dblp.uni-trier.dewww.uni-trier.de

Jianying Zhou

List of publications from the DBLP Bibliography Server - FAQ

other persons with the same name:


Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
99EEYanjiang Yang, Robert H. Deng, Jianying Zhou, Ying Qiu: Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing. ISPEC 2009: 384-395
98EEJoseph K. Liu, Joonsang Baek, Jianying Zhou: Certificate-based sequential aggregate signature. WISEC 2009: 21-28
2008
97EEJoonsang Baek, Jianying Zhou, Feng Bao: Generic Constructions of Stateful Public Key Encryption and Their Applications. ACNS 2008: 75-93
96EEChunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai: A New Scheme for Distributed Density Estimation based Privacy-Preserving Clustering. ARES 2008: 112-119
95EEJungHoon Ha, Sang-Jae Moon, Jianying Zhou, JaeCheol Ha: A New Formal Proof Model for RFID Location Privacy. ESORICS 2008: 267-281
94EEJoseph K. Liu, Joonsang Baek, Willy Susilo, Jianying Zhou: Certificate-Based Signature Schemes without Pairings or Random Oracles. ISC 2008: 285-297
93EEJoseph K. Liu, Jianying Zhou: Efficient Certificate-Based Encryption in the Standard Model. SCN 2008: 144-155
92EEJoonsang Baek, David Galindo, Willy Susilo, Jianying Zhou: Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework). SCN 2008: 358-374
91EEJianying Zhou, Tanmoy Kanti Das, Javier Lopez: An Asynchronous Node Replication Attack in Wireless Sensor Networks. SEC 2008: 125-139
90EEJoonsang Baek, Han Chiang Tan, Jianying Zhou, Jun Wen Wong: Realizing Stateful Public Key Encryption in Wireless Sensor Network. SEC 2008: 95-107
89EEJose Antonio Onieva, Jianying Zhou, Javier Lopez: Multiparty nonrepudiation: A survey. ACM Comput. Surv. 41(1): (2008)
88EEKenji Imamoto, Jianying Zhou, Kouichi Sakurai: Achieving evenhandedness in certified email system for contract signing. Int. J. Inf. Sec. 7(6): 383-394 (2008)
2007
87EEChunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai: Privacy-Preserving Two-Party K-Means Clustering via Secure Approximation. AINA Workshops (1) 2007: 385-391
86EEJoonsang Baek, Willy Susilo, Jianying Zhou: New constructions of fuzzy identity-based encryption. ASIACCS 2007: 368-370
85EEShiqun Li, Guilin Wang, Jianying Zhou, Kefei Chen: Undeniable Mobile Billing Schemes. EuroPKI 2007: 338-345
84EEMildrey Carbonell, José María Sierra, Jose Antonio Onieva, Javier Lopez, Jianying Zhou: Estimation of TTP Features in Non-repudiation Service. ICCSA (2) 2007: 549-558
83EELiying Li, Jianying Zhou, Ning Xiao: DDoS Attack Detection Algorithms Based on Entropy Computing. ICICS 2007: 452-466
82EEYing Qiu, Feng Bao, Jianying Zhou: Firewall for Dynamic IP Address in Mobile IPv6. ICICS 2007: 467-479
81EEChunhua Su, Jianying Zhou, Feng Bao, Tsuyoshi Takagi, Kouichi Sakurai: Two-Party Privacy-Preserving Agglomerative Document Clustering. ISPEC 2007: 193-208
80EEZhuowei Li, Amitabha Das, Jianying Zhou: Evaluating the Effects of Model Generalization on Intrusion Detection Performance. SEC 2007: 421-432
79EEZhuowei Li, Amitabha Das, Jianying Zhou: Towards Automatic Assembly of Privacy-Preserved Intrusion Signatures. TrustBus 2007: 54-64
