Jianying Zhou
Orcid: 0000-0003-0594-0432Affiliations:
- Singapore University of Technology and Design (SUTD), Centre for Research in Cyber Security (iTrust), Singapore
- Institute for Infocomm Research, Cryptography & Security Department, Singapore (former)
According to our database1,
Jianying Zhou
authored at least 360 papers
between 1996 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on linkedin.com
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
From sinking to saving: MITRE ATT &CK and D3FEND frameworks for maritime cybersecurity.
Int. J. Inf. Sec., June, 2024
IEEE Internet Things J., March, 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Internet Things J., 2024
Int. J. Crit. Infrastructure Prot., 2024
IACR Cryptol. ePrint Arch., 2024
FLock: Robust and Privacy-Preserving Federated Learning based on Practical Blockchain State Channels.
IACR Cryptol. ePrint Arch., 2024
Time Constant: Actuator Fingerprinting using Transient Response of Device and Process in ICS.
CoRR, 2024
Excavating Vulnerabilities Lurking in Multi-Factor Authentication Protocols: A Systematic Security Analysis.
CoRR, 2024
'SSL?! What on earth is that?': Towards Designing Age-Inclusive Secure Smartphone Browsing.
CoRR, 2024
Proceedings of the ACM on Web Conference 2024, 2024
Proceedings of the 27th International Symposium on Research in Attacks, 2024
Proceedings of the Data and Applications Security and Privacy XXXVIII, 2024
CryptGraph: An Efficient Privacy-Enhancing Solution for Accurate Shortest Path Retrieval in Cloud Environments.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
Proceedings of the Applied Cryptography and Network Security Workshops, 2024
Proceedings of the Applied Cryptography and Network Security Workshops, 2024
Proceedings of the Applied Cryptography and Network Security Workshops, 2024
2023
VitroBench: Manipulating in-vehicle networks and COTS ECUs on your bench: A comprehensive test platform for automotive cybersecurity research.
Veh. Commun., October, 2023
Guest Editorial: Cyber-Physical Threats and Solutions for Autonomous Transportation Systems.
IEEE Trans. Ind. Informatics, June, 2023
On the Security of Containers: Threat Modeling, Attack Analysis, and Mitigation Strategies.
Comput. Secur., May, 2023
HMACCE: Establishing Authenticated and Confidential Channel From Historical Data for Industrial Internet of Things.
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Secur. Priv., 2023
CoRR, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
FieldFuzz: In Situ Blackbox Fuzzing of Proprietary Industrial Automation Runtimes via the Network.
Proceedings of the 26th International Symposium on Research in Attacks, 2023
Proceedings of the Information Security - 26th International Conference, 2023
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
PAID: Perturbed Image Attacks Analysis and Intrusion Detection Mechanism for Autonomous Driving Systems.
Proceedings of the 9th ACM Cyber-Physical System Security Workshop, 2023
SePanner: Analyzing Semantics of Controller Variables in Industrial Control Systems based on Network Traffic.
Proceedings of the Annual Computer Security Applications Conference, 2023
Proceedings of the Applied Cryptography and Network Security, 2023
Safety Watermark: A Defense Tool for Real-Time Digital Forensic Incident Response in Industrial Control Systems.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023
Proceedings of the Applied Cryptography and Network Security Workshops, 2023
2022
A systematic survey of attack detection and prevention in Connected and Autonomous Vehicles.
Veh. Commun., 2022
IEEE Trans. Inf. Forensics Secur., 2022
Int. J. Inf. Sec., 2022
Group Time-based One-time Passwords and its Application to Efficient Privacy-Preserving Proof of Location.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
zkrpChain: Towards multi-party privacy-preserving data auditing for consortium blockchains based on zero-knowledge range proofs.
Future Gener. Comput. Syst., 2022
Distributed Ledger Technol. Res. Pract., 2022
FieldFuzz: Enabling vulnerability discovery in Industrial Control Systems supply chain using stateful system-level fuzzing.
