dblp.uni-trier.dewww.uni-trier.de

Jianying Zhou Vis

List of publications from the DBLP Bibliography Server - FAQ

other persons with the same name:


Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo
Home Page

*2009
105EECheng-Kang Chu, Jian Weng, Sherman S. M. Chow, Jianying Zhou, Robert H. Deng: Conditional Proxy Broadcast Re-Encryption. ACISP 2009: 327-342
104EEJoonsang Baek, Willy Susilo, Joseph K. Liu, Jianying Zhou: A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack. ACNS 2009: 143-155
103EEJoseph K. Liu, Jianying Zhou: An Efficient Identity-Based Online/Offline Encryption Scheme. ACNS 2009: 156-167
102EEYanjiang Yang, Robert H. Deng, Jianying Zhou, Ying Qiu: Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing. ISPEC 2009: 384-395
101EEJoseph K. Liu, Joonsang Baek, Jianying Zhou: Certificate-based sequential aggregate signature. WISEC 2009: 21-28
100EEChunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai: Security and Correctness Analysis on Privacy-Preserving k-Means Clustering Schemes. IEICE Transactions 92-A(4): 1246-1250 (2009)
2008
99EEJoonsang Baek, Jianying Zhou, Feng Bao: Generic Constructions of Stateful Public Key Encryption and Their Applications. ACNS 2008: 75-93
98EEChunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai: A New Scheme for Distributed Density Estimation based Privacy-Preserving Clustering. ARES 2008: 112-119
97EEJungHoon Ha, Sang-Jae Moon, Jianying Zhou, JaeCheol Ha: A New Formal Proof Model for RFID Location Privacy. ESORICS 2008: 267-281
96EEJoseph K. Liu, Joonsang Baek, Willy Susilo, Jianying Zhou: Certificate-Based Signature Schemes without Pairings or Random Oracles. ISC 2008: 285-297
95EEJoseph K. Liu, Jianying Zhou: Efficient Certificate-Based Encryption in the Standard Model. SCN 2008: 144-155
94EEJoonsang Baek, David Galindo, Willy Susilo, Jianying Zhou: Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework). SCN 2008: 358-374
93EEJianying Zhou, Tanmoy Kanti Das, Javier Lopez: An Asynchronous Node Replication Attack in Wireless Sensor Networks. SEC 2008: 125-139
92EEJoonsang Baek, Han Chiang Tan, Jianying Zhou, Jun Wen Wong: Realizing Stateful Public Key Encryption in Wireless Sensor Network. SEC 2008: 95-107
91EEJose Antonio Onieva, Jianying Zhou, Javier Lopez: Multiparty nonrepudiation: A survey. ACM Comput. Surv. 41(1): (2008)
90EEKenji Imamoto, Jianying Zhou, Kouichi Sakurai: Achieving evenhandedness in certified email system for contract signing. Int. J. Inf. Sec. 7(6): 383-394 (2008)
2007
89EEChunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai: Privacy-Preserving Two-Party K-Means Clustering via Secure Approximation. AINA Workshops (1) 2007: 385-391
88EEJoonsang Baek, Willy Susilo, Jianying Zhou: New constructions of fuzzy identity-based encryption. ASIACCS 2007: 368-370
87EEShiqun Li, Guilin Wang, Jianying Zhou, Kefei Chen: Undeniable Mobile Billing Schemes. EuroPKI 2007: 338-345
86EEMildrey Carbonell, José María Sierra, Jose Antonio Onieva, Javier Lopez, Jianying Zhou: Estimation of TTP Features in Non-repudiation Service. ICCSA (2) 2007: 549-558
85EELiying Li, Jianying Zhou, Ning Xiao: DDoS Attack Detection Algorithms Based on Entropy Computing. ICICS 2007: 452-466
84EEYing Qiu, Feng Bao, Jianying Zhou: Firewall for Dynamic IP Address in Mobile IPv6. ICICS 2007: 467-479