78EEJungHoon Ha, Jianying Zhou, Sang-Jae Moon: A secure double auction protocol against false bids. Decision Support Systems 44(1): 147-158 (2007)
77EEJose Antonio Onieva, Javier Lopez, Rodrigo Roman, Jianying Zhou, Stefanos Gritzalis: Integration of non-repudiation services in mobile DRM scenarios. Telecommunication Systems 35(3-4): 161-176 (2007)
2006
76 Jianying Zhou, Moti Yung, Feng Bao: Applied Cryptography and Network Security, 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings ACNS 2006
75 Kefei Chen, Robert H. Deng, Xuejia Lai, Jianying Zhou: Information Security Practice and Experience, Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings Springer 2006
74EEShiqun Li, Shane Balfe, Jianying Zhou, Kefei Chen: Enforcing Trust in Pervasive Computing with Trusted Computing Technology. CRITIS 2006: 195-209
73EEGuilin Wang, Feng Bao, Jianying Zhou: The Fairness of Perfect Concurrent Signatures. ICICS 2006: 435-451
72EEHuafei Zhu, Jianying Zhou: Finding Compact Reliable Broadcast in Unknown Fixed-Identity Networks (Short Paper). ICICS 2006: 72-81
71EEMichal Ren, Tanmoy Kanti Das, Jianying Zhou: Diverging Keys in Wireless Sensor Networks. ISC 2006: 257-269
70EEJianying Zhou, Jose Antonio Onieva, Javier Lopez: A Synchronous Multi-Party Contract Signing Protocol Improving Lower Bound of Steps. SEC 2006: 221-232
69EEShane Balfe, Shiqun Li, Jianying Zhou: Pervasive Trusted Computing. SecPerU 2006: 88-94
68EEYing Qiu, Jianying Zhou, Feng Bao, Robert H. Deng: Using Certificate-based Binding Update Protocol to Hide the Movement of Mobile Nodes in MIPv6. VTC Spring 2006: 828-830
67EERodrigo Roman, Jianying Zhou, Javier Lopez: An anti-spam scheme using pre-challenges. Computer Communications 29(15): 2739-2749 (2006)
66EEMin-Hua Shao, Guilin Wang, Jianying Zhou: Some common attacks against certified email protocols and the countermeasures. Computer Communications 29(15): 2759-2769 (2006)
65EEKui Ren, Wenjing Lou, Kai Zeng, Feng Bao, Jianying Zhou, Robert H. Deng: Routing optimization security in mobile IPv6. Computer Networks 50(13): 2401-2419 (2006)
64EETanmoy Kanti Das, Subhamoy Maitra, Jianying Zhou: Cryptanalysis of Chu's DCT based watermarking scheme. IEEE Transactions on Multimedia 8(3): 629-632 (2006)
63EEJianying Zhou, Feng Bao, Robert H. Deng: Minimizing TTP's involvement in signature validation. Int. J. Inf. Sec. 5(1): 37-47 (2006)
62EEJianying Zhou, Javier Lopez: Preface. Int. J. Inf. Sec. 5(2): 65-66 (2006)
61EEJungHoon Ha, Jianying Zhou, Sang-Jae Moon: Improved Double Auction Protocol based on a Hybrid Trust Model. JCP 1(2): 33-41 (2006)
60EEJianying Zhou, Meng-Chow Kang: Preface. Journal of Computer Security 14(5): 389-390 (2006)
2005
59 Robert H. Deng, Feng Bao, HweeHwa Pang, Jianying Zhou: Information Security Practice and Experience, First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings Springer 2005
58 Jianying Zhou, Javier Lopez, Robert H. Deng, Feng Bao: Information Security, 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings Springer 2005
57EEZhuowei Li, Amitabha Das, Jianying Zhou: Model Generalization and Its Implications on Intrusion Detection. ACNS 2005: 222-237
