Jianying Zhou
Title
Cited by
Cited by
Year
On the features and challenges of security and privacy in distributed internet of things
R Roman, J Zhou, J Lopez
Computer Networks 57 (10), 2266-2279, 2013
9412013
A fair non-repudiation protocol
J Zhou, D Gollmann
IEEE S&P'96, 55-61, 1996
6401996
An intensive survey of fair non-repudiation protocols
S Kremer, O Markowitch, J Zhou
Computer Communications 25 (17), 1606-1621, 2002
3852002
Key-aggregate cryptosystem for scalable data sharing in cloud storage
CK Chu, SSM Chow, WG Tzeng, J Zhou, RH Deng
IEEE Transactions on Parallel and Distributed Systems 25 (2), 468-477, 2014
3672014
Applying intrusion detection systems to wireless sensor networks
R Roman, J Zhou, J Lopez
IEEE CCNC'06, 640-644, 2006
3112006
An efficient non-repudiation protocol
J Zhou, D Gollmann
IEEE CSFW'97, 126-132, 1997
2281997
Weak leakage-resilient client-side deduplication of encrypted data in cloud storage
J Xu, EC Chang, J Zhou
ACM AsiaCCS'13, 195-206, 2013
2242013
A generic framework for three-factor authentication: Preserving security and privacy in distributed systems
X Huang, Y Xiang, A Chonka, J Zhou, RH Deng
IEEE Transactions on Parallel and Distributed Systems 22 (8), 1390-1397, 2011
2122011
Surveying the development of biometric user authentication on mobile phones
W Meng, D Wong, S Furnell, J Zhou
IEEE Communications Surveys & Tutorials 17 (3), 1268-1293, 2015
1792015
On the vital areas of intrusion detection systems in wireless sensor networks
A Abduvaliyev, A Pathan, J Zhou, R Roman, W Wong
IEEE Communications Surveys & Tutorials, 1-15, 2013
1722013
Efficient online/offline identity-based signature for wireless sensor network
JK Liu, J Baek, J Zhou, Y Yang, JW Wong
International Journal of Information Security 9 (4), 287-296, 2010
1402010
Conditional proxy broadcast re-encryption
CK Chu, J Weng, S Chow, J Zhou, R Deng
ACISP'09, 327-342, 2009
1402009
Dynamic secure cloud storage with provenance
SSM Chow, CK Chu, X Huang, J Zhou, RH Deng
Cryptography and security: From theory to applications, 442-464, 2012
1372012
Towards verification of non-repudiation protocols
J Zhou, D Gollmann
IRW'98, 370-380, 1998
1331998
Wireless sensor network security
J Lopez, J Zhou
IOS Press, 2008
1252008
Security analysis of some proxy signatures
G Wang, F Bao, J Zhou, RH Deng
ICISC'03, 305-319, 2003
1252003
Some remarks on a fair exchange protocol
J Zhou, R Deng, F Bao
PKC'00, 46-57, 2000
1192000
Cost-effective authentic and anonymous data sharing with forward security
X Huang, J Liu, S Tang, Y Xiang, K Liang, L Xu, J Zhou
IEEE Transactions on Computers 64 (4), 971-983, 2015
1182015
Evidence and non-repudiation
J Zhou, D Gollmann
Journal of Network and Computer Applications 20, 267-282, 1997
1181997
Improving privacy and security in decentralized ciphertext-policy attribute-based encryption
J Han, W Susilo, Y Mu, J Zhou, MHA Au
IEEE Transactions on Information Forensics and Security 10 (3), 665-678, 2015
1132015
The system can't perform the operation now. Try again later.
Articles 1–20