Jianying Zhou

Orcid: 0000-0003-0594-0432

Affiliations:
  • Singapore University of Technology and Design (SUTD), Centre for Research in Cyber Security (iTrust), Singapore
  • Institute for Infocomm Research, Cryptography & Security Department, Singapore (former)


According to our database1, Jianying Zhou authored at least 360 papers between 1996 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
From sinking to saving: MITRE ATT &CK and D3FEND frameworks for maritime cybersecurity.
Int. J. Inf. Sec., June, 2024

Funder: Future-Proof Unbiased Decentralized Randomness.
IEEE Internet Things J., March, 2024

Secure Channel Establishment Scheme for Task Delivery in Vehicular Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2024

Accountable Fine-Grained Blockchain Rewriting in the Permissionless Setting.
IEEE Trans. Inf. Forensics Secur., 2024

Dynamic Group Time-Based One-Time Passwords.
IEEE Trans. Inf. Forensics Secur., 2024

Optimizing Proof of Aliveness in Cyber-Physical Systems.
IEEE Trans. Dependable Secur. Comput., 2024

QP-LDP for Better Global Model Performance in Federated Learning.
IEEE Internet Things J., 2024

Cyber risk assessment of cyber-enabled autonomous cargo vessel.
Int. J. Crit. Infrastructure Prot., 2024

The Need of Testbeds for Cyberphysical System Security.
IEEE Secur. Priv., 2024

Maliciously Secure Circuit-PSI via SPDZ-Compatible Oblivious PRF.
IACR Cryptol. ePrint Arch., 2024

FLock: Robust and Privacy-Preserving Federated Learning based on Practical Blockchain State Channels.
IACR Cryptol. ePrint Arch., 2024

Time Constant: Actuator Fingerprinting using Transient Response of Device and Process in ICS.
CoRR, 2024

Maritime Cybersecurity: A Comprehensive Review.
CoRR, 2024

Excavating Vulnerabilities Lurking in Multi-Factor Authentication Protocols: A Systematic Security Analysis.
CoRR, 2024

'SSL?! What on earth is that?': Towards Designing Age-Inclusive Secure Smartphone Browsing.
CoRR, 2024

PAGE: Equilibrate Personalization and Generalization in Federated Learning.
Proceedings of the ACM on Web Conference 2024, 2024

Deception-Resistant Stochastic Manufacturing for Automated Production Lines.
Proceedings of the 27th International Symposium on Research in Attacks, 2024

Towards Atomicity and Composability in Cross-Chain NFTs.
Proceedings of the Data and Applications Security and Privacy XXXVIII, 2024

CryptGraph: An Efficient Privacy-Enhancing Solution for Accurate Shortest Path Retrieval in Cloud Environments.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

Towards Discovering Quantum-Threats for Applications Using Open-Source Libraries.
Proceedings of the Applied Cryptography and Network Security Workshops, 2024

Guidelines for Cyber Risk Management in Autonomous Shipping.
Proceedings of the Applied Cryptography and Network Security Workshops, 2024

Device Fingerprinting in a Smart Grid CPS.
Proceedings of the Applied Cryptography and Network Security Workshops, 2024

2023
VitroBench: Manipulating in-vehicle networks and COTS ECUs on your bench: A comprehensive test platform for automotive cybersecurity research.
Veh. Commun., October, 2023

Post-Quantum Adversarial Modeling: A User's Perspective.
Computer, August, 2023

Guest Editorial: Cyber-Physical Threats and Solutions for Autonomous Transportation Systems.
IEEE Trans. Ind. Informatics, June, 2023

Non-Intrusive Protection for Legacy SCADA Systems.
IEEE Commun. Mag., June, 2023

On the Security of Containers: Threat Modeling, Attack Analysis, and Mitigation Strategies.
Comput. Secur., May, 2023

HMACCE: Establishing Authenticated and Confidential Channel From Historical Data for Industrial Internet of Things.
IEEE Trans. Inf. Forensics Secur., 2023

FeSA: Automatic Federated Swarm Attestation on Dynamic Large-Scale IoT Devices.
IEEE Trans. Dependable Secur. Comput., 2023

Securing Critical Infrastructure Across Cyber and Physical Dimensions.
IEEE Secur. Priv., 2023

Electric Vehicles Security and Privacy: Challenges, Solutions, and Future Needs.
CoRR, 2023

TAP: Transparent and Privacy-Preserving Data Services.
Proceedings of the 32nd USENIX Security Symposium, 2023

FieldFuzz: In Situ Blackbox Fuzzing of Proprietary Industrial Automation Runtimes via the Network.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

VNGuard: Intrusion Detection System for In-Vehicle Networks.
Proceedings of the Information Security - 26th International Conference, 2023

Provable Adversarial Safety in Cyber-Physical Systems.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