56EERodrigo Roman, Jianying Zhou, Javier Lopez: On the Security of Wireless Sensor Networks. ICCSA (3) 2005: 681-690
55EEMin-Hua Shao, Jianying Zhou, Guilin Wang: On the Security of a Certified E-Mail Scheme with Temporal Authentication. ICCSA (3) 2005: 701-710
54EEKenji Imamoto, Jianying Zhou, Kouichi Sakurai: An Evenhanded Certified Email System for Contract Signing. ICICS 2005: 1-13
53EEDi Ma, Robert H. Deng, HweeHwa Pang, Jianying Zhou: Authenticating Query Results in Data Publishing. ICICS 2005: 376-388
52EEJungHoon Ha, Jianying Zhou, Sang-Jae Moon: A Robust Double Auction Protocol Based on a Hybrid Trust Model. ICISS 2005: 77-90
51EETanmoy Kanti Das, Jianying Zhou: Cryptanalysis of Barni et al. Watermarking Scheme. INDOCRYPT 2005: 197-208
50EEJose Antonio Onieva, Jianying Zhou, Javier Lopez: Attacking an Asynchronous Multi-party Contract Signing Protocol. INDOCRYPT 2005: 311-321
49EEShiqun Li, Jianying Zhou, Xiangxue Li, Kefei Chen: An Authentication Protocol for Pervasive Computing. ISPA 2005: 553-563
48EEYing Qiu, Jianying Zhou, Robert H. Deng: Security Analysis and Improvement of Return Routability Protocol. MADNES 2005: 174-181
47EEZhuowei Li, Amitabha Das, Jianying Zhou: USAID: Unifying Signature-Based and Anomaly-Based Intrusion Detection. PAKDD 2005: 702-712
46EESubhamoy Maitra, Tanmoy Kanti Das, Jianying Zhou: An Information Hiding Framework for Lightweight Mobile Devices with Digital Camera. PReMI 2005: 491-496
45 Rodrigo Roman, Jianying Zhou, Javier Lopez: Protection Against Spam Using Pre-Challenges. SEC 2005: 281-294
44EEJungHoon Ha, Jianying Zhou, Sang-Jae Moon: An Improved Double Auction Protocol Against False Bids. TrustBus 2005: 274-287
43 Rodrigo Roman, Javier Lopez, Jianying Zhou: Casual virtual private network. Comput. Syst. Sci. Eng. 20(3): (2005)
2004
42 Feng Bao, Robert H. Deng, Jianying Zhou: Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004 Springer 2004
41 Markus Jakobsson, Moti Yung, Jianying Zhou: Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings Springer 2004
40EEFeng Bao, Guilin Wang, Jianying Zhou, Huafei Zhu: Analysis and Improvement of Micali's Fair Contract Signing Protocol. ACISP 2004: 176-187
39EEJianying Zhou, Jose Antonio Onieva, Javier Lopez: Analysis of a Free Roaming Agent Result-Truncation Defense Scheme. CEC 2004: 221-226
38EEMildrey Carbonell, Jose Antonio Onieva, Javier Lopez, Deborah Galpert, Jianying Zhou: Timeout Estimation Using a Simulation Model for Non-repudiation Protocols. ICCSA (1) 2004: 903-914
37EEJianying Zhou: On the Security of a Multi-party Certified Email Protocol. ICICS 2004: 40-52
36EEGuilin Wang, Feng Bao, Jianying Zhou: On the Security of a Certified E-Mail Scheme. INDOCRYPT 2004: 48-60
35EETanmoy Kanti Das, Jianying Zhou, Subhamoy Maitra: Cryptanalysis of a Wavelet Based Watermarking Scheme. IWDW 2004: 192-203
34EEGuilin Wang, Jianying Zhou, Robert H. Deng: On the Security of the Lee-Hwang Group-Oriented Undeniable Signature Schemes. TrustBus 2004: 289-298
33EEJose Antonio Onieva, Jianying Zhou, Javier Lopez: Non-repudiation protocols for multiple entities. Computer Communications 27(16): 1608-1616 (2004)
