Jianying Zhou
Title
Cited by
Cited by
Year
On the features and challenges of security and privacy in distributed internet of things
R Roman, J Zhou, J Lopez
Computer Networks 57 (10), 2266-2279, 2013
8722013
A fair non-repudiation protocol
J Zhou, D Gollmann
IEEE S&P'96, 55-61, 1996
6411996
An intensive survey of fair non-repudiation protocols
S Kremer, O Markowitch, J Zhou
Computer Communications 25 (17), 1606-1621, 2002
3842002
Key-aggregate cryptosystem for scalable data sharing in cloud storage
CK Chu, SSM Chow, WG Tzeng, J Zhou, RH Deng
IEEE Transactions on Parallel and Distributed Systems 25 (2), 468-477, 2014
3642014
Applying intrusion detection systems to wireless sensor networks
R Roman, J Zhou, J Lopez
IEEE CCNC'06, 640-644, 2006
3042006
An efficient non-repudiation protocol
J Zhou, D Gollmann
IEEE CSFW'97, 126-132, 1997
2281997
Weak leakage-resilient client-side deduplication of encrypted data in cloud storage
J Xu, EC Chang, J Zhou
ACM AsiaCCS'13, 195-206, 2013
2192013
A generic framework for three-factor authentication: Preserving security and privacy in distributed systems
X Huang, Y Xiang, A Chonka, J Zhou, RH Deng
IEEE Transactions on Parallel and Distributed Systems 22 (8), 1390-1397, 2011
2022011
On the vital areas of intrusion detection systems in wireless sensor networks
A Abduvaliyev, A Pathan, J Zhou, R Roman, W Wong
IEEE Communications Surveys & Tutorials, 1-15, 2013
1662013
Surveying the development of biometric user authentication on mobile phones
W Meng, D Wong, S Furnell, J Zhou
IEEE Communications Surveys & Tutorials 17 (3), 1268-1293, 2015
1632015
Dynamic secure cloud storage with provenance
SSM Chow, CK Chu, X Huang, J Zhou, RH Deng
Cryptography and security: From theory to applications, 442-464, 2012
1342012
Efficient online/offline identity-based signature for wireless sensor network
JK Liu, J Baek, J Zhou, Y Yang, JW Wong
International Journal of Information Security 9 (4), 287-296, 2010
1342010
Conditional proxy broadcast re-encryption
CK Chu, J Weng, S Chow, J Zhou, R Deng
ACISP'09, 327-342, 2009
1322009
Towards verification of non-repudiation protocols
J Zhou, D Gollmann
IRW'98, 370-380, 1998
1321998
Security analysis of some proxy signatures
G Wang, F Bao, J Zhou, RH Deng
ICISC'03, 305-319, 2003
1242003
Evidence and non-repudiation
J Zhou, D Gollmann
Journal of Network and Computer Applications 20, 267-282, 1997
1201997
Some remarks on a fair exchange protocol
J Zhou, R Deng, F Bao
PKC'00, 46-57, 2000
1172000
Cost-effective authentic and anonymous data sharing with forward security
X Huang, J Liu, S Tang, Y Xiang, K Liang, L Xu, J Zhou
IEEE Transactions on Computers 64 (4), 971-983, 2015
1142015
Wireless sensor network security
J Lopez, J Zhou
IOS Press, 2008
1102008
Evolution of fair non-repudiation with TTP
J Zhou, R Deng, F Bao
ACISP'99, 258-269, 1999
1091999
The system can't perform the operation now. Try again later.
Articles 1–20