83EEChunhua Su, Jianying Zhou, Feng Bao, Tsuyoshi Takagi, Kouichi Sakurai: Two-Party Privacy-Preserving Agglomerative Document Clustering. ISPEC 2007: 193-208
82EEZhuowei Li, Amitabha Das, Jianying Zhou: Evaluating the Effects of Model Generalization on Intrusion Detection Performance. SEC 2007: 421-432
81EEZhuowei Li, Amitabha Das, Jianying Zhou: Towards Automatic Assembly of Privacy-Preserved Intrusion Signatures. TrustBus 2007: 54-64
80EEJungHoon Ha, Jianying Zhou, Sang-Jae Moon: A secure double auction protocol against false bids. Decision Support Systems 44(1): 147-158 (2007)
79EEJose Antonio Onieva, Javier Lopez, Rodrigo Roman, Jianying Zhou, Stefanos Gritzalis: Integration of non-repudiation services in mobile DRM scenarios. Telecommunication Systems 35(3-4): 161-176 (2007)
2006
78 Jianying Zhou, Moti Yung, Feng Bao: Applied Cryptography and Network Security, 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings ACNS 2006
77 Kefei Chen, Robert H. Deng, Xuejia Lai, Jianying Zhou: Information Security Practice and Experience, Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings Springer 2006
76EEShiqun Li, Shane Balfe, Jianying Zhou, Kefei Chen: Enforcing Trust in Pervasive Computing with Trusted Computing Technology. CRITIS 2006: 195-209
75EEGuilin Wang, Feng Bao, Jianying Zhou: The Fairness of Perfect Concurrent Signatures. ICICS 2006: 435-451
74EEHuafei Zhu, Jianying Zhou: Finding Compact Reliable Broadcast in Unknown Fixed-Identity Networks (Short Paper). ICICS 2006: 72-81
73EEMichal Ren, Tanmoy Kanti Das, Jianying Zhou: Diverging Keys in Wireless Sensor Networks. ISC 2006: 257-269
72EEJianying Zhou, Jose Antonio Onieva, Javier Lopez: A Synchronous Multi-Party Contract Signing Protocol Improving Lower Bound of Steps. SEC 2006: 221-232
71EEShane Balfe, Shiqun Li, Jianying Zhou: Pervasive Trusted Computing. SecPerU 2006: 88-94
70EEYing Qiu, Jianying Zhou, Feng Bao, Robert H. Deng: Using Certificate-based Binding Update Protocol to Hide the Movement of Mobile Nodes in MIPv6. VTC Spring 2006: 828-830
69EERodrigo Roman, Jianying Zhou, Javier Lopez: An anti-spam scheme using pre-challenges. Computer Communications 29(15): 2739-2749 (2006)
68EEMin-Hua Shao, Guilin Wang, Jianying Zhou: Some common attacks against certified email protocols and the countermeasures. Computer Communications 29(15): 2759-2769 (2006)
67EEKui Ren, Wenjing Lou, Kai Zeng, Feng Bao, Jianying Zhou, Robert H. Deng: Routing optimization security in mobile IPv6. Computer Networks 50(13): 2401-2419 (2006)
66EEMin-Hua Shao, Jianying Zhou: Protecting mobile-agent data collection against blocking attacks. Computer Standards & Interfaces 28(5): 600-611 (2006)
65EETanmoy Kanti Das, Subhamoy Maitra, Jianying Zhou: Cryptanalysis of Chu's DCT based watermarking scheme. IEEE Transactions on Multimedia 8(3): 629-632 (2006)
64EEJianying Zhou, Feng Bao, Robert H. Deng: Minimizing TTP's involvement in signature validation. Int. J. Inf. Sec. 5(1): 37-47 (2006)
63EEJianying Zhou, Javier Lopez: Preface. Int. J. Inf. Sec. 5(2): 65-66 (2006)
62EEJungHoon Ha, Jianying Zhou, Sang-Jae Moon: Improved Double Auction Protocol based on a Hybrid Trust Model. JCP 1(2): 33-41 (2006)
61EEJianying Zhou, Meng-Chow Kang: Preface. Journal of Computer Security 14(5): 389-390 (2006)
2005
60 Robert H. Deng, Feng Bao, HweeHwa Pang, Jianying Zhou: Information Security Practice and Experience, First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings Springer 2005
