Jianying Zhou

According to our database1, Jianying Zhou authored at least 237 papers between 1996 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
A Novel Authenticated Key Agreement Protocol With Dynamic Credential for WSNs.
TOSN, 2019

HMAKE: Legacy-Compliant Multi-factor Authenticated Key Exchange from Historical Data.
IACR Cryptology ePrint Archive, 2019

SCADAWall: A CPI-enabled firewall model for SCADA security.
Computers & Security, 2019

SocialAuth: Designing Touch Behavioral Smartphone User Authentication Based on Social Networking Applications.
Proceedings of the ICT Systems Security and Privacy Protection, 2019

IBWH: An Intermittent Block Withholding Attack with Optimal Mining Reward Rate.
Proceedings of the Information Security - 22nd International Conference, 2019

Careful-Packing: A Practical and Scalable Anti-Tampering Software Protection enforced by Trusted Computing.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

Strong Leakage Resilient Encryption by Hiding Partial Ciphertext.
Proceedings of the Applied Cryptography and Network Security Workshops, 2019

Design of a FDIA Resilient Protection Scheme for Power Networks by Securing Minimal Sensor Set.
Proceedings of the Applied Cryptography and Network Security Workshops, 2019

A Modular Hybrid Learning Approach for Black-Box Security Testing of CPS.
Proceedings of the Applied Cryptography and Network Security, 2019

Zero Residual Attacks on Industrial Control Systems and Stateful Countermeasures.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

A Survey on Lightweight Authenticated Encryption and Challenges for Securing Industrial IoT.
Proceedings of the Security and Privacy Trends in the Industrial Internet of Things, 2019

2018
HealthDep: An Efficient and Secure Deduplication Scheme for Cloud-Assisted eHealth Systems.
IEEE Trans. Industrial Informatics, 2018

Magic Train: Design of Measurement Methods against Bandwidth Inflation Attacks.
IEEE Trans. Dependable Sec. Comput., 2018

Enhancing Trust Management for Wireless Intrusion Detection via Traffic Sampling in the Era of Big Data.
IEEE Access, 2018

CAN-FD-Sec: Improving Security of CAN-FD Protocol.
Proceedings of the Security and Safety Interplay of Intelligent Software Systems, 2018

Virtually Isolated Network: A Hybrid Network to Achieve High Level Security.
Proceedings of the Data and Applications Security and Privacy XXXII, 2018

SMuF: State Machine Based Mutational Fuzzing Framework for Internet of Things.
Proceedings of the Critical Information Infrastructures Security, 2018

NoisePrint: Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Finding Dependencies between Cyber-Physical Domains for Security Testing of Industrial Control Systems.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate sensors in CPS.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

ATG: An Attack Traffic Generation Tool for Security Testing of In-vehicle CAN Bus.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
A New Functional Encryption for Multidimensional Range Query.
IACR Cryptology ePrint Archive, 2017

Efficient outsourcing of secure k-nearest neighbour query over encrypted database.
Computers & Security, 2017

Mind the Gap: Security Analysis of Metro Platform Screen Door System.
Proceedings of the A Systems Approach to Cyber Security, 2017

A New Functional Encryption for Multidimensional Range Query (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017

On the Security of In-Vehicle Hybrid Network: Status and Challenges.
Proceedings of the Information Security Practice and Experience, 2017

A scheme for lightweight SCADA packet authentication.
Proceedings of the 23rd Asia-Pacific Conference on Communications, 2017

A Pilot Study of Multiple Password Interference Between Text and Map-Based Passwords.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
Complying with Security Requirements in Cloud Storage Systems.
JCP, 2016

Efficient Privacy-Preserving Charging Station Reservation System for Electric Vehicles.
Comput. J., 2016

Cyber and Physical Access Control in Legacy System Using Passwords.
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 2016

Directed Transitive Signature on Directed Tree.
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 2016