CoRR, 2022
CoRR, 2022
IEEE Access, 2022
ATLAS: A Practical Attack Detection and Live Malware Analysis System for IoT Threat Intelligence.
Proceedings of the Information Security - 25th International Conference, 2022
Proceedings of the Information and Communications Security - 24th International Conference, 2022
Protecting the Integrity of IoT Sensor Data and Firmware With A Feather-Light Blockchain Infrastructure.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2022
Migrating Blockchains Away from ECDSA for Post-quantum Security: A Study of Impact on Users and Applications.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2022
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022
Curse of System Complexity and Virtue of Operational Invariants: Machine Learning based System Modeling and Attack Detection in CPS.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022
Proceedings of the Data and Applications Security and Privacy XXXVI, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
Proceedings of the Annual Computer Security Applications Conference, 2022
Proceedings of the Annual Computer Security Applications Conference, 2022
Proceedings of the Applied Cryptography and Network Security Workshops, 2022
Proceedings of the Applied Cryptography and Network Security Workshops, 2022
Proceedings of the Applied Cryptography and Network Security Workshops, 2022
2021
IACR Trans. Symmetric Cryptol., 2021
Server-Aided Bilateral Access Control for Secure Data Sharing With Dynamic User Groups.
IEEE Trans. Inf. Forensics Secur., 2021
Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage.
IEEE Trans. Cloud Comput., 2021
Building Low-Interactivity Multifactor Authenticated Key Exchange for Industrial Internet of Things.
IEEE Internet Things J., 2021
Enhancing the security of blockchain-based software defined networking through trust-based traffic fusion and filtration.
Inf. Fusion, 2021
Strong leakage-resilient encryption: enhancing data confidentiality by hiding partial ciphertext.
Int. J. Inf. Sec., 2021
Int. J. Inf. Sec., 2021
Opportunities and Challenges in Securing Critical Infrastructures Through Cryptography.
IEEE Secur. Priv., 2021
IACR Cryptol. ePrint Arch., 2021
Digit. Investig., 2021
Comput. Secur., 2021
AttkFinder: Discovering Attack Vectors in PLC Programs using Information Flow Analysis.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the Information Security - 24th International Conference, 2021
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021
Countering Concurrent Login Attacks in "Just Tap" Push-based Authentication: A Redesign and Usability Evaluations.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021
Proceedings of the IEEE International Conference on Decentralized Applications and Infrastructures, 2021
Proceedings of the Cyberspace Safety and Security - 13th International Symposium, 2021
Proceedings of the Critical Information Infrastructures Security, 2021
Lightweight Delegated Authentication with Identity Fraud Detection for Cyber-physical Systems.
Proceedings of the 7th ACM on Cyber-Physical System Security Workshop, 2021
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
Group Time-based One-time Passwords and its Application to Efficient Privacy-Preserving Proof of Location.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
Proceedings of the Applied Cryptography and Network Security Workshops, 2021
Proceedings of the Applied Cryptography and Network Security, 2021
Proceedings of the Applied Cryptography and Network Security Workshops, 2021
2020
Faster Authenticated Key Agreement With Perfect Forward Secrecy for Industrial Internet-of-Things.
IEEE Trans. Ind. Informatics, 2020
ACM Trans. Cyber Phys. Syst., 2020
Int. J. Inf. Sec., 2020
Challenges and Opportunities in Cyberphysical Systems Security: A Physics-Based Perspective.
IEEE Secur. Priv., 2020
IACR Cryptol. ePrint Arch., 2020
SSIDS: Semi-Supervised Intrusion Detection System by Extending the Logical Analysis of Data.
CoRR, 2020
CoRR, 2020
CoRR, 2020
Comput. Secur., 2020
Process skew: fingerprinting the process for anomaly detection in industrial control systems.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020
Right-of-Stake: Deterministic and Fair Blockchain Leader Election with Hidden Leader.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2020
Proceedings of the Critical Information Infrastructures Security, 2020
Proceedings of the 6th ACM Workshop on Cyber-Physical System Security, 2020
Evaluating Cascading Impact of Attacks on Resilience of Industrial Control Systems: A Design-Centric Modeling Approach.