PAID: Perturbed Image Attacks Analysis and Intrusion Detection Mechanism for Autonomous Driving Systems.
Proceedings of the 9th ACM Cyber-Physical System Security Workshop, 2023

SePanner: Analyzing Semantics of Controller Variables in Industrial Control Systems based on Network Traffic.
Proceedings of the Annual Computer Security Applications Conference, 2023

Predicate Private Set Intersection with Linear Complexity.
Proceedings of the Applied Cryptography and Network Security, 2023

Safety Watermark: A Defense Tool for Real-Time Digital Forensic Incident Response in Industrial Control Systems.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023

EARIC: Exploiting ADC Registers in IoT and Control Systems.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023

2022
A systematic survey of attack detection and prevention in Connected and Autonomous Vehicles.
Veh. Commun., 2022

A Secure Two-Factor Authentication Scheme From Password-Protected Hardware Tokens.
IEEE Trans. Inf. Forensics Secur., 2022

Challenges of post-quantum digital signing in real-world applications: a survey.
Int. J. Inf. Sec., 2022

Group Time-based One-time Passwords and its Application to Efficient Privacy-Preserving Proof of Location.
IACR Cryptol. ePrint Arch., 2022

LARP: A Lightweight Auto-Refreshing Pseudonym Protocol for V2X.
IACR Cryptol. ePrint Arch., 2022

ZKBdf: A ZKBoo-based Quantum-Secure Verifiable Delay Function with Prover-secret.
IACR Cryptol. ePrint Arch., 2022

zkrpChain: Towards multi-party privacy-preserving data auditing for consortium blockchains based on zero-knowledge range proofs.
Future Gener. Comput. Syst., 2022

Reinshard: An Optimally Sharded Dual-Blockchain for Concurrency Resolution.
Distributed Ledger Technol. Res. Pract., 2022

FieldFuzz: Enabling vulnerability discovery in Industrial Control Systems supply chain using stateful system-level fuzzing.
CoRR, 2022

Guidelines for cyber risk management in shipboard operational technology systems.
CoRR, 2022

Modular Framework for Constructing IoT-Server AKE in Post-Quantum Setting.
IEEE Access, 2022

ATLAS: A Practical Attack Detection and Live Malware Analysis System for IoT Threat Intelligence.
Proceedings of the Information Security - 25th International Conference, 2022

Calibrating Learning Parity with Noise Authentication for Low-Resource Devices.
Proceedings of the Information and Communications Security - 24th International Conference, 2022

Protecting the Integrity of IoT Sensor Data and Firmware With A Feather-Light Blockchain Infrastructure.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2022

Migrating Blockchains Away from ECDSA for Post-quantum Security: A Study of Impact on Users and Applications.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2022

Securing Password Authentication for Web-based Applications.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022

Curse of System Complexity and Virtue of Operational Invariants: Machine Learning based System Modeling and Attack Detection in CPS.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022

Liberate Your Servers: A Decentralized Content Compliance Validation Protocol.
Proceedings of the Data and Applications Security and Privacy XXXVI, 2022

Evaluating Blockchain Protocols with Abusive Modeling.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

Designing a Provenance Analysis for SGX Enclaves.
Proceedings of the Annual Computer Security Applications Conference, 2022

If You Can't Beat Them, Pay Them: Bitcoin Protection Racket is Profitable.
Proceedings of the Annual Computer Security Applications Conference, 2022

SuppliedTrust: A Trusted Blockchain Architecture for Supply Chains.
Proceedings of the Applied Cryptography and Network Security Workshops, 2022

HolA: Holistic and Autonomous Attestation for IoT Networks.
Proceedings of the Applied Cryptography and Network Security Workshops, 2022

Toward Safe Integration of Legacy SCADA Systems in the Smart Grid.
Proceedings of the Applied Cryptography and Network Security Workshops, 2022

2021
PLCrypto: A Symmetric Cryptographic Library for Programmable Logic Controllers.
IACR Trans. Symmetric Cryptol., 2021

Server-Aided Bilateral Access Control for Secure Data Sharing With Dynamic User Groups.
IEEE Trans. Inf. Forensics Secur., 2021

Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage.
IEEE Trans. Cloud Comput., 2021

Building Low-Interactivity Multifactor Authenticated Key Exchange for Industrial Internet of Things.
IEEE Internet Things J., 2021

Enhancing the security of blockchain-based software defined networking through trust-based traffic fusion and filtration.
Inf. Fusion, 2021

Strong leakage-resilient encryption: enhancing data confidentiality by hiding partial ciphertext.
Int. J. Inf. Sec., 2021

Enabling isolation and recovery in PLC redundancy framework of metro train systems.
Int. J. Inf. Sec., 2021

Opportunities and Challenges in Securing Critical Infrastructures Through Cryptography.
IEEE Secur. Priv., 2021

Bigdata-facilitated Two-party Authenticated Key Exchange for IoT.
IACR Cryptol. ePrint Arch., 2021

