Jianying Zhou
TitleCited byYear
On the features and challenges of security and privacy in distributed internet of things
R Roman, J Zhou, J Lopez
Computer Networks 57 (10), 2266-2279, 2013
7822013
A fair non-repudiation protocol
J Zhou, D Gollmann
IEEE S&P'96, 55-61, 1996
6361996
An intensive survey of fair non-repudiation protocols
S Kremer, O Markowitch, J Zhou
Computer Communications 25 (17), 1606-1621, 2002
3772002
Key-aggregate cryptosystem for scalable data sharing in cloud storage
CK Chu, SSM Chow, WG Tzeng, J Zhou, RH Deng
IEEE Transactions on Parallel and Distributed Systems 25 (2), 468-477, 2014
3352014
Applying intrusion detection systems to wireless sensor networks
R Roman, J Zhou, J Lopez
IEEE CCNC'06, 640-644, 2006
2932006
An efficient non-repudiation protocol
J Zhou, D Gollmann
IEEE CSFW'97, 126-132, 1997
2241997
Weak leakage-resilient client-side deduplication of encrypted data in cloud storage
J Xu, EC Chang, J Zhou
ACM AsiaCCS'13, 195-206, 2013
2072013
A generic framework for three-factor authentication: Preserving security and privacy in distributed systems
X Huang, Y Xiang, A Chonka, J Zhou, RH Deng
IEEE Transactions on Parallel and Distributed Systems 22 (8), 1390-1397, 2011
1872011
On the vital areas of intrusion detection systems in wireless sensor networks
A Abduvaliyev, A Pathan, J Zhou, R Roman, W Wong
IEEE Communications Surveys & Tutorials, 1-15, 2013
1512013
Surveying the development of biometric user authentication on mobile phones
W Meng, D Wong, S Furnell, J Zhou
IEEE Communications Surveys & Tutorials 17 (3), 1268-1293, 2015
1482015
Towards verification of non-repudiation protocols
J Zhou, D Gollmann
IRW'98, 370-380, 1998
1341998
Conditional proxy broadcast re-encryption
CK Chu, J Weng, S Chow, J Zhou, R Deng
ACISP'09, 327-342, 2009
1282009
Security analysis of some proxy signatures
G Wang, F Bao, J Zhou, RH Deng
ICISC'03, 305-319, 2003
1252003
Efficient online/offline identity-based signature for wireless sensor network
JK Liu, J Baek, J Zhou, Y Yang, JW Wong
International Journal of Information Security 9 (4), 287-296, 2010
1222010
Wireless sensor network security
J Lopez, J Zhou
IOS Press, 2008
1222008
Dynamic secure cloud storage with provenance
SSM Chow, CK Chu, X Huang, J Zhou, RH Deng
Cryptography and security: From theory to applications, 442-464, 2012
1192012
Some remarks on a fair exchange protocol
J Zhou, R Deng, F Bao
PKC'00, 46-57, 2000
1162000
Evidence and non-repudiation
J Zhou, D Gollmann
Journal of Network and Computer Applications 20, 267-282, 1997
1151997
Evolution of fair non-repudiation with TTP
J Zhou, R Deng, F Bao
ACISP'99, 258-269, 1999
1081999
Cost-effective authentic and anonymous data sharing with forward security
X Huang, J Liu, S Tang, Y Xiang, K Liang, L Xu, J Zhou
IEEE Transactions on Computers 64 (4), 971-983, 2015
1062015
The system can't perform the operation now. Try again later.
Articles 1–20