Jiangshan Yu (于江山)
Title
Cited by
Cited by
Year
Security analysis of a single sign-on mechanism for distributed computer networks
G Wang, J Yu, Q Xie
IEEE Transactions on Industrial Informatics 9 (1), 294-302, 2012
782012
An Efficient Generic Framework for Three-Factor Authentication with Provably Secure Instantiation
J Yu, G Wang, Y Mu, W Gao
IEEE Transactions on Information Forensics and Security 9 (12), 2302-2313, 2014
582014
DTKI: A New Formalized PKI with Verifiable Trusted Parties
J Yu, V Cheval, M Ryan
The Computer Journal 59 (11), 1695-1713, 2016
49*2016
RepuCoin: Your Reputation is Your Power
J Yu, D Kozhaya, J Decouchant, P Esteves-Verissimo
IEEE Transactions on Computers, 2019
262019
Provably secure single sign-on scheme in distributed systems and networks
J Yu, G Wang, Y Mu
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
252012
DECIM: Detecting endpoint compromise in messaging
J Yu, M Ryan, C Cremers
IEEE Transactions on Information Forensics and Security, 2017
17*2017
The KISS principle in Software-Defined Networking: a framework for secure communications
D Kreutz, J Yu, P Esteves-Verissimo, C Magalhaes, FMV Ramos
IEEE Security & Privacy 16 (5), 60-70, 2018
15*2018
New empirical traceability analysis of CryptoNote-style blockchains
Z Yu, MH Au, J Yu, R Yang, Q Xu, WF Lau
International Conference on Financial Cryptography and Data Security, 133-149, 2019
132019
ANCHOR: Logically centralized security for software-defined networks
D Kreutz, J Yu, FMV Ramos, P Esteves-Verissimo
ACM Transactions on Privacy and Security (TOPS) 22 (2), 1-36, 2019
102019
Deconstructing blockchains: A comprehensive survey on consensus, membership and structure
C Natoli, J Yu, V Gramoli, P Esteves-Verissimo
arXiv preprint arXiv:1908.08316, 2019
92019
Evaluating web PKIs
J Yu, M Ryan
Software Architecture for Big Data and the Cloud, 105-126, 2017
92017
Security analysis methods on Ethereum smart contract vulnerabilities: a survey
P Praitheeshan, L Pan, J Yu, J Liu, R Doss
arXiv preprint arXiv:1908.08605, 2019
72019
Automatically detecting the misuse of secrets: Foundations, design principles, and applications
K Milner, C Cremers, J Yu, M Ryan
2017 IEEE 30th Computer Security Foundations Symposium (CSF), 203-216, 2017
62017
Re-thinking untraceability in the CryptoNote-style blockchain
J Yu, MHA Au, P Esteves-Verissimo
32nd IEEE Computer Security Foundations Symposium 2019, 2019
52019
Towards Fair and Privacy-Preserving Federated Deep Models
L Lyu, J Yu, K Nandakumar, Y Li, X Ma, J Jin, H Yu, KS Ng
IEEE Transactions on Parallel and Distributed Systems 31 (11), 2524-2541, 2020
4*2020
Proof-of-QoS: QoS based blockchain consensus protocol
B Yu, J Liu, S Nepal, J Yu, P Rimba
Computers & Security 87, 101580, 2019
42019
On the unforkability of monero
DA Wijaya, JK Liu, R Steinfeld, D Liu, J Yu
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
42019
Exploring the Monero Peer-to-Peer Network
T Cao, J Yu, J Decouchant, X Luo, P Verissimo
Financial Cryptography and Data Security 2020, Sabah, 10-14 February 2020, 2020
32020
On the optionality and fairness of Atomic Swaps
R Han, H Lin, J Yu
Proceedings of the 1st ACM Conference on Advances in Financial Technologies …, 2019
32019
Device attacker models: fact and fiction
J Yu, M Ryan
Security Protocols XXIII, 158-167, 2015
32015
The system can't perform the operation now. Try again later.
Articles 1–20