Proceedings of the 6th ACM Workshop on Cyber-Physical System Security, 2020
LiS: Lightweight Signature Schemes for Continuous Message Authentication in Cyber-Physical Systems.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
Proceedings of the Applied Cryptography and Network Security Workshops, 2020
2019
ACM Trans. Sens. Networks, 2019
IEEE Internet Things J., 2019
File Guard: automatic format-based media file sanitization - A black-box approach against vulnerability exploitation.
Int. J. Inf. Sec., 2019
IACR Cryptol. ePrint Arch., 2019
HMAKE: Legacy-Compliant Multi-factor Authenticated Key Exchange from Historical Data.
IACR Cryptol. ePrint Arch., 2019
Evaluating Cascading Effects of Attacks on Resilience of Industrial Control Systems: A Design-Centric Modeling Approach.
CoRR, 2019
SocialAuth: Designing Touch Behavioral Smartphone User Authentication Based on Social Networking Applications.
Proceedings of the ICT Systems Security and Privacy Protection, 2019
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
Proceedings of the Information Security - 22nd International Conference, 2019
Careful-Packing: A Practical and Scalable Anti-Tampering Software Protection enforced by Trusted Computing.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
Design of a FDIA Resilient Protection Scheme for Power Networks by Securing Minimal Sensor Set.
Proceedings of the Applied Cryptography and Network Security Workshops, 2019
Proceedings of the Applied Cryptography and Network Security, 2019
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
A Survey on Lightweight Authenticated Encryption and Challenges for Securing Industrial IoT.
Proceedings of the Security and Privacy Trends in the Industrial Internet of Things, 2019
2018
HealthDep: An Efficient and Secure Deduplication Scheme for Cloud-Assisted eHealth Systems.
IEEE Trans. Ind. Informatics, 2018
IEEE Trans. Dependable Secur. Comput., 2018
IACR Cryptol. ePrint Arch., 2018
Enhancing Trust Management for Wireless Intrusion Detection via Traffic Sampling in the Era of Big Data.
IEEE Access, 2018
Proceedings of the Security and Safety Interplay of Intelligent Software Systems, 2018
Proceedings of the Data and Applications Security and Privacy XXXII, 2018
Proceedings of the Critical Information Infrastructures Security, 2018
<i>NoisePrint</i>: Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Finding Dependencies between Cyber-Physical Domains for Security Testing of Industrial Control Systems.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate sensors in CPS.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Comput. Secur., 2017
Proceedings of the A Systems Approach to Cyber Security, 2017
Proceedings of the Information Security Practice and Experience, 2017
Proceedings of the Information Security Practice and Experience, 2017
Proceedings of the 23rd Asia-Pacific Conference on Communications, 2017
A Pilot Study of Multiple Password Interference Between Text and Map-Based Passwords.
Proceedings of the Applied Cryptography and Network Security, 2017
2016
Efficient Privacy-Preserving Charging Station Reservation System for Electric Vehicles.
Comput. J., 2016
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
Credential Wrapping: From Anonymous Password Authentication to Anonymous Biometric Authentication.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
TMGuard: A Touch Movement-Based Security Mechanism for Screen Unlock Patterns on Smartphones.
Proceedings of the Applied Cryptography and Network Security, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
A Secure, Intelligent Electric Vehicle Ecosystem for Safe Integration With the Smart Grid.
IEEE Trans. Intell. Transp. Syst., 2015
IEEE Trans. Inf. Forensics Secur., 2015
IEEE Trans. Inf. Forensics Secur., 2015
Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption.
IEEE Trans. Inf. Forensics Secur., 2015
Cross-layer design in wireless multi-hop networks: a bargaining game theoretic analysis.
Telecommun. Syst., 2015
IEEE Trans. Computers, 2015
IEEE Trans. Computers, 2015
Int. J. Inf. Sec., 2015
IACR Cryptol. ePrint Arch., 2015
IEEE Commun. Surv. Tutorials, 2015
Comput. Secur., 2015
Proceedings of the Information Security - 18th International Conference, 2015
Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data.