The evidence beyond the wall: Memory forensics in SGX environments.
Digit. Investig., 2021

Threat Modeling and Security Analysis of Containers: A Survey.
CoRR, 2021

Post-Quantum VRF and its Applications in Future-Proof Blockchain System.
CoRR, 2021

Modeling social worm propagation for advanced persistent threats.
Comput. Secur., 2021

AttkFinder: Discovering Attack Vectors in PLC Programs using Information Flow Analysis.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

LaKSA: A Probabilistic Proof-of-Stake Protocol.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Layering Quantum-Resistance into Classical Digital Signature Algorithms.
Proceedings of the Information Security - 24th International Conference, 2021

Post-Quantum User Authentication and Key Exchange Based on Consortium Blockchain.
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021

Countering Concurrent Login Attacks in "Just Tap" Push-based Authentication: A Redesign and Usability Evaluations.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

Transparent Electricity Pricing with Privacy.
Proceedings of the Computer Security - ESORICS 2021, 2021

Retrieving Input from Touch Interfaces via Acoustic Emanations.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

A First Look into DeFi Oracles.
Proceedings of the IEEE International Conference on Decentralized Applications and Infrastructures, 2021

Post-quantum Key Escrow for Supervised Secret Data Sharing on Consortium Blockchain.
Proceedings of the Cyberspace Safety and Security - 13th International Symposium, 2021

Bank of Models: Sensor Attack Detection and Isolation in Industrial Control Systems.
Proceedings of the Critical Information Infrastructures Security, 2021

Lightweight Delegated Authentication with Identity Fraud Detection for Cyber-physical Systems.
Proceedings of the 7th ACM on Cyber-Physical System Security Workshop, 2021

Scanning the Cycle: Timing-based Authentication on PLCs.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

Group Time-based One-time Passwords and its Application to Efficient Privacy-Preserving Proof of Location.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

Shaping Blockchain Technology for Securing Supply Chains.
Proceedings of the Applied Cryptography and Network Security Workshops, 2021

SnakeGX: A Sneaky Attack Against SGX Enclaves.
Proceedings of the Applied Cryptography and Network Security, 2021

Quantum Computing Threat Modelling on a Generic CPS Setup.
Proceedings of the Applied Cryptography and Network Security Workshops, 2021

2020
Faster Authenticated Key Agreement With Perfect Forward Secrecy for Industrial Internet-of-Things.
IEEE Trans. Ind. Informatics, 2020

Data Integrity Threats and Countermeasures in Railway Spot Transmission Systems.
ACM Trans. Cyber Phys. Syst., 2020

Attacks on smart grid: power supply interruption and malicious power generation.
Int. J. Inf. Sec., 2020

Challenges and Opportunities in Cyberphysical Systems Security: A Physics-Based Perspective.
IEEE Secur. Priv., 2020

Formalizing Bitcoin Crashes with Universally Composable Security.
IACR Cryptol. ePrint Arch., 2020

SSIDS: Semi-Supervised Intrusion Detection System by Extending the Logical Analysis of Data.
CoRR, 2020

ProPoS: A Probabilistic Proof-of-Stake Protocol.
CoRR, 2020

Revisiting Anomaly Detection in ICS: Aimed at Segregation of Attacks and Faults.
CoRR, 2020

Challenges and Opportunities in CPS Security: A Physics-based Perspective.
CoRR, 2020

On the Insecurities of Mobile D2D File Sharing Applications.
CoRR, 2020

Anomaly detection in Industrial Control Systems using Logical Analysis of Data.
Comput. Secur., 2020

Advances in security research in the Asiacrypt region.
Commun. ACM, 2020

Process skew: fingerprinting the process for anomaly detection in industrial control systems.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

Right-of-Stake: Deterministic and Fair Blockchain Leader Election with Hidden Leader.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2020

A Tale of Two Testbeds: A Comparative Study of Attack Detection Techniques in CPS.
Proceedings of the Critical Information Infrastructures Security, 2020

DecIED: Scalable k-Anonymous Deception for IEC61850-Compliant Smart Grid Systems.
Proceedings of the 6th ACM Workshop on Cyber-Physical System Security, 2020

Evaluating Cascading Impact of Attacks on Resilience of Industrial Control Systems: A Design-Centric Modeling Approach.
Proceedings of the 6th ACM Workshop on Cyber-Physical System Security, 2020

LiS: Lightweight Signature Schemes for Continuous Message Authentication in Cyber-Physical Systems.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

Policy-based Chameleon Hash for Blockchain Rewriting with Black-box Accountability.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

Post-exploitation and Persistence Techniques Against Programmable Logic Controller.
Proceedings of the Applied Cryptography and Network Security Workshops, 2020

2019
A Novel Authenticated Key Agreement Protocol With Dynamic Credential for WSNs.
ACM Trans. Sens. Networks, 2019

Towards Semantic Sensitive Feature Profiling of IoT Devices.
IEEE Internet Things J., 2019

