Zheng Yang
Orcid: 0000-0001-8610-9936Affiliations:
- Southwest University, Chongqing, China
- University of Helsinki, Secure System Group, Finland
- Chongqing University of Technology, School of Computer Science and Engineering, China
According to our database1,
Zheng Yang
authored at least 61 papers
between 2013 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
ACM Trans. Storage, May, 2024
IEEE Trans. Dependable Secur. Comput., 2024
2023
ADAM: An Adaptive DDoS Attack Mitigation Scheme in Software-Defined Cyber-Physical System.
IEEE Trans. Ind. Informatics, June, 2023
HMACCE: Establishing Authenticated and Confidential Channel From Historical Data for Industrial Internet of Things.
IEEE Trans. Inf. Forensics Secur., 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
2022
Group Time-based One-time Passwords and its Application to Efficient Privacy-Preserving Proof of Location.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Policy-Based Editing-Enabled Signatures: Authenticating Fine-Grained and Restricted Data Modification.
Comput. J., 2022
Sci. China Inf. Sci., 2022
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
IACR Trans. Symmetric Cryptol., 2021
Building Low-Interactivity Multifactor Authenticated Key Exchange for Industrial Internet of Things.
IEEE Internet Things J., 2021
Stability of delayed switched systems via Razumikhin technique and application to switched neural networks.
IMA J. Math. Control. Inf., 2021
Int. J. Inf. Sec., 2021
Opportunities and Challenges in Securing Critical Infrastructures Through Cryptography.
IEEE Secur. Priv., 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
Lightweight Delegated Authentication with Identity Fraud Detection for Cyber-physical Systems.
Proceedings of the 7th ACM on Cyber-Physical System Security Workshop, 2021
Group Time-based One-time Passwords and its Application to Efficient Privacy-Preserving Proof of Location.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
Faster Authenticated Key Agreement With Perfect Forward Secrecy for Industrial Internet-of-Things.
IEEE Trans. Ind. Informatics, 2020
IET Inf. Secur., 2020
IEEE CAA J. Autom. Sinica, 2020
LiS: Lightweight Signature Schemes for Continuous Message Authentication in Cyber-Physical Systems.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
2019
ACM Trans. Sens. Networks, 2019
Towards Modeling Privacy in WiFi Fingerprinting Indoor Localization and its Application.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2019
HMAKE: Legacy-Compliant Multi-factor Authenticated Key Exchange from Historical Data.
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Information Security - 22nd International Conference, 2019
Proceedings of the Fuzzy Systems and Data Mining V, 2019
Proceedings of the IEEE European Symposium on Security and Privacy, 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
Neural Comput. Appl., 2018
Int. J. Inf. Sec., 2018
On the security of a provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks.
Int. J. Distributed Sens. Networks, 2018
IET Inf. Secur., 2018
The Death and Rebirth of Privacy-Preserving WiFi Fingerprint Localization with Paillier Encryption.
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Sci. China Inf. Sci., 2018
Proceedings of the Provable Security, 2018
Proceedings of the Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, 2018
Received Signal Strength Quantization for Secure Indoor Positioning via Fingerprinting.
Proceedings of the 8th International Conference on Localization and GNSS, 2018
2017
Synchronization of Chaotic Systems with Time Delays via Periodically Intermittent Control.
J. Circuits Syst. Comput., 2017
J. Inf. Secur. Appl., 2017
IET Inf. Secur., 2017
Des. Codes Cryptogr., 2017
Simpler Generic Constructions for Strongly Secure One-round Key Exchange from Weaker Assumptions.
Comput. J., 2017
Proceedings of the Information Security Practice and Experience, 2017
2016
Inf. Process. Lett., 2016
Neurocomputing, 2016
Int. J. Netw. Secur., 2016
A Lightweight Generic Compiler for Authenticated Key Exchange from Non-interactive Key Exchange with Auxiliary Input.
Int. J. Netw. Secur., 2016
Commun. Nonlinear Sci. Numer. Simul., 2016
2015
Towards modelling perfect forward secrecy in two-message authenticated key exchange under ephemeral-key revelation.
Secur. Commun. Networks, 2015
A practical strongly secure one-round authenticated key exchange protocol without random oracles.
Secur. Commun. Networks, 2015
On constructing practical multi-recipient key-encapsulation with short ciphertext and public key.
Secur. Commun. Networks, 2015
An efficient strongly secure authenticated key exchange protocol without random oracles.
Secur. Commun. Networks, 2015
Secur. Commun. Networks, 2015
2014
2013
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013