Name
Papers
Collaborators
JIANYING ZHOU
292
406
Citations 
PageRank 
Referers 
2868
229.06
5405
Referees 
References 
3707
3150
Search Limit
1001000
Title
Citations
PageRank
Year
Modular Framework for Constructing IoT-Server AKE in Post-Quantum Setting00.342022
Challenges of post-quantum digital signing in real-world applications: a survey00.342022
Reinshard: An Optimally Sharded Dual-Blockchain for Concurrency Resolution00.342022
zkrpChain: Towards multi-party privacy-preserving data auditing for consortium blockchains based on zero-knowledge range proofs00.342022
A Secure Two-Factor Authentication Scheme From Password-Protected Hardware Tokens00.342022
Securing Password Authentication for Web-based Applications00.342022
LARP: A Lightweight Auto-Refreshing Pseudonym Protocol for V2X00.342022
Toward Safe Integration of Legacy SCADA Systems in the Smart Grid00.342022
Calibrating Learning Parity with Noise Authentication for Low-Resource Devices00.342022
Enabling isolation and recovery in PLC redundancy framework of metro train systems00.342021
Lightweight Delegated Authentication with Identity Fraud Detection for Cyber-physical Systems00.342021
Building Low-Interactivity Multifactor Authenticated Key Exchange for Industrial Internet of Things10.362021
Applied Cryptography and Network Security Workshops - ACNS 2021 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, and SiMLA, Kamakura, Japan, June 21-24, 2021, Proceedings.00.342021
Bigdata-Facilitated Two-Party Authenticated Key Exchange for IoT00.342021
Transparent Electricity Pricing with Privacy00.342021
A Policy-Based Reinforcement Learning Approach for High-Speed Railway Timetable Rescheduling.00.342021
Shaping Blockchain Technology For Securing Supply Chains00.342021
Server-Aided Bilateral Access Control For Secure Data Sharing With Dynamic User Groups00.342021
Plcrypto: A Symmetric Cryptographic Library For Programmable Logic Controllers00.342021
Modeling Social Worm Propagation For Advanced Persistent Threats00.342021
Attacks on smart grid: power supply interruption and malicious power generation00.342020
A Tale of Two Testbeds: A Comparative Study of Attack Detection Techniques in CPS20.392020
Right-of-Stake: Deterministic and Fair Blockchain Leader Election with Hidden Leader00.342020
Information and Communications Security - 21st International Conference, ICICS 2019, Beijing, China, December 15-17, 2019, Revised Selected Papers00.342020
Applied Cryptography and Network Security - 18th International Conference, ACNS 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part II.00.342020
A Survey of Digital Signing in the Post Quantum Era.00.342019
Careful-Packing - A Practical and Scalable Anti-Tampering Software Protection enforced by Trusted Computing.00.342019
Patt: Physics-Based Attestation Of Control Systems00.342019
HMAKE: Legacy-Compliant Multi-factor Authenticated Key Exchange from Historical Data.00.342019
Magic Train: Design of Measurement Methods against Bandwidth Inflation Attacks.00.342018
NoisePrint: Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems.50.402018
NoisePrint: Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems.00.342018
Efficient privacy-preserving charging station reservation system for electric vehicles10.352016
Cyber And Physical Access Control In Legacy System Using Passwords00.342016
Privacy-Preserving k-Nearest Neighbour Query on Outsourced Database.20.352016
Complying with Security Requirements in Cloud Storage Systems.00.342016
Credential Wrapping: From Anonymous Password Authentication to Anonymous Biometric Authentication.20.362016
Time-Bound Anonymous Authentication for Roaming Networks140.562015
k-Times Attribute-Based Anonymous Access Control for Cloud Computing.00.342015
Surveying the Development of Biometric User Authentication on Mobile Phones481.502015
Protecting the internet of things.00.342014
Lightweight and Privacy-Preserving Delegatable Proofs of Storage.00.342014
Collaborative agglomerative document clustering with limited information disclosure00.342014
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage411.162014
On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks431.542013
Achieving Revocable Fine-Grained Cryptographic Access Control Over Cloud Data20.382013
Weak leakage-resilient client-side deduplication of encrypted data in cloud storage381.302013
Launching generic attacks on iOS with approved third-party applications110.772013
An Asynchronous Optimistic Protocol for Atomic Multi-Two-Party Contract Signing.20.362013
Dynamic secure cloud storage with provenance201.002012
  • 1
  • 2