File Guard: automatic format-based media file sanitization - A black-box approach against vulnerability exploitation.
Int. J. Inf. Sec., 2019

A Survey of Digital Signing in the Post Quantum Era.
IACR Cryptol. ePrint Arch., 2019

HMAKE: Legacy-Compliant Multi-factor Authenticated Key Exchange from Historical Data.
IACR Cryptol. ePrint Arch., 2019

SAFE^d: Self-Attestation For Networks of Heterogeneous Embedded Devices.
CoRR, 2019

Evaluating Cascading Effects of Attacks on Resilience of Industrial Control Systems: A Design-Centric Modeling Approach.
CoRR, 2019

SCADAWall: A CPI-enabled firewall model for SCADA security.
Comput. Secur., 2019

SocialAuth: Designing Touch Behavioral Smartphone User Authentication Based on Social Networking Applications.
Proceedings of the ICT Systems Security and Privacy Protection, 2019

ScaRR: Scalable Runtime Remote Attestation for Complex Systems.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

PAtt: Physics-based Attestation of Control Systems.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

IBWH: An Intermittent Block Withholding Attack with Optimal Mining Reward Rate.
Proceedings of the Information Security - 22nd International Conference, 2019

Careful-Packing: A Practical and Scalable Anti-Tampering Software Protection enforced by Trusted Computing.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

Proof of aliveness.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

Design of a FDIA Resilient Protection Scheme for Power Networks by Securing Minimal Sensor Set.
Proceedings of the Applied Cryptography and Network Security Workshops, 2019

A Modular Hybrid Learning Approach for Black-Box Security Testing of CPS.
Proceedings of the Applied Cryptography and Network Security, 2019

Zero Residual Attacks on Industrial Control Systems and Stateful Countermeasures.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

A Survey on Lightweight Authenticated Encryption and Challenges for Securing Industrial IoT.
Proceedings of the Security and Privacy Trends in the Industrial Internet of Things, 2019

2018
HealthDep: An Efficient and Secure Deduplication Scheme for Cloud-Assisted eHealth Systems.
IEEE Trans. Ind. Informatics, 2018

Magic Train: Design of Measurement Methods against Bandwidth Inflation Attacks.
IEEE Trans. Dependable Secur. Comput., 2018

Strong Leakage Resilient Encryption by Hiding Partial Ciphertext.
IACR Cryptol. ePrint Arch., 2018

SCARR: A Novel Scalable Runtime Remote Attestation.
CoRR, 2018

Enhancing Trust Management for Wireless Intrusion Detection via Traffic Sampling in the Era of Big Data.
IEEE Access, 2018

CAN-FD-Sec: Improving Security of CAN-FD Protocol.
Proceedings of the Security and Safety Interplay of Intelligent Software Systems, 2018

Virtually Isolated Network: A Hybrid Network to Achieve High Level Security.
Proceedings of the Data and Applications Security and Privacy XXXII, 2018

SMuF: State Machine Based Mutational Fuzzing Framework for Internet of Things.
Proceedings of the Critical Information Infrastructures Security, 2018

<i>NoisePrint</i>: Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Finding Dependencies between Cyber-Physical Domains for Security Testing of Industrial Control Systems.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate sensors in CPS.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

ATG: An Attack Traffic Generation Tool for Security Testing of In-vehicle CAN Bus.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
A New Functional Encryption for Multidimensional Range Query.
IACR Cryptol. ePrint Arch., 2017

Efficient outsourcing of secure k-nearest neighbour query over encrypted database.
Comput. Secur., 2017

Mind the Gap: Security Analysis of Metro Platform Screen Door System.
Proceedings of the A Systems Approach to Cyber Security, 2017

A New Functional Encryption for Multidimensional Range Query (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017

On the Security of In-Vehicle Hybrid Network: Status and Challenges.
Proceedings of the Information Security Practice and Experience, 2017

A scheme for lightweight SCADA packet authentication.
Proceedings of the 23rd Asia-Pacific Conference on Communications, 2017

A Pilot Study of Multiple Password Interference Between Text and Map-Based Passwords.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
Complying with Security Requirements in Cloud Storage Systems.
J. Comput., 2016

Efficient Privacy-Preserving Charging Station Reservation System for Electric Vehicles.
Comput. J., 2016

Directed Transitive Signature on Directed Tree.
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 2016

Lightweight Delegatable Proofs of Storage.
Proceedings of the Computer Security - ESORICS 2016, 2016

Scalable Two-Factor Authentication Using Historical Data.
Proceedings of the Computer Security - ESORICS 2016, 2016

Credential Wrapping: From Anonymous Password Authentication to Anonymous Biometric Authentication.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

TMGuard: A Touch Movement-Based Security Mechanism for Screen Unlock Patterns on Smartphones.
Proceedings of the Applied Cryptography and Network Security, 2016

