Yousheng Zhou

Orcid: 0000-0003-4116-6608

According to our database1, Yousheng Zhou authored at least 26 papers between 2015 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
EMAKAS: An efficient three-factor mutual authentication and key-agreement scheme for IoT environment.
Cyber Secur. Appl., 2025

2024
Internet of Things (IoT) of Smart Homes: Privacy and Security.
J. Electr. Comput. Eng., 2024

2023
PPT-LBS: Privacy-preserving top-k query scheme for outsourced data of location-based services.
Cyber Secur. Appl., December, 2023

A privacy-preserving logistic regression-based diagnosis scheme for digital healthcare.
Future Gener. Comput. Syst., July, 2023

2022
FTPS: Efficient fault-tolerant dynamic phrase search over outsourced encrypted data with forward and backward privacy.
Concurr. Comput. Pract. Exp., 2022

RAKI: A Robust ECC Based Three-party Authentication and Key Agreement Scheme for Medical IoT.
Proceedings of the IEEE Global Communications Conference, 2022

2021
PAMI-Anonymous Password Authentication Protocol for Medical Internet of Things.
Proceedings of the IEEE Global Communications Conference, 2021

2020
An Anonymous and Efficient ECC-Based Authentication Scheme for SIP.
Wirel. Commun. Mob. Comput., 2020

A Lattice-Based Authentication Scheme for Roaming Service in Ubiquitous Networks with Anonymity.
Secur. Commun. Networks, 2020

Privacy-Preserving Multidimensional Data Aggregation Scheme for Smart Grid.
Secur. Commun. Networks, 2020

2019
Conditional privacy-preserving authentication and key agreement scheme for roaming services in VANETs.
J. Inf. Secur. Appl., 2019

A time-aware searchable encryption scheme for EHRs.
Digit. Commun. Networks, 2019

Rumor Source Detection in Networks Based on the SEIR Model.
IEEE Access, 2019

An Unlinkable Authentication Scheme for Distributed IoT Application.
IEEE Access, 2019

2018
An Efficient V2I Authentication Scheme for VANETs.
Mob. Inf. Syst., 2018

A Prediction Model for the Risk of Osteoporosis Fracture in the Elderly Based on a Neural Network.
Proceedings of the Advances in Neural Networks - ISNN 2018, 2018

Identifying Rumor Source of Online Social Networks in the SEIR Model.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
An Enhanced Privacy-Preserving Authentication Scheme for Vehicle Sensor Networks.
Sensors, 2017

Policy-based Signatures for Predicates.
Int. J. Netw. Secur., 2017

Cellular automata based secure distributed storage scheme with integrity proof.
Comput. Electr. Eng., 2017

2016
Chaotic map-based time-aware multi-keyword search scheme with designated server.
Wirel. Commun. Mob. Comput., 2016

Multi-Key Searchable Encryption with Designated Server.
Intell. Autom. Soft Comput., 2016

Estimation for Partially Linear Single-index Instrumental Variables Models.
Commun. Stat. Simul. Comput., 2016

An Efficient Chaotic Map-Based Authentication Scheme with Mutual Anonymity.
Appl. Comput. Intell. Soft Comput., 2016

2015
Dynamic threshold changeable multi-policy secret sharing scheme.
Secur. Commun. Networks, 2015

Dynamic Searchable Encryption with Multi-user Private Search for Cloud Computing.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015


  Loading...