Yuan Zhou
Affiliations:- Network Emergency Response Technical Team/Coordination Center, China
According to our database1,
Yuan Zhou
authored at least 42 papers
between 2004 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2022
Proceedings of the IEEE International Conference on Communications, 2022
2021
Proceedings of the ICC 2021, 2021
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2021
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2021
2020
IEEE Trans. Inf. Forensics Secur., 2020
Proceedings of the 39th IEEE International Performance Computing and Communications Conference, 2020
2019
Rethinking Encrypted Traffic Classification: A Multi-Attribute Associated Fingerprint Approach.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019
2017
基于Wine的Windows安全机制模拟及沙箱系统实现 (Windows Security Mechanisms Simulation and Sandbox System Implementation Based on Wine).
计算机科学, 2017
2016
Batch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix Computations.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
2014
Generating signatures with optimal overhead: practical paddings for signature schemes.
Secur. Commun. Networks, 2014
Notes on a group-oriented setting's multisigncryption scheme with threshold designcryption.
Inf. Sci., 2014
POSTER: Using Chinese Characters for Authentication-Algorithmic Framework and Empirical Results.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard Model.
Proceedings of the Information and Communications Security - 15th International Conference, 2013
Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles.
Proceedings of the Applied Cryptography and Network Security, 2013
2012
Practical round-optimal blind signatures without random oracles or non-interactive zero-knowledge proofs.
Secur. Commun. Networks, 2012
Anonymous password-based key exchange with low resources consumption and better user-friendliness.
Secur. Commun. Networks, 2012
Appl. Math. Lett., 2012
2011
Comput. Commun., 2011
Non-interactive CDH-Based Multisignature Scheme in the Plain Public Key Model with Tighter Security.
Proceedings of the Information Security, 14th International Conference, 2011
Efficient CDH-Based Verifiably Encrypted Signatures with Optimal Bandwidth in the Standard Model.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 10th International Conference, 2011
2010
Sci. China Inf. Sci., 2010
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
2009
An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2009
Bilinear-pairings Based Designated-verifier Threshold Proxy Signature Scheme.
Proceedings of the 2009 International Conference on Security & Management, 2009
2008
Des. Codes Cryptogr., 2008
2007
J. Comput. Sci. Technol., 2007
2006
Proceedings of the Information Security Practice and Experience, 2006
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006
2005
Appl. Math. Comput., 2005
Appl. Math. Comput., 2005
Proceedings of the Parallel and Distributed Processing and Applications, 2005
Proceedings of the Parallel and Distributed Processing and Applications, 2005
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005
2004
Proceedings of the 3rd International Conference on Information Security, 2004