Lightweight Delegatable Proofs of Storage.
Proceedings of the Computer Security - ESORICS 2016, 2016

Scalable Two-Factor Authentication Using Historical Data.
Proceedings of the Computer Security - ESORICS 2016, 2016

Credential Wrapping: From Anonymous Password Authentication to Anonymous Biometric Authentication.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

TMGuard: A Touch Movement-Based Security Mechanism for Screen Unlock Patterns on Smartphones.
Proceedings of the Applied Cryptography and Network Security, 2016

Privacy-Preserving k-Nearest Neighbour Query on Outsourced Database.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
A Secure, Intelligent Electric Vehicle Ecosystem for Safe Integration With the Smart Grid.
IEEE Trans. Intelligent Transportation Systems, 2015

Toward Energy-Efficient Trust System Through Watchdog Optimization for WSNs.
IEEE Trans. Information Forensics and Security, 2015

Time-Bound Anonymous Authentication for Roaming Networks.
IEEE Trans. Information Forensics and Security, 2015

Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption.
IEEE Trans. Information Forensics and Security, 2015

Cross-layer design in wireless multi-hop networks: a bargaining game theoretic analysis.
Telecommunication Systems, 2015

k-Times Attribute-Based Anonymous Access Control for Cloud Computing.
IEEE Trans. Computers, 2015

Cost-Effective Authentic and Anonymous Data Sharing with Forward Security.
IEEE Trans. Computers, 2015

Security and privacy of electronic health information systems.
Int. J. Inf. Sec., 2015

Surveying the Development of Biometric User Authentication on Mobile Phones.
IEEE Communications Surveys and Tutorials, 2015

Leakage-resilient password entry: Challenges, design, and evaluation.
Computers & Security, 2015

A Forward-Secure Certificate-Based Signature Scheme.
Comput. J., 2015

On the Efficiency of Multi-party Contract Signing Protocols.
Proceedings of the Information Security - 18th International Conference, 2015

Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data.
Proceedings of the Computer Security - ESORICS 2015, 2015

2014
A New Payment System for Enhancing Location Privacy of Electric Vehicles.
IEEE Trans. Vehicular Technology, 2014

Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage.
IEEE Trans. Parallel Distrib. Syst., 2014

Linkable Ring Signature with Unconditional Anonymity.
IEEE Trans. Knowl. Data Eng., 2014

Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts.
Theor. Comput. Sci., 2014

Collaborative agglomerative document clustering with limited information disclosure.
Security and Communication Networks, 2014

Security in a completely interconnected world.
Security and Communication Networks, 2014

Protecting the internet of things.
Security and Communication Networks, 2014

Cyber-Physical Device Authentication for the Smart Grid Electric Vehicle Ecosystem.
IEEE Journal on Selected Areas in Communications, 2014

Lightweight and Privacy-Preserving Delegatable Proofs of Storage.
IACR Cryptology ePrint Archive, 2014

PPDCP-ABE: Privacy-Preserving Decentralized Cipher-Policy Attribute-Based Encryption.
IACR Cryptology ePrint Archive, 2014

New Insight to Preserve Online Survey Accuracy and Privacy in Big Data Era.
Proceedings of the Computer Security - ESORICS 2014, 2014

PPDCP-ABE: Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption.
Proceedings of the Computer Security - ESORICS 2014, 2014

On the security of cloud data storage and sharing.
Proceedings of the Second International Workshop on Security in Cloud Computing, 2014

Leakage Resilient Proofs of Ownership in Cloud Storage, Revisited.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
Realizing Fully Secure Unrestricted ID-Based Ring Signature in the Standard Model Based on HIBE.
IEEE Trans. Information Forensics and Security, 2013

Security Concerns in Popular Cloud Storage Services.
IEEE Pervasive Computing, 2013

How to achieve non-repudiation of origin with privacy protection in cloud computing.
J. Comput. Syst. Sci., 2013