Proceedings of the Computer Security - ESORICS 2015, 2015
2014
IEEE Trans. Veh. Technol., 2014
IEEE Trans. Parallel Distributed Syst., 2014
IEEE Trans. Knowl. Data Eng., 2014
Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts.
Theor. Comput. Sci., 2014
Secur. Commun. Networks, 2014
IEEE J. Sel. Areas Commun., 2014
IACR Cryptol. ePrint Arch., 2014
PPDCP-ABE: Privacy-Preserving Decentralized Cipher-Policy Attribute-Based Encryption.
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
PPDCP-ABE: Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption.
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the Second International Workshop on Security in Cloud Computing, 2014
2013
Realizing Fully Secure Unrestricted ID-Based Ring Signature in the Standard Model Based on HIBE.
IEEE Trans. Inf. Forensics Secur., 2013
J. Comput. Syst. Sci., 2013
Int. J. Inf. Sec., 2013
IACR Cryptol. ePrint Arch., 2013
CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing.
IACR Cryptol. ePrint Arch., 2013
IEEE Commun. Surv. Tutorials, 2013
On the features and challenges of security and privacy in distributed internet of things.
Comput. Networks, 2013
IEEE Commun. Mag., 2013
Comput. J., 2013
Comput. J., 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the Information Security, 16th International Conference, 2013
Self-blindable Credential: Towards Anonymous Entity Authentication Upon Resource Constrained Devices.
Proceedings of the Information Security, 16th International Conference, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
Privacy-preserving smart metering with regional statistics and personal enquiry services.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
Proceedings of the Applied Cryptography and Network Security, 2013
2012
Secur. Commun. Networks, 2012
J. Netw. Comput. Appl., 2012
IEICE Trans. Inf. Syst., 2012
An Efficient and Secure Service Discovery Protocol for Ubiquitous Computing Environments.
IEICE Trans. Inf. Syst., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
Proceedings of the Cryptography and Security: From Theory to Applications, 2012
2011
A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems.
IEEE Trans. Parallel Distributed Syst., 2011
Preserving Transparency and Accountability in Optimistic Fair Exchange of Digital Signatures.
IEEE Trans. Inf. Forensics Secur., 2011
Better security enforcement in trusted computing enabled heterogeneous wireless sensor networks.
Secur. Commun. Networks, 2011
Int. J. Inf. Sec., 2011
IACR Cryptol. ePrint Arch., 2011
Concurr. Comput. Pract. Exp., 2011
Proceedings of the Information and Communications Security - 13th International Conference, 2011
On Shortening Ciphertexts: New Constructions for Compact Public Key and Stateful Encryption Schemes.
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011
2010
Proceedings of the Handbook of Financial Cryptography and Security., 2010
Sensors, 2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Information and Communications Security - 12th International Conference, 2010
A Privacy-Preserving Secure Service Discovery Protocol for Ubiquitous Computing Environments.
Proceedings of the Public Key Infrastructures, Services and Applications, 2010
Short Generic Transformation to Strongly Unforgeable Signature in the Standard Model.
Proceedings of the Computer Security, 2010
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
2009
Advances in Information Security 43, Springer, ISBN: 978-0-387-75629-5, 2009
Distributed Noise Generation for Density Estimation Based Clustering without Trusted Third Party.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
Security and Correctness Analysis on Privacy-Preserving <i>k</i>-Means Clustering Schemes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
Proceedings of the Second ACM Conference on Wireless Network Security, 2009
Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks.
Proceedings of the Security and Privacy in Communication Networks, 2009
Proceedings of the Provable Security, Third International Conference, 2009
Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing.
Proceedings of the Information Security Practice and Experience, 2009
Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks.
Proceedings of the Information and Communications Security, 11th International Conference, 2009
Proceedings of the Information and Communications Security, 11th International Conference, 2009
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009
2008
Int. J. Inf. Sec., 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
Variable-length signatures for intrusion detection.