Privacy-Preserving k-Nearest Neighbour Query on Outsourced Database.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
A Secure, Intelligent Electric Vehicle Ecosystem for Safe Integration With the Smart Grid.
IEEE Trans. Intell. Transp. Syst., 2015

Toward Energy-Efficient Trust System Through Watchdog Optimization for WSNs.
IEEE Trans. Inf. Forensics Secur., 2015

Time-Bound Anonymous Authentication for Roaming Networks.
IEEE Trans. Inf. Forensics Secur., 2015

Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption.
IEEE Trans. Inf. Forensics Secur., 2015

Cross-layer design in wireless multi-hop networks: a bargaining game theoretic analysis.
Telecommun. Syst., 2015

k-Times Attribute-Based Anonymous Access Control for Cloud Computing.
IEEE Trans. Computers, 2015

Cost-Effective Authentic and Anonymous Data Sharing with Forward Security.
IEEE Trans. Computers, 2015

Security and privacy of electronic health information systems.
Int. J. Inf. Sec., 2015

Cyber and Physical Access Control in Legacy System Using Passwords.
IACR Cryptol. ePrint Arch., 2015

Surveying the Development of Biometric User Authentication on Mobile Phones.
IEEE Commun. Surv. Tutorials, 2015

Leakage-resilient password entry: Challenges, design, and evaluation.
Comput. Secur., 2015

A Forward-Secure Certificate-Based Signature Scheme.
Comput. J., 2015

On the Efficiency of Multi-party Contract Signing Protocols.
Proceedings of the Information Security - 18th International Conference, 2015

Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data.
Proceedings of the Computer Security - ESORICS 2015, 2015

2014
A New Payment System for Enhancing Location Privacy of Electric Vehicles.
IEEE Trans. Veh. Technol., 2014

Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage.
IEEE Trans. Parallel Distributed Syst., 2014

Linkable Ring Signature with Unconditional Anonymity.
IEEE Trans. Knowl. Data Eng., 2014

Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts.
Theor. Comput. Sci., 2014

Collaborative agglomerative document clustering with limited information disclosure.
Secur. Commun. Networks, 2014

Security in a completely interconnected world.
Secur. Commun. Networks, 2014

Protecting the internet of things.
Secur. Commun. Networks, 2014

Cyber-Physical Device Authentication for the Smart Grid Electric Vehicle Ecosystem.
IEEE J. Sel. Areas Commun., 2014

Lightweight and Privacy-Preserving Delegatable Proofs of Storage.
IACR Cryptol. ePrint Arch., 2014

PPDCP-ABE: Privacy-Preserving Decentralized Cipher-Policy Attribute-Based Encryption.
IACR Cryptol. ePrint Arch., 2014

New Insight to Preserve Online Survey Accuracy and Privacy in Big Data Era.
Proceedings of the Computer Security - ESORICS 2014, 2014

PPDCP-ABE: Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption.
Proceedings of the Computer Security - ESORICS 2014, 2014

On the security of cloud data storage and sharing.
Proceedings of the Second International Workshop on Security in Cloud Computing, 2014

2013
Realizing Fully Secure Unrestricted ID-Based Ring Signature in the Standard Model Based on HIBE.
IEEE Trans. Inf. Forensics Secur., 2013

Security Concerns in Popular Cloud Storage Services.
IEEE Pervasive Comput., 2013

How to achieve non-repudiation of origin with privacy protection in cloud computing.
J. Comput. Syst. Sci., 2013

An optimistic fair exchange protocol with active intermediaries.
Int. J. Inf. Sec., 2013

Leakage Resilient Proofs of Ownership in Cloud Storage, Revisited.
IACR Cryptol. ePrint Arch., 2013

CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing.
IACR Cryptol. ePrint Arch., 2013

On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks.
IEEE Commun. Surv. Tutorials, 2013

On the features and challenges of security and privacy in distributed internet of things.
Comput. Networks, 2013

On smart grid cybersecurity standardization: Issues of designing with NISTIR 7628.
IEEE Commun. Mag., 2013

Efficient Linkable and/or Threshold Ring Signature Without Random Oracles.
Comput. J., 2013

An Asynchronous Optimistic Protocol for Atomic Multi-Two-Party Contract Signing.
Comput. J., 2013

Comparing Mobile Privacy Protection through Cross-Platform Applications.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Achieving Revocable Fine-Grained Cryptographic Access Control over Cloud Data.
Proceedings of the Information Security, 16th International Conference, 2013

Self-blindable Credential: Towards Anonymous Entity Authentication Upon Resource Constrained Devices.
Proceedings of the Information Security, 16th International Conference, 2013

Designing leakage-resilient password entry on touchscreen mobile devices.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Weak leakage-resilient client-side deduplication of encrypted data in cloud storage.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Privacy-preserving smart metering with regional statistics and personal enquiry services.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Launching Generic Attacks on iOS with Approved Third-Party Applications.
Proceedings of the Applied Cryptography and Network Security, 2013

