Dongyao Ji

According to our database1, Dongyao Ji authored at least 12 papers between 2001 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Enhanced TLS Handshake Authentication with Blockchain and Smart Contract (Short Paper).
Proceedings of the Advances in Information and Computer Security, 2017

2015
Comment on "Design and formal security evaluation of NeMHIP".
Comput. Secur., 2015

2014
A New Trust Chain Security Evaluation Model and Tool.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

2013
Formal Analysis of Dynamic Domain Establishment Protocol in Cloud Logging Service.
Proceedings of the Dependable Computing - 14th European Workshop, 2013

2012
Active Attacking Multicast Key Management Protocol Using Alloy.
Proceedings of the Abstract State Machines, Alloy, B, VDM, and Z, 2012

2010
Verifiable Attribute Based Encryption.
Int. J. Netw. Secur., 2010

Formal Verification of HMQV Using ASM-SPV.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

2008
Using SPIN to Detect Vulnerabilities in the AACS Drive-Host Authentication Protocol.
Proceedings of the Formal Techniques for Networked and Distributed Systems, 2008

2006
Efficient Anonymous Electronic Metering Scheme.
Proceedings of the Advances in Intelligent IT, 2006

Fault-tolerate Multiparty Electronic Contract Signing Protocol.
Proceedings of the Advances in Intelligent IT, 2006

2004
Oblivious Polynomial Evaluation.
J. Comput. Sci. Technol., 2004

2001
Comments on "An approach to the formal verification of the two-party cryptographic protocols" by Zhang, Li and Xiao.
ACM SIGOPS Oper. Syst. Rev., 2001


  Loading...