An optimistic fair exchange protocol with active intermediaries.
Int. J. Inf. Sec., 2013

On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks.
IEEE Communications Surveys and Tutorials, 2013

On the features and challenges of security and privacy in distributed internet of things.
Computer Networks, 2013

On smart grid cybersecurity standardization: Issues of designing with NISTIR 7628.
IEEE Communications Magazine, 2013

Efficient Linkable and/or Threshold Ring Signature Without Random Oracles.
Comput. J., 2013

An Asynchronous Optimistic Protocol for Atomic Multi-Two-Party Contract Signing.
Comput. J., 2013

Comparing Mobile Privacy Protection through Cross-Platform Applications.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Achieving Revocable Fine-Grained Cryptographic Access Control over Cloud Data.
Proceedings of the Information Security, 16th International Conference, 2013

Self-blindable Credential: Towards Anonymous Entity Authentication Upon Resource Constrained Devices.
Proceedings of the Information Security, 16th International Conference, 2013

Designing leakage-resilient password entry on touchscreen mobile devices.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Weak leakage-resilient client-side deduplication of encrypted data in cloud storage.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Privacy-preserving smart metering with regional statistics and personal enquiry services.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Launching Generic Attacks on iOS with Approved Third-Party Applications.
Proceedings of the Applied Cryptography and Network Security, 2013

CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing.
Proceedings of the Applied Cryptography and Network Security, 2013

2012
Detecting node replication attacks in mobile sensor networks: theory and approaches.
Security and Communication Networks, 2012

Enhanced authentication for commercial video services.
Security and Communication Networks, 2012

Detecting node replication attacks in wireless sensor networks: A survey.
J. Network and Computer Applications, 2012

Message from the Guest Editors.
Int. J. Inf. Sec., 2012

A Survey on Privacy Frameworks for RFID Authentication.
IEICE Transactions, 2012

An Efficient and Secure Service Discovery Protocol for Ubiquitous Computing Environments.
IEICE Transactions, 2012

Forward Secure Attribute-Based Signatures.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

A Generic Approach for Providing Revocation Support in Secret Handshake.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Enhancing Location Privacy for Electric Vehicles (at the Right time).
Proceedings of the Computer Security - ESORICS 2012, 2012

Verifier-local revocation group signatures with time-bound keys.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

Dynamic Secure Cloud Storage with Provenance.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012

2011
A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems.
IEEE Trans. Parallel Distrib. Syst., 2011

Preserving Transparency and Accountability in Optimistic Fair Exchange of Digital Signatures.
IEEE Trans. Information Forensics and Security, 2011

Better security enforcement in trusted computing enabled heterogeneous wireless sensor networks.
Security and Communication Networks, 2011

Guest editors' preface.
Journal of Computer Security, 2011

Secure localization with attack detection in wireless sensor networks.
Int. J. Inf. Sec., 2011

Message from the Guest Editors.
Int. J. Inf. Sec., 2011

Secure SCADA framework for the protection of energy control systems.
Concurrency and Computation: Practice and Experience, 2011

Short and Efficient Certificate-Based Signature.
Proceedings of the NETWORKING 2011 Workshops - International IFIP TC 6 Workshops, PE-CRN, 2011

Applying Time-Bound Hierarchical Key Assignment in Wireless Sensor Networks.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

Forward Secure Ring Signature without Random Oracles.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

On Shortening Ciphertexts: New Constructions for Compact Public Key and Stateful Encryption Schemes.
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011

Threshold ring signature without random oracles.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Secure mobile subscription of sensor-encrypted data.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Identity-based online/offline key encapsulation and encryption.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Compact identity-based encryption without strong symmetric cipher.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Identity-Based Server-Aided Decryption.
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2010
Non-Repudiation.
Proceedings of the Handbook of Financial Cryptography and Security., 2010

Authentication and Key Establishment in Dynamic Wireless Sensor Networks.
Sensors, 2010