2012
Detecting node replication attacks in mobile sensor networks: theory and approaches.
Secur. Commun. Networks, 2012

Enhanced authentication for commercial video services.
Secur. Commun. Networks, 2012

Detecting node replication attacks in wireless sensor networks: A survey.
J. Netw. Comput. Appl., 2012

Message from the Guest Editors.
Int. J. Inf. Sec., 2012

A Survey on Privacy Frameworks for RFID Authentication.
IEICE Trans. Inf. Syst., 2012

An Efficient and Secure Service Discovery Protocol for Ubiquitous Computing Environments.
IEICE Trans. Inf. Syst., 2012

Enhancing Location Privacy for Electric Vehicles (at the right time).
IACR Cryptol. ePrint Arch., 2012

Forward Secure Attribute-Based Signatures.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

A Generic Approach for Providing Revocation Support in Secret Handshake.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Verifier-local revocation group signatures with time-bound keys.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

Dynamic Secure Cloud Storage with Provenance.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012

2011
A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems.
IEEE Trans. Parallel Distributed Syst., 2011

Preserving Transparency and Accountability in Optimistic Fair Exchange of Digital Signatures.
IEEE Trans. Inf. Forensics Secur., 2011

Better security enforcement in trusted computing enabled heterogeneous wireless sensor networks.
Secur. Commun. Networks, 2011

Guest editors' preface.
J. Comput. Secur., 2011

Secure localization with attack detection in wireless sensor networks.
Int. J. Inf. Sec., 2011

Message from the Guest Editors.
Int. J. Inf. Sec., 2011

Forward Secure Ring Signature without Random Oracles.
IACR Cryptol. ePrint Arch., 2011

Short and Efficient Certificate-Based Signature.
IACR Cryptol. ePrint Arch., 2011

Secure SCADA framework for the protection of energy control systems.
Concurr. Comput. Pract. Exp., 2011

Applying Time-Bound Hierarchical Key Assignment in Wireless Sensor Networks.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

On Shortening Ciphertexts: New Constructions for Compact Public Key and Stateful Encryption Schemes.
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011

Threshold ring signature without random oracles.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Secure mobile subscription of sensor-encrypted data.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Compact identity-based encryption without strong symmetric cipher.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Identity-Based Server-Aided Decryption.
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2010
Non-Repudiation.
Proceedings of the Handbook of Financial Cryptography and Security., 2010

Authentication and Key Establishment in Dynamic Wireless Sensor Networks.
Sensors, 2010

Time-Bound Hierarchical Key Assignment: An Overview.
IEICE Trans. Inf. Syst., 2010

Efficient Online/Offline Identity-Based Signature for Wireless Sensor Network.
IACR Cryptol. ePrint Arch., 2010

Online/Offline Identity-Based Signcryption Revisited.
IACR Cryptol. ePrint Arch., 2010

Practical ID-based Encryption for Wireless Sensor Network.
IACR Cryptol. ePrint Arch., 2010

Identity-Based Online/Offline Key Encapsulation and Encryption.
IACR Cryptol. ePrint Arch., 2010

An Agent-Mediated Fair Exchange Protocol.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

A Privacy-Preserving Secure Service Discovery Protocol for Ubiquitous Computing Environments.
Proceedings of the Public Key Infrastructures, Services and Applications, 2010

Short Generic Transformation to Strongly Unforgeable Signature in the Standard Model.
Proceedings of the Computer Security, 2010

Towards practical anonymous password authentication.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
Secure Multi-Party Non-Repudiation Protocols and Applications
Advances in Information Security 43, Springer, ISBN: 978-0-387-75629-5, 2009

Fair and Secure Mobile Billing Systems.
Wirel. Pers. Commun., 2009

Distributed Noise Generation for Density Estimation Based Clustering without Trusted Third Party.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Security and Correctness Analysis on Privacy-Preserving <i>k</i>-Means Clustering Schemes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Certificate-based sequential aggregate signature.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks.
Proceedings of the Security and Privacy in Communication Networks, 2009

Self-enforcing Private Inference Control.
Proceedings of the Provable Security, Third International Conference, 2009

Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing.
Proceedings of the Information Security Practice and Experience, 2009

Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

Online/Offline Ring Signature Scheme.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

Optionally Identifiable Private Handshakes.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009

A New Approach for Anonymous Password Authentication.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

An Efficient Identity-Based Online/Offline Encryption Scheme.
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009

Conditional Proxy Broadcast Re-Encryption.
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009

2008
Enforcing trust in pervasive computing.
Int. J. Syst. Syst. Eng., 2008

Achieving evenhandedness in certified email system for contract signing.
Int. J. Inf. Sec., 2008

Certificate-Based Signature Schemes without Pairings or Random Oracles.
IACR Cryptol. ePrint Arch., 2008

