Yuan Zhou

Affiliations:
  • Network Emergency Response Technical Team/Coordination Center, China


According to our database1, Yuan Zhou authored at least 22 papers between 2008 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
An Incremental Malware Classification Approach Based on Few-Shot Learning.
Proceedings of the IEEE International Conference on Communications, 2022

2020
FProbe: Detecting Stealthy DGA-based Botnets by Group Activities Analysis.
Proceedings of the 39th IEEE International Performance Computing and Communications Conference, 2020

2017
基于Wine的Windows安全机制模拟及沙箱系统实现 (Windows Security Mechanisms Simulation and Sandbox System Implementation Based on Wine).
计算机科学, 2017

2016
Batch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix Computations.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Signcryption KEM/tag-KEM, revisited.
Secur. Commun. Networks, 2015

2014
Generating signatures with optimal overhead: practical paddings for signature schemes.
Secur. Commun. Networks, 2014

Notes on a group-oriented setting's multisigncryption scheme with threshold designcryption.
Inf. Sci., 2014

POSTER: Using Chinese Characters for Authentication-Algorithmic Framework and Empirical Results.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

POSTER: Arranging the Layout of Alphanumeric Buttons-the Role of Passwords.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard Model.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles.
Proceedings of the Applied Cryptography and Network Security, 2013

2012
Practical round-optimal blind signatures without random oracles or non-interactive zero-knowledge proofs.
Secur. Commun. Networks, 2012

Anonymous password-based key exchange with low resources consumption and better user-friendliness.
Secur. Commun. Networks, 2012

Pitfalls in identity based encryption using an elliptic curve combined public key.
Appl. Math. Lett., 2012

2011
Toward an Accurate Snapshot of DHT Networks.
IEEE Commun. Lett., 2011

Monitoring, analyzing and characterizing lookup traffic in a large-scale DHT.
Comput. Commun., 2011

Non-interactive CDH-Based Multisignature Scheme in the Plain Public Key Model with Tighter Security.
Proceedings of the Information Security, 14th International Conference, 2011

Efficient CDH-Based Verifiably Encrypted Signatures with Optimal Bandwidth in the Standard Model.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 10th International Conference, 2011

2010
Fully-Secure and Practical Sanitizable Signatures.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

2009
An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2009

Bilinear-pairings Based Designated-verifier Threshold Proxy Signature Scheme.
Proceedings of the 2009 International Conference on Security & Management, 2009

2008
Efficient public key encryption with smallest ciphertext expansion from factoring.
Des. Codes Cryptogr., 2008


  Loading...