Efficient online/offline identity-based signature for wireless sensor network.
Int. J. Inf. Sec., 2010

Time-Bound Hierarchical Key Assignment: An Overview.
IEICE Transactions, 2010

Efficient Online/Offline Identity-Based Signature for Wireless Sensor Network.
IACR Cryptology ePrint Archive, 2010

An Agent-Mediated Fair Exchange Protocol.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

A Privacy-Preserving Secure Service Discovery Protocol for Ubiquitous Computing Environments.
Proceedings of the Public Key Infrastructures, Services and Applications, 2010

Short Generic Transformation to Strongly Unforgeable Signature in the Standard Model.
Proceedings of the Computer Security, 2010

Online/Offline Identity-Based Signcryption Revisited.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

Practical ID-based encryption for wireless sensor network.
Proceedings of the 5th ACM Symposium on Information, 2010

Towards practical anonymous password authentication.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
Secure Multi-Party Non-Repudiation Protocols and Applications
Advances in Information Security 43, Springer, ISBN: 978-0-387-75629-5, 2009

Fair and Secure Mobile Billing Systems.
Wireless Personal Communications, 2009

Distributed Noise Generation for Density Estimation Based Clustering without Trusted Third Party.
IEICE Transactions, 2009

Security and Correctness Analysis on Privacy-Preserving k-Means Clustering Schemes.
IEICE Transactions, 2009

Certificate-based sequential aggregate signature.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks.
Proceedings of the Security and Privacy in Communication Networks, 2009

Self-enforcing Private Inference Control.
Proceedings of the Provable Security, Third International Conference, 2009

Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing.
Proceedings of the Information Security Practice and Experience, 2009

Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

Online/Offline Ring Signature Scheme.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

Optionally Identifiable Private Handshakes.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009

A New Approach for Anonymous Password Authentication.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

An Efficient Identity-Based Online/Offline Encryption Scheme.
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009

A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack.
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009

Conditional Proxy Broadcast Re-Encryption.
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009

2008
Achieving evenhandedness in certified email system for contract signing.
Int. J. Inf. Sec., 2008

Multiparty nonrepudiation: A survey.
ACM Comput. Surv., 2008

Variable-length signatures for intrusion detection.
Comput. Syst. Sci. Eng., 2008

An Asynchronous Node Replication Attack in Wireless Sensor Networks.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

Realizing Stateful Public Key Encryption in Wireless Sensor Network.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

Efficient Certificate-Based Encryption in the Standard Model.
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008

Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework).
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008

Implementation and performance analysis for key divergent and evolution protocols in wireless sensor network.
Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2008

Certificate-Based Signature Schemes without Pairings or Random Oracles.
Proceedings of the Information Security, 11th International Conference, 2008

A New Formal Proof Model for RFID Location Privacy.
Proceedings of the Computer Security, 2008

Generic Constructions of Stateful Public Key Encryption and Their Applications.
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008

A New Scheme for Distributed Density Estimation based Privacy-Preserving Clustering.
Proceedings of the The Third International Conference on Availability, 2008

2007
Integration of non-repudiation services in mobile DRM scenarios.
Telecommunication Systems, 2007

An effective multi-layered defense framework against spam.
Inf. Sec. Techn. Report, 2007

A secure double auction protocol against false bids.
Decision Support Systems, 2007

A Mobile Firewall Framework - Design and Implementation.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Towards Automatic Assembly of Privacy-Preserved Intrusion Signatures.
Proceedings of the Trust, 2007

Evaluating the Effects of Model Generalization on Intrusion Detection Performance.
Proceedings of the New Approaches for Security, 2007

Two-Party Privacy-Preserving Agglomerative Document Clustering.
Proceedings of the Information Security Practice and Experience, 2007

Firewall for Dynamic IP Address in Mobile IPv6.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

DDoS Attack Detection Algorithms Based on Entropy Computing.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

