Steve Kremer, Olivier Markowitch, Jianying Zhou: An intensive survey of fair non-repudiation protocols. Computer Communications 25(17): 1606-1621 (2002) |
2001 | ||
14 | Sihan Qing, Tatsuaki Okamoto, Jianying Zhou: Information and Communications Security, Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001 Springer 2001 | |
13 | EE | Jianying Zhou, Chunfu Tan: Playing Lottery on the Internet. ICICS 2001: 189-201 |
2000 | ||
12 | Jianying Zhou, Robert H. Deng, Feng Bao: Some Remarks on a Fair Exchange Protocol. Public Key Cryptography 2000: 46-57 | |
11 | Feng Bao, Robert H. Deng, Jianying Zhou: Electronic Payment Systems with Fair On-line Verification. SEC 2000: 451-460 | |
10 | EE | Jianying Zhou: Further analysis of the Internet key exchange protocol. Computer Communications 23(17): 1606-1612 (2000) |
1999 | ||
9 | EE | Jianying Zhou, Robert H. Deng, Feng Bao: Evolution of Fair Non-repudiation with TTP. ACISP 1999: 258-269 |
8 | EE | Jianying Zhou, Kwok-Yan Lam: A Secure Pay-per View Scheme for Web-Based Video Service. Public Key Cryptography 1999: 315-326 |
7 | EE | Jianying Zhou: Computer Security; D. Gollmann. Computer Communications 22(13): 1274-1275 (1999) |
6 | EE | Jianying Zhou, Kwok-Yan Lam: Securing digital signatures for non-repudiation. Computer Communications 22(8): 710-716 (1999) |
1998 | ||
5 | EE | Jianying Zhou, Kwok-Yan Lam: Undeniable Billing in Mobile Communication. MOBICOM 1998: 284-290 |
1997 | ||
4 | EE | Jianying Zhou, Dieter Gollmann: An Efficient Non-repudiation Protocol . CSFW 1997: 126-132 |
1996 | ||
3 | Jianying Zhou, Dieter Gollmann: Observations on Non-repudiation. ASIACRYPT 1996: 133-144 | |
2 | EE | Jianying Zhou, Dieter Gollmann: Certified Electronic Mail. ESORICS 1996: 160-171 |
1 | EE | Jianying Zhou, Dieter Gollmann: A Fair Non-repudiation Protocol. IEEE Symposium on Security and Privacy 1996: 55-61 |