59 Jianying Zhou, Javier Lopez, Robert H. Deng, Feng Bao: Information Security, 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings Springer 2005
58EEZhuowei Li, Amitabha Das, Jianying Zhou: Model Generalization and Its Implications on Intrusion Detection. ACNS 2005: 222-237
57EERodrigo Roman, Jianying Zhou, Javier Lopez: On the Security of Wireless Sensor Networks. ICCSA (3) 2005: 681-690
56EEMin-Hua Shao, Jianying Zhou, Guilin Wang: On the Security of a Certified E-Mail Scheme with Temporal Authentication. ICCSA (3) 2005: 701-710
55EEKenji Imamoto, Jianying Zhou, Kouichi Sakurai: An Evenhanded Certified Email System for Contract Signing. ICICS 2005: 1-13
54EEDi Ma, Robert H. Deng, HweeHwa Pang, Jianying Zhou: Authenticating Query Results in Data Publishing. ICICS 2005: 376-388
53EEJungHoon Ha, Jianying Zhou, Sang-Jae Moon: A Robust Double Auction Protocol Based on a Hybrid Trust Model. ICISS 2005: 77-90
52EETanmoy Kanti Das, Jianying Zhou: Cryptanalysis of Barni et al. Watermarking Scheme. INDOCRYPT 2005: 197-208
51EEJose Antonio Onieva, Jianying Zhou, Javier Lopez: Attacking an Asynchronous Multi-party Contract Signing Protocol. INDOCRYPT 2005: 311-321
50EEShiqun Li, Jianying Zhou, Xiangxue Li, Kefei Chen: An Authentication Protocol for Pervasive Computing. ISPA 2005: 553-563
49EEYing Qiu, Jianying Zhou, Robert H. Deng: Security Analysis and Improvement of Return Routability Protocol. MADNES 2005: 174-181
48EEZhuowei Li, Amitabha Das, Jianying Zhou: USAID: Unifying Signature-Based and Anomaly-Based Intrusion Detection. PAKDD 2005: 702-712
47EESubhamoy Maitra, Tanmoy Kanti Das, Jianying Zhou: An Information Hiding Framework for Lightweight Mobile Devices with Digital Camera. PReMI 2005: 491-496
46 Rodrigo Roman, Jianying Zhou, Javier Lopez: Protection Against Spam Using Pre-Challenges. SEC 2005: 281-294
45EEJungHoon Ha, Jianying Zhou, Sang-Jae Moon: An Improved Double Auction Protocol Against False Bids. TrustBus 2005: 274-287
44 Rodrigo Roman, Javier Lopez, Jianying Zhou: Casual virtual private network. Comput. Syst. Sci. Eng. 20(3): (2005)
43EEJianying Zhou, Jose Antonio Onieva, Javier Lopez: Optimized multi-party certified email protocols. Inf. Manag. Comput. Security 13(5): 350-366 (2005)
2004
42 Feng Bao, Robert H. Deng, Jianying Zhou: Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004 Springer 2004
41 Markus Jakobsson, Moti Yung, Jianying Zhou: Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings Springer 2004
40EEFeng Bao, Guilin Wang, Jianying Zhou, Huafei Zhu: Analysis and Improvement of Micali's Fair Contract Signing Protocol. ACISP 2004: 176-187
39EEJianying Zhou, Jose Antonio Onieva, Javier Lopez: Analysis of a Free Roaming Agent Result-Truncation Defense Scheme. CEC 2004: 221-226
38EEMildrey Carbonell, Jose Antonio Onieva, Javier Lopez, Deborah Galpert, Jianying Zhou: Timeout Estimation Using a Simulation Model for Non-repudiation Protocols. ICCSA (1) 2004: 903-914
37EEJianying Zhou: On the Security of a Multi-party Certified Email Protocol. ICICS 2004: 40-52
36EEGuilin Wang, Feng Bao, Jianying Zhou: On the Security of a Certified E-Mail Scheme. INDOCRYPT 2004: 48-60
35EETanmoy Kanti Das, Jianying Zhou, Subhamoy Maitra: Cryptanalysis of a Wavelet Based Watermarking Scheme. IWDW 2004: 192-203