Estimation of TTP Features in Non-repudiation Service.
Proceedings of the Computational Science and Its Applications, 2007

Undeniable Mobile Billing Schemes.
Proceedings of the Public Key Infrastructure, 2007

New constructions of fuzzy identity-based encryption.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

Privacy-Preserving Two-Party K-Means Clustering via Secure Approximation.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Cryptanalysis of Chu's DCT based watermarking scheme.
IEEE Trans. Multimedia, 2006

Preface.
Journal of Computer Security, 2006

Improved Double Auction Protocol based on a Hybrid Trust Model.
JCP, 2006

Preface.
Int. J. Inf. Sec., 2006

Minimizing TTP's involvement in signature validation.
Int. J. Inf. Sec., 2006

Protecting mobile-agent data collection against blocking attacks.
Computer Standards & Interfaces, 2006

Some common attacks against certified email protocols and the countermeasures.
Computer Communications, 2006

An anti-spam scheme using pre-challenges.
Computer Communications, 2006

Routing optimization security in mobile IPv6.
Computer Networks, 2006

Using Certificate-based Binding Update Protocol to Hide the Movement of Mobile Nodes in MIPv6.
Proceedings of the 63rd IEEE Vehicular Technology Conference, 2006

Pervasive Trusted Computing.
Proceedings of the Second International Workshop on Security, 2006

A Synchronous Multi-Party Contract Signing Protocol Improving Lower Bound of Steps.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

Diverging Keys in Wireless Sensor Networks.
Proceedings of the Information Security, 9th International Conference, 2006

Finding Compact Reliable Broadcast in Unknown Fixed-Identity Networks (Short Paper).
Proceedings of the Information and Communications Security, 8th International Conference, 2006

The Fairness of Perfect Concurrent Signatures.
Proceedings of the Information and Communications Security, 8th International Conference, 2006

Enforcing Trust in Pervasive Computing with Trusted Computing Technology.
Proceedings of the Critical Information Infrastructures Security, 2006

2005
Optimized multi-party certified email protocols.
Inf. Manag. Comput. Security, 2005

Casual virtual private network.
Comput. Syst. Sci. Eng., 2005

An Improved Double Auction Protocol Against False Bids.
Proceedings of the Trust, 2005

Protection Against Spam Using Pre-Challenges.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

An Information Hiding Framework for Lightweight Mobile Devices with Digital Camera.
Proceedings of the Pattern Recognition and Machine Intelligence, 2005

An efficient certified e-mail scheme suitable for wireless mobile environments.
Proceedings of the IEEE 16th International Symposium on Personal, 2005

USAID: Unifying Signature-Based and Anomaly-Based Intrusion Detection.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2005

Security Analysis and Improvement of Return Routability Protocol.
Proceedings of the Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, 2005

An Authentication Protocol for Pervasive Computing.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

Attacking an Asynchronous Multi-party Contract Signing Protocol.
Proceedings of the Progress in Cryptology, 2005

Cryptanalysis of Barni et al. Watermarking Scheme.
Proceedings of the Progress in Cryptology, 2005

A Robust Double Auction Protocol Based on a Hybrid Trust Model.
Proceedings of the Information Systems Security, First International Conference, 2005

Authenticating Query Results in Data Publishing.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

An Evenhanded Certified Email System for Contract Signing.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

On the Security of a Certified E-Mail Scheme with Temporal Authentication.
Proceedings of the Computational Science and Its Applications, 2005

On the Security of Wireless Sensor Networks.
Proceedings of the Computational Science and Its Applications, 2005

Model Generalization and Its Implications on Intrusion Detection.
Proceedings of the Applied Cryptography and Network Security, 2005

2004
Comments on "A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem".
IEEE Trans. Knowl. Data Eng., 2004

Comments on a Threshold Proxy Signature Scheme Based on the RSA Cryptosystem.
IACR Cryptology ePrint Archive, 2004

Agent-mediated non-repudiation protocols.
Electronic Commerce Research and Applications, 2004