32EEJose Antonio Onieva, Jianying Zhou, Javier Lopez, Mildrey Carbonell: Agent-mediated non-repudiation protocols. Electronic Commerce Research and Applications 3(2): 152-162 (2004)
31EEGuilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng: Comments on "A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem". IEEE Trans. Knowl. Data Eng. 16(10): 1309-1311 (2004)
2003
30 Sihan Qing, Dieter Gollmann, Jianying Zhou: Information and Communications Security, 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings Springer 2003
29 Jianying Zhou, Moti Yung, Yongfei Han: Applied Cryptography and Network Security, First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings Springer 2003
28EEJose Antonio Onieva, Jianying Zhou, Mildrey Carbonell, Javier Lopez: Intermediary Non-repudiation Protocols. CEC 2003: 207-214
27EEAnantharaman Lakshminarayanan, Jianying Zhou: FlexiCert: Merging X.509 Identity Certificates and Attribute Certificates. DEXA Workshops 2003: 489-493
26EEJianying Zhou: Efficient Signature Validation Based on a New PKI. EC-Web 2003: 94-103
25EEJose Antonio Onieva, Jianying Zhou, Javier Lopez: Practical Service Charge for P2P Content Distribution. ICICS 2003: 112-123
24EEGuilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng: Security Remarks on a Group Signature Scheme with Member Deletion. ICICS 2003: 72-83
23EEJianying Zhou, Feng Bao, Robert H. Deng: An Efficient Public-Key Framework. ICICS 2003: 88-99
22EEGuilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng: Security Analysis of Some Proxy Signatures. ICISC 2003: 305-319
21EEJianying Zhou, Feng Bao, Robert H. Deng: Validating Digital Signatures without TTP's Time-Stamping and Certificate Revocation. ISC 2003: 96-110
20 Jose Antonio Onieva, Jianying Zhou, Mildrey Carbonell, Javier Lopez: A Multi-Party Non-Repudiation Protocol for Exchange of Different Messages. SEC 2003: 37-48
2002
19 Robert H. Deng, Sihan Qing, Feng Bao, Jianying Zhou: Information and Communications Security, 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings Springer 2002
18EEJianying Zhou: Maintaining the Validity of Digital Signatures in B2B Applications. ACISP 2002: 303-315
17EERobert H. Deng, Jianying Zhou, Feng Bao: Defending against redirect attacks in mobile IP. ACM Conference on Computer and Communications Security 2002: 59-67
16EEChunfu Tan, Jianying Zhou: An Electronic Payment Scheme Allowing Special Rates for Anonymous Regular Customers. DEXA Workshops 2002: 428-434
15EESteve Kremer, Olivier Markowitch, Jianying Zhou: An intensive survey of fair non-repudiation protocols. Computer Communications 25(17): 1606-1621 (2002)
2001
14 Sihan Qing, Tatsuaki Okamoto, Jianying Zhou: Information and Communications Security, Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001 Springer 2001
13EEJianying Zhou, Chunfu Tan: Playing Lottery on the Internet. ICICS 2001: 189-201
2000
12 Jianying Zhou, Robert H. Deng, Feng Bao: Some Remarks on a Fair Exchange Protocol. Public Key Cryptography 2000: 46-57
11 Feng Bao, Robert H. Deng, Jianying Zhou: Electronic Payment Systems with Fair On-line Verification. SEC 2000: 451-460
