Jianying Zhou
Cited by
Cited by
On the features and challenges of security and privacy in distributed internet of things
R Roman, J Zhou, J Lopez
Computer Networks 57 (10), 2266-2279, 2013
A fair non-repudiation protocol
J Zhou, D Gollmann
IEEE S&P'96, 55-61, 1996
Key-aggregate cryptosystem for scalable data sharing in cloud storage
CK Chu, SSM Chow, WG Tzeng, J Zhou, RH Deng
IEEE Transactions on Parallel and Distributed Systems 25 (2), 468-477, 2014
An intensive survey of fair non-repudiation protocols
S Kremer, O Markowitch, J Zhou
Computer Communications 25 (17), 1606-1621, 2002
Applying intrusion detection systems to wireless sensor networks
R Roman, J Zhou, J Lopez
IEEE CCNC'06, 640-644, 2006
Surveying the development of biometric user authentication on mobile phones
W Meng, D Wong, S Furnell, J Zhou
IEEE Communications Surveys & Tutorials 17 (3), 1268-1293, 2015
A generic framework for three-factor authentication: Preserving security and privacy in distributed systems
X Huang, Y Xiang, A Chonka, J Zhou, RH Deng
IEEE Transactions on Parallel and Distributed Systems 22 (8), 1390-1397, 2011
Weak leakage-resilient client-side deduplication of encrypted data in cloud storage
J Xu, EC Chang, J Zhou
ACM AsiaCCS'13, 195-206, 2013
On the vital areas of intrusion detection systems in wireless sensor networks
A Abduvaliyev, A Pathan, J Zhou, R Roman, W Wong
IEEE Communications Surveys & Tutorials 15 (3), 1223-1237, 2013
An efficient non-repudiation protocol
J Zhou, D Gollmann
IEEE CSFW'97, 126-132, 1997
HealthDep: An efficient and secure deduplication scheme for cloud-sssisted eHealth systems
Y Zhang, C Xu, H Li, K Yang, J Zhou, X Lin
IEEE Transactions on Industrial Informatics 14 (9), 4101-4112, 2018
Improving privacy and security in decentralized ciphertext-policy attribute-based encryption
J Han, W Susilo, Y Mu, J Zhou, MHA Au
IEEE Transactions on Information Forensics and Security 10 (3), 665-678, 2015
Conditional proxy broadcast re-encryption
CK Chu, J Weng, S Chow, J Zhou, R Deng
ACISP'09, 327-342, 2009
Efficient online/offline identity-based signature for wireless sensor network
JK Liu, J Baek, J Zhou, Y Yang, JW Wong
International Journal of Information Security 9 (4), 287-296, 2010
Cost-effective authentic and anonymous data sharing with forward security
X Huang, J Liu, S Tang, Y Xiang, K Liang, L Xu, J Zhou
IEEE Transactions on Computers 64 (4), 971-983, 2015
Dynamic secure cloud storage with provenance
SSM Chow, CK Chu, X Huang, J Zhou, RH Deng
Cryptography and Security: From Theory to Applications: Essays Dedicated to …, 2012
Robust multi-factor authentication for fragile communications
X Huang, Y Xiang, E Bertino, J Zhou, L Xu
IEEE Transactions on Dependable and Secure Computing 11 (6), 568-581, 2014
Towards verification of non-repudiation protocols
J Zhou, D Gollmann
IRW'98, 370-380, 1998
Some remarks on a fair exchange protocol
J Zhou, R Deng, F Bao
PKC'00, 46-57, 2000
Detecting node replication attacks in wireless sensor networks: a survey
WT Zhu, J Zhou, RH Deng, F Bao
Journal of Network and Computer Applications 35 (3), 1022-1034, 2012
The system can't perform the operation now. Try again later.
Articles 1–20