34EEGuilin Wang, Jianying Zhou, Robert H. Deng: On the Security of the Lee-Hwang Group-Oriented Undeniable Signature Schemes. TrustBus 2004: 289-298
33EEJose Antonio Onieva, Jianying Zhou, Javier Lopez: Non-repudiation protocols for multiple entities. Computer Communications 27(16): 1608-1616 (2004)
32EEJose Antonio Onieva, Jianying Zhou, Javier Lopez, Mildrey Carbonell: Agent-mediated non-repudiation protocols. Electronic Commerce Research and Applications 3(2): 152-162 (2004)
31EEGuilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng: Comments on "A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem". IEEE Trans. Knowl. Data Eng. 16(10): 1309-1311 (2004)
2003
30 Sihan Qing, Dieter Gollmann, Jianying Zhou: Information and Communications Security, 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings Springer 2003
29 Jianying Zhou, Moti Yung, Yongfei Han: Applied Cryptography and Network Security, First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings Springer 2003
28EEJose Antonio Onieva, Jianying Zhou, Mildrey Carbonell, Javier Lopez: Intermediary Non-repudiation Protocols. CEC 2003: 207-214
27EEAnantharaman Lakshminarayanan, Jianying Zhou: FlexiCert: Merging X.509 Identity Certificates and Attribute Certificates. DEXA Workshops 2003: 489-493
26EEJianying Zhou: Efficient Signature Validation Based on a New PKI. EC-Web 2003: 94-103
25EEJose Antonio Onieva, Jianying Zhou, Javier Lopez: Practical Service Charge for P2P Content Distribution. ICICS 2003: 112-123
24EEGuilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng: Security Remarks on a Group Signature Scheme with Member Deletion. ICICS 2003: 72-83
23EEJianying Zhou, Feng Bao, Robert H. Deng: An Efficient Public-Key Framework. ICICS 2003: 88-99
22EEGuilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng: Security Analysis of Some Proxy Signatures. ICISC 2003: 305-319
21EEJianying Zhou, Feng Bao, Robert H. Deng: Validating Digital Signatures without TTP's Time-Stamping and Certificate Revocation. ISC 2003: 96-110
20 Jose Antonio Onieva, Jianying Zhou, Mildrey Carbonell, Javier Lopez: A Multi-Party Non-Repudiation Protocol for Exchange of Different Messages. SEC 2003: 37-48
2002
19 Robert H. Deng, Sihan Qing, Feng Bao, Jianying Zhou: Information and Communications Security, 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings Springer 2002
18EEJianying Zhou: Maintaining the Validity of Digital Signatures in B2B Applications. ACISP 2002: 303-315
17EERobert H. Deng, Jianying Zhou, Feng Bao: Defending against redirect attacks in mobile IP. ACM Conference on Computer and Communications Security 2002: 59-67
16EEChunfu Tan, Jianying Zhou: An Electronic Payment Scheme Allowing Special Rates for Anonymous Regular Customers. DEXA Workshops 2002: 428-434
15EESteve Kremer, Olivier Markowitch, Jianying Zhou: An intensive survey of fair non-repudiation protocols. Computer Communications 25(17): 1606-1621 (2002)
2001
14 Sihan Qing, Tatsuaki Okamoto, Jianying Zhou: Information and Communications Security, Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001 Springer 2001
13EEJianying Zhou, Chunfu Tan: Playing Lottery on the Internet. ICICS 2001: 189-201
2000
12 Jianying Zhou, Robert H. Deng, Feng Bao: Some Remarks on a Fair Exchange Protocol. Public Key Cryptography 2000: 46-57