Comput. Syst. Sci. Eng., 2008
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008
Implementation and performance analysis for key divergent and evolution protocols in wireless sensor network.
Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2008
Proceedings of the Computer Security, 2008
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
Telecommun. Syst., 2007
Inf. Secur. Tech. Rep., 2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007
Proceedings of the Trust, 2007
Proceedings of the New Approaches for Security, 2007
Proceedings of the Information Security Practice and Experience, 2007
Proceedings of the Information and Communications Security, 9th International Conference, 2007
Proceedings of the Information and Communications Security, 9th International Conference, 2007
Proceedings of the Computational Science and Its Applications, 2007
Proceedings of the Public Key Infrastructure, 2007
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
2006
Comput. Stand. Interfaces, 2006
Comput. Commun., 2006
Using Certificate-based Binding Update Protocol to Hide the Movement of Mobile Nodes in MIPv6.
Proceedings of the 63rd IEEE Vehicular Technology Conference, 2006
Proceedings of the Second International Workshop on Security, 2006
Proceedings of the Security and Privacy in Dynamic Environments, 2006
Proceedings of the Information Security, 9th International Conference, 2006
Proceedings of the Information and Communications Security, 8th International Conference, 2006
Proceedings of the Critical Information Infrastructures Security, 2006
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006
2005
Casual virtual private network.
Comput. Syst. Sci. Eng., 2005
Proceedings of the Trust, 2005
Protection Against Spam Using Pre-Challenges.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005
Proceedings of the Pattern Recognition and Machine Intelligence, 2005
Proceedings of the IEEE 16th International Symposium on Personal, 2005
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2005
Proceedings of the Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, 2005
Proceedings of the Parallel and Distributed Processing and Applications, 2005
Proceedings of the Progress in Cryptology, 2005
Proceedings of the Progress in Cryptology, 2005
Proceedings of the Information Systems Security, First International Conference, 2005
Proceedings of the Information and Communications Security, 7th International Conference, 2005
Proceedings of the Information and Communications Security, 7th International Conference, 2005
Proceedings of the Computational Science and Its Applications, 2005
Proceedings of the Computational Science and Its Applications, 2005
Proceedings of the Applied Cryptography and Network Security, 2005
2004
Comments on "A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem".
IEEE Trans. Knowl. Data Eng., 2004
IACR Cryptol. ePrint Arch., 2004
Proceedings of the 2004 IEEE International Conference on E-Commerce Technology (CEC 2004), 2004
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004
Proceedings of the IEEE 15th International Symposium on Personal, 2004
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004
Proceedings of the Progress in Cryptology, 2004
Proceedings of the Information and Communications Security, 6th International Conference, 2004
Proceedings of the Computational Science and Its Applications, 2004
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
2003
Proceedings of the 2003 IEEE International Conference on Electronic Commerce (CEC 2003), 2003
A Multi-Party Non-Repudiation Protocol for Exchange of Different Messages.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003
Validating Digital Signatures without TTP's Time-Stamping and Certificate Revocation.
Proceedings of the Information Security, 6th International Conference, 2003
Proceedings of the Information and Communications Security, 5th International Conference, 2003
Proceedings of the Information and Communications Security, 5th International Conference, 2003
Proceedings of the Information and Communications Security, 5th International Conference, 2003
Proceedings of the E-Commerce and Web Technologies, 4th International Conference, 2003
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003
2002
IACR Cryptol. ePrint Arch., 2002
Non-Repudiation in Electronic Commerce.
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002
2001
J. Organ. Comput. Electron. Commer., 2001
Proceedings of the Information and Communications Security, Third International Conference, 2001
2000
Electronic Payment Systems with Fair On-line Verification.
Proceedings of the Information Security for Global Information Infrastructures, 2000
Proceedings of the Public Key Cryptography, 2000
1999
Proceedings of the Public Key Cryptography, 1999
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999
1998
1997
Proceedings of the 10th Computer Security Foundations Workshop (CSFW '97), 1997
1996
Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996