A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack.
IACR Cryptol. ePrint Arch., 2008

Multiparty nonrepudiation: A survey.
ACM Comput. Surv., 2008

Variable-length signatures for intrusion detection.
Comput. Syst. Sci. Eng., 2008

An Asynchronous Node Replication Attack in Wireless Sensor Networks.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

Realizing Stateful Public Key Encryption in Wireless Sensor Network.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

Efficient Certificate-Based Encryption in the Standard Model.
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008

Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework).
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008

Implementation and performance analysis for key divergent and evolution protocols in wireless sensor network.
Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2008

A New Formal Proof Model for RFID Location Privacy.
Proceedings of the Computer Security, 2008

Generic Constructions of Stateful Public Key Encryption and Their Applications.
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008

A New Scheme for Distributed Density Estimation based Privacy-Preserving Clustering.
Proceedings of the The Third International Conference on Availability, 2008

2007
Integration of non-repudiation services in mobile DRM scenarios.
Telecommun. Syst., 2007

An effective multi-layered defense framework against spam.
Inf. Secur. Tech. Rep., 2007

New Constructions of Fuzzy Identity-Based Encryption.
IACR Cryptol. ePrint Arch., 2007

A secure double auction protocol against false bids.
Decis. Support Syst., 2007

A Mobile Firewall Framework - Design and Implementation.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Towards Automatic Assembly of Privacy-Preserved Intrusion Signatures.
Proceedings of the Trust, 2007

Evaluating the Effects of Model Generalization on Intrusion Detection Performance.
Proceedings of the New Approaches for Security, 2007

Two-Party Privacy-Preserving Agglomerative Document Clustering.
Proceedings of the Information Security Practice and Experience, 2007

Firewall for Dynamic IP Address in Mobile IPv6.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

DDoS Attack Detection Algorithms Based on Entropy Computing.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

Estimation of TTP Features in Non-repudiation Service.
Proceedings of the Computational Science and Its Applications, 2007

Undeniable Mobile Billing Schemes.
Proceedings of the Public Key Infrastructure, 2007

Privacy-Preserving Two-Party K-Means Clustering via Secure Approximation.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Cryptanalysis of Chu's DCT based watermarking scheme.
IEEE Trans. Multim., 2006

Preface.
J. Comput. Secur., 2006

Improved Double Auction Protocol based on a Hybrid Trust Model.
J. Comput., 2006

Preface.
Int. J. Inf. Sec., 2006

Minimizing TTP's involvement in signature validation.
Int. J. Inf. Sec., 2006

The Fairness of Perfect Concurrent Signatures.
IACR Cryptol. ePrint Arch., 2006

Protecting mobile-agent data collection against blocking attacks.
Comput. Stand. Interfaces, 2006

Some common attacks against certified email protocols and the countermeasures.
Comput. Commun., 2006

An anti-spam scheme using pre-challenges.
Comput. Commun., 2006

Routing optimization security in mobile IPv6.
Comput. Networks, 2006

Using Certificate-based Binding Update Protocol to Hide the Movement of Mobile Nodes in MIPv6.
Proceedings of the 63rd IEEE Vehicular Technology Conference, 2006

Pervasive Trusted Computing.
Proceedings of the Second International Workshop on Security, 2006

A Synchronous Multi-Party Contract Signing Protocol Improving Lower Bound of Steps.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

Diverging Keys in Wireless Sensor Networks.
Proceedings of the Information Security, 9th International Conference, 2006

Finding Compact Reliable Broadcast in Unknown Fixed-Identity Networks (Short Paper).
Proceedings of the Information and Communications Security, 8th International Conference, 2006

Enforcing Trust in Pervasive Computing with Trusted Computing Technology.
Proceedings of the Critical Information Infrastructures Security, 2006

Applying intrusion detection systems to wireless sensor networks.
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006

2005
Optimized multi-party certified email protocols.
Inf. Manag. Comput. Security, 2005

Casual virtual private network.
Comput. Syst. Sci. Eng., 2005

An Improved Double Auction Protocol Against False Bids.
Proceedings of the Trust, 2005

Protection Against Spam Using Pre-Challenges.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

An Information Hiding Framework for Lightweight Mobile Devices with Digital Camera.
Proceedings of the Pattern Recognition and Machine Intelligence, 2005

An efficient certified e-mail scheme suitable for wireless mobile environments.
Proceedings of the IEEE 16th International Symposium on Personal, 2005

USAID: Unifying Signature-Based and Anomaly-Based Intrusion Detection.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2005

Security Analysis and Improvement of Return Routability Protocol.
Proceedings of the Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, 2005

An Authentication Protocol for Pervasive Computing.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

Attacking an Asynchronous Multi-party Contract Signing Protocol.
Proceedings of the Progress in Cryptology, 2005