Non-repudiation protocols for multiple entities.
Computer Communications, 2004

Analysis of a Free Roaming Agent Result-Truncation Defense Scheme.
Proceedings of the 2004 IEEE International Conference on E-Commerce Technology (CEC 2004), 2004

Protecting all traffic channels in mobile IPv6 network.
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004

On the Security of the Lee-Hwang Group-Oriented Undeniable Signature Schemes.
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004

Mobile personal firewall.
Proceedings of the IEEE 15th International Symposium on Personal, 2004

Cryptanalysis of a Wavelet Based Watermarking Scheme.
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004

On the Security of a Certified E-Mail Scheme.
Proceedings of the Progress in Cryptology, 2004

On the Security of a Multi-party Certified Email Protocol.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

Timeout Estimation Using a Simulation Model for Non-repudiation Protocols.
Proceedings of the Computational Science and Its Applications, 2004

Analysis and Improvement of Micali's Fair Contract Signing Protocol.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

2003
Intermediary Non-repudiation Protocols.
Proceedings of the 2003 IEEE International Conference on Electronic Commerce (CEC 2003), 2003

A Multi-Party Non-Repudiation Protocol for Exchange of Different Messages.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

Validating Digital Signatures without TTP's Time-Stamping and Certificate Revocation.
Proceedings of the Information Security, 6th International Conference, 2003

Security Analysis of Some Proxy Signatures.
Proceedings of the Information Security and Cryptology, 2003

An Efficient Public-Key Framework.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

Security Remarks on a Group Signature Scheme with Member Deletion.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

Practical Service Charge for P2P Content Distribution.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

Efficient Signature Validation Based on a New PKI.
Proceedings of the E-Commerce and Web Technologies, 4th International Conference, 2003

FlexiCert: Merging X.509 Identity Certificates and Attribute Certificates.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

2002
Cryptanalysis of the Lee-Hwang Group-Oriented Undeniable Signature Schemes.
IACR Cryptology ePrint Archive, 2002

An intensive survey of fair non-repudiation protocols.
Computer Communications, 2002

Non-Repudiation in Electronic Commerce.
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002

An Electronic Payment Scheme Allowing Special Rates for Anonymous Regular Customers.
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002

Defending against redirect attacks in mobile IP.
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002

Maintaining the Validity of Digital Signatures in B2B Applications.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002

2001
Achieving Fair Nonrepudiation in Electronic Transactions.
J. Org. Computing and E. Commerce, 2001

Playing Lottery on the Internet.
Proceedings of the Information and Communications Security, Third International Conference, 2001

2000
Further analysis of the Internet key exchange protocol.
Computer Communications, 2000

On the validity of digital signatures.
Computer Communication Review, 2000

Electronic Payment Systems with Fair On-line Verification.
Proceedings of the Information Security for Global Information Infrastructures, 2000

Some Remarks on a Fair Exchange Protocol.
Proceedings of the Public Key Cryptography, 2000

1999
Securing digital signatures for non-repudiation.
Computer Communications, 1999

Computer Security; D. Gollmann.
Computer Communications, 1999

A Secure Pay-per View Scheme for Web-Based Video Service.
Proceedings of the Public Key Cryptography, 1999

Evolution of Fair Non-repudiation with TTP.
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999

1998
On the efficient implementation of fair non-repudiation.
Computer Communication Review, 1998

Undeniable Billing in Mobile Communication.
Proceedings of the MOBICOM '98, 1998

1997
Non-repudiation.
PhD thesis, 1997

An Efficient Non-repudiation Protocol .
Proceedings of the 10th Computer Security Foundations Workshop (CSFW '97), 1997

1996
A Fair Non-repudiation Protocol.
Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996

Certified Electronic Mail.
Proceedings of the Computer Security, 1996

Observations on Non-repudiation.
Proceedings of the Advances in Cryptology, 1996


  Loading...