10EEJianying Zhou: Further analysis of the Internet key exchange protocol. Computer Communications 23(17): 1606-1612 (2000)
1999
9EEJianying Zhou, Robert H. Deng, Feng Bao: Evolution of Fair Non-repudiation with TTP. ACISP 1999: 258-269
8EEJianying Zhou, Kwok-Yan Lam: A Secure Pay-per View Scheme for Web-Based Video Service. Public Key Cryptography 1999: 315-326
7EEJianying Zhou: Computer Security; D. Gollmann. Computer Communications 22(13): 1274-1275 (1999)
6EEJianying Zhou, Kwok-Yan Lam: Securing digital signatures for non-repudiation. Computer Communications 22(8): 710-716 (1999)
1998
5EEJianying Zhou, Kwok-Yan Lam: Undeniable Billing in Mobile Communication. MOBICOM 1998: 284-290
1997
4EEJianying Zhou, Dieter Gollmann: An Efficient Non-repudiation Protocol . CSFW 1997: 126-132
1996
3 Jianying Zhou, Dieter Gollmann: Observations on Non-repudiation. ASIACRYPT 1996: 133-144
2EEJianying Zhou, Dieter Gollmann: Certified Electronic Mail. ESORICS 1996: 160-171
1EEJianying Zhou, Dieter Gollmann: A Fair Non-repudiation Protocol. IEEE Symposium on Security and Privacy 1996: 55-61

Coauthor Index

1Joonsang Baek [86] [90] [92] [94] [97] [98]
2Shane Balfe [69] [74]
3Feng Bao [9] [11] [12] [17] [19] [21] [22] [23] [24] [31] [36] [40] [42] [58] [59] [63] [65] [68] [73] [76] [81] [82] [87] [96] [97]
4Mildrey Carbonell Castro (Mildrey Carbonell) [20] [28] [32] [38] [84]
5Kefei Chen [49] [74] [75] [85]
6Amitabha Das [47] [57] [79] [80]
7Tanmoy Kanti Das [35] [46] [51] [64] [71] [91]
8Robert H. Deng (Robert Huijie Deng) [9] [11] [12] [17] [19] [21] [22] [23] [24] [31] [34] [42] [48] [53] [58] [59] [63] [65] [68] [75] [99]
9David Galindo [92]
10Deborah Galpert [38]
11Dieter Gollmann [1] [2] [3] [4] [30]
12Stefanos Gritzalis [77]
13JaeCheol Ha (Jae-Cheol Ha) [95]
14JungHoon Ha [44] [52] [61] [78] [95]
15Yongfei Han [29]
16Kenji Imamoto [54] [88]
17Markus Jakobsson [41]
18Meng-Chow Kang [60]
19Steve Kremer [15]
20Xuejia Lai [75]
21Anantharaman Lakshminarayanan [27]
22Kwok-Yan Lam [5] [6] [8]
23Liying Li [83]
24Shiqun Li [49] [69] [74] [85]
25Xiangxue Li [49]
26Zhuowei Li [47] [57] [79] [80]
27Joseph K. Liu [93] [94] [98]
28Javier Lopez [20] [25] [28] [32] [33] [38] [39] [43] [45] [50] [56] [58] [62] [67] [70] [77] [84] [89] [91]
29Wenjing Lou [65]
30Di Ma [53]
31Subhamoy Maitra [35] [46] [64]
32Olivier Markowitch [15]
33Sang-Jae Moon [44] [52] [61] [78] [95]
34Tatsuaki Okamoto [14]
35Jose Antonio Onieva [20] [25] [28] [32] [33] [38] [39] [50] [70] [77] [84] [89]
36HweeHwa Pang [53] [59]
37Sihan Qing [14] [19] [30]
38Ying Qiu [48] [68] [82] [99]
39Kui Ren [65]
40Michal Ren [71]
41Rodrigo Roman [43] [45] [56] [67] [77]
42Kouichi Sakurai [54] [81] [87] [88] [96]
43Min-Hua Shao [55] [66]
44José María Sierra [84]
45Chunhua Su [81] [87] [96]
46Willy Susilo [86] [92] [94]
47Tsuyoshi Takagi [81] [87] [96]
48Chunfu Tan [13] [16]
49Han Chiang Tan [90]
50Guilin Wang [22] [24] [31] [34] [36] [40] [55] [66] [73] [85]
51Jun Wen Wong [90]
52Ning Xiao [83]
53Yanjiang Yang [99]
54Moti Yung (Mordechai M. Yung) [29] [41] [76]
55Kai Zeng [65]
56Huafei Zhu [40] [72]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)