11 Feng Bao, Robert H. Deng, Jianying Zhou: Electronic Payment Systems with Fair On-line Verification. SEC 2000: 451-460
10EEJianying Zhou: Further analysis of the Internet key exchange protocol. Computer Communications 23(17): 1606-1612 (2000)
1999
9EEJianying Zhou, Robert H. Deng, Feng Bao: Evolution of Fair Non-repudiation with TTP. ACISP 1999: 258-269
8EEJianying Zhou, Kwok-Yan Lam: A Secure Pay-per View Scheme for Web-Based Video Service. Public Key Cryptography 1999: 315-326
7EEJianying Zhou: Computer Security; D. Gollmann. Computer Communications 22(13): 1274-1275 (1999)
6EEJianying Zhou, Kwok-Yan Lam: Securing digital signatures for non-repudiation. Computer Communications 22(8): 710-716 (1999)
1998
5EEJianying Zhou, Kwok-Yan Lam: Undeniable Billing in Mobile Communication. MOBICOM 1998: 284-290
1997
4EEJianying Zhou, Dieter Gollmann: An Efficient Non-repudiation Protocol . CSFW 1997: 126-132
1996
3EEJianying Zhou, Dieter Gollmann: Observations on Non-repudiation. ASIACRYPT 1996: 133-144
2EEJianying Zhou, Dieter Gollmann: Certified Electronic Mail. ESORICS 1996: 160-171
1EEJianying Zhou, Dieter Gollmann: A Fair Non-repudiation Protocol. IEEE Symposium on Security and Privacy 1996: 55-61

Coauthor Index

1Joonsang Baek [88] [92] [94] [96] [99] [101] [104]
2Shane Balfe [71] [76]
3Feng Bao [9] [11] [12] [17] [19] [21] [22] [23] [24] [31] [36] [40] [42] [59] [60] [64] [67] [70] [75] [78] [83] [84] [89] [98] [99] [100]
4Mildrey Carbonell Castro (Mildrey Carbonell) [20] [28] [32] [38] [86]
5Kefei Chen [50] [76] [77] [87]
6Sherman S. M. Chow [105]
7Cheng-Kang Chu [105]
8Amitabha Das [48] [58] [81] [82]
9Tanmoy Kanti Das [35] [47] [52] [65] [73] [93]
10Robert H. Deng (Robert Huijie Deng) [9] [11] [12] [17] [19] [21] [22] [23] [24] [31] [34] [42] [49] [54] [59] [60] [64] [67] [70] [77] [102] [105]
11David Galindo [94]
12Deborah Galpert [38]
13Dieter Gollmann [1] [2] [3] [4] [30]
14Stefanos Gritzalis [79]
15JaeCheol Ha (Jae-Cheol Ha) [97]
16JungHoon Ha [45] [53] [62] [80] [97]
17Yongfei Han [29]
18Kenji Imamoto [55] [90]
19Markus Jakobsson [41]
20Meng-Chow Kang [61]
21Steve Kremer [15]
22Xuejia Lai [77]
23Anantharaman Lakshminarayanan [27]
24Kwok-Yan Lam [5] [6] [8]
25Liying Li [85]
26Shiqun Li [50] [71] [76] [87]
27Xiangxue Li [50]
28Zhuowei Li [48] [58] [81] [82]
29Joseph K. Liu [95] [96] [101] [103] [104]
30Javier Lopez [20] [25] [28] [32] [33] [38] [39] [43] [44] [46] [51] [57] [59] [63] [69] [72] [79] [86] [91] [93]
31Wenjing Lou [67]
32Di Ma [54]
33Subhamoy Maitra [35] [47] [65]
34Olivier Markowitch [15]
35Sang-Jae Moon [45] [53] [62] [80] [97]
36Tatsuaki Okamoto [14]
37Jose Antonio Onieva [20] [25] [28] [32] [33] [38] [39] [43] [51] [72] [79] [86] [91]
38HweeHwa Pang [54] [60]
39Sihan Qing [14] [19] [30]
40Ying Qiu [49] [70] [84] [102]
41Kui Ren [67]
42Michal Ren [73]
43Rodrigo Roman [44] [46] [57] [69] [79]
44Kouichi Sakurai [55] [83] [89] [90] [98] [100]
45Min-Hua Shao [56] [66] [68]
46José María Sierra [86]
47Chunhua Su [83] [89] [98] [100]
48Willy Susilo [88] [94] [96] [104]
49Tsuyoshi Takagi [83] [89] [98] [100]
50Chunfu Tan [13] [16]
51Han Chiang Tan [92]
52Guilin Wang [22] [24] [31] [34] [36] [40] [56] [68] [75] [87]
53Jian Weng [105]
54Jun Wen Wong [92]
55Ning Xiao [85]
56Yanjiang Yang [102]
57Moti Yung (Mordechai M. Yung) [29] [41] [78]
58Kai Zeng [67]
59Huafei Zhu [40] [74]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)