Cryptanalysis of Barni et al. Watermarking Scheme.
Proceedings of the Progress in Cryptology, 2005

A Robust Double Auction Protocol Based on a Hybrid Trust Model.
Proceedings of the Information Systems Security, First International Conference, 2005

Authenticating Query Results in Data Publishing.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

An Evenhanded Certified Email System for Contract Signing.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

On the Security of a Certified E-Mail Scheme with Temporal Authentication.
Proceedings of the Computational Science and Its Applications, 2005

On the Security of Wireless Sensor Networks.
Proceedings of the Computational Science and Its Applications, 2005

Model Generalization and Its Implications on Intrusion Detection.
Proceedings of the Applied Cryptography and Network Security, 2005

2004
Comments on "A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem".
IEEE Trans. Knowl. Data Eng., 2004

Comments on a Threshold Proxy Signature Scheme Based on the RSA Cryptosystem.
IACR Cryptol. ePrint Arch., 2004

Agent-mediated non-repudiation protocols.
Electron. Commer. Res. Appl., 2004

Non-repudiation protocols for multiple entities.
Comput. Commun., 2004

Analysis of a Free Roaming Agent Result-Truncation Defense Scheme.
Proceedings of the 2004 IEEE International Conference on E-Commerce Technology (CEC 2004), 2004

Protecting all traffic channels in mobile IPv6 network.
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004

On the Security of the Lee-Hwang Group-Oriented Undeniable Signature Schemes.
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004

Mobile personal firewall.
Proceedings of the IEEE 15th International Symposium on Personal, 2004

Cryptanalysis of a Wavelet Based Watermarking Scheme.
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004

On the Security of a Certified E-Mail Scheme.
Proceedings of the Progress in Cryptology, 2004

On the Security of a Multi-party Certified Email Protocol.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

Timeout Estimation Using a Simulation Model for Non-repudiation Protocols.
Proceedings of the Computational Science and Its Applications, 2004

Analysis and Improvement of Micali's Fair Contract Signing Protocol.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

2003
Security Analysis of Some Proxy Signatures.
IACR Cryptol. ePrint Arch., 2003

Intermediary Non-repudiation Protocols.
Proceedings of the 2003 IEEE International Conference on Electronic Commerce (CEC 2003), 2003

A Multi-Party Non-Repudiation Protocol for Exchange of Different Messages.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

Validating Digital Signatures without TTP's Time-Stamping and Certificate Revocation.
Proceedings of the Information Security, 6th International Conference, 2003

An Efficient Public-Key Framework.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

Security Remarks on a Group Signature Scheme with Member Deletion.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

Practical Service Charge for P2P Content Distribution.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

Efficient Signature Validation Based on a New PKI.
Proceedings of the E-Commerce and Web Technologies, 4th International Conference, 2003

FlexiCert: Merging X.509 Identity Certificates and Attribute Certificates.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

2002
Cryptanalysis of the Lee-Hwang Group-Oriented Undeniable Signature Schemes.
IACR Cryptol. ePrint Arch., 2002

An intensive survey of fair non-repudiation protocols.
Comput. Commun., 2002

Non-Repudiation in Electronic Commerce.
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002

An Electronic Payment Scheme Allowing Special Rates for Anonymous Regular Customers.
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002

Defending against redirect attacks in mobile IP.
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002

Maintaining the Validity of Digital Signatures in B2B Applications.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002

2001
Achieving Fair Nonrepudiation in Electronic Transactions.
J. Organ. Comput. Electron. Commer., 2001

Playing Lottery on the Internet.
Proceedings of the Information and Communications Security, Third International Conference, 2001

2000
Further analysis of the Internet key exchange protocol.
Comput. Commun., 2000

On the validity of digital signatures.
Comput. Commun. Rev., 2000

Electronic Payment Systems with Fair On-line Verification.
Proceedings of the Information Security for Global Information Infrastructures, 2000

Some Remarks on a Fair Exchange Protocol.
Proceedings of the Public Key Cryptography, 2000

1999
Securing digital signatures for non-repudiation.
Comput. Commun., 1999

Computer Security; D. Gollmann.
Comput. Commun., 1999

A Secure Pay-per View Scheme for Web-Based Video Service.
Proceedings of the Public Key Cryptography, 1999

Evolution of Fair Non-repudiation with TTP.
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999

1998
On the efficient implementation of fair non-repudiation.
Comput. Commun. Rev., 1998

Undeniable Billing in Mobile Communication.
Proceedings of the MOBICOM '98, 1998

1997
Non-repudiation.
PhD thesis, 1997

An Efficient Non-repudiation Protocol .
Proceedings of the 10th Computer Security Foundations Workshop (CSFW '97), 1997

1996
A Fair Non-repudiation Protocol.
Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996

Certified Electronic Mail.
Proceedings of the Computer Security, 1996

Observations on Non-repudiation.
Proceedings of the Advances in Cryptology, 1996


  Loading...