Jianying Zhou

From MaRDI portal
(Redirected from Person:394726)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Predicate private set intersection with linear complexity2023-11-10Paper
A New Functional Encryption for Multidimensional Range Query (Short Paper)
Information Security Practice and Experience
2022-12-09Paper
Lightweight delegatable proofs of storage2022-08-19Paper
Layering quantum-resistance into classical digital signature algorithms2022-07-13Paper
A modular hybrid learning approach for black-box security testing of CPS2020-01-30Paper
On the efficiency of multi-party contract signing protocols2018-10-18Paper
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
IEEE Transactions on Computers
2017-05-16Paper
<inline-formula><tex-math>$k$</tex-math><alternatives> <inline-graphic xlink:type="simple" xlink:href="huang-ieq1-2366741.gif"/></alternatives></inline-formula>-Times Attribute-Based Anonymous Access Control for Cloud Computing
IEEE Transactions on Computers
2017-05-16Paper
Accelerated Stochastic ADMM with Variance Reduction2016-11-12Paper
Privacy-preserving \(k\)-nearest neighbour query on outsourced database
Information Security and Privacy
2016-08-31Paper
PPDCP-ABE: Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption
Computer Security - ESORICS 2014
2015-07-27Paper
Leakage Resilient Proofs of Ownership in Cloud Storage, Revisited
Applied Cryptography and Network Security
2014-07-07Paper
Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts
Theoretical Computer Science
2014-06-06Paper
How to achieve non-repudiation of origin with privacy protection in cloud computing
Journal of Computer and System Sciences
2014-01-27Paper
Dynamic Secure Cloud Storage with Provenance
Cryptography and Security: From Theory to Applications
2012-06-08Paper
Hierarchical Dirichlet processes and their applications: a survey2012-01-27Paper
Achieving fairness in non-repudiation protocols2011-12-01Paper
Online/offline identity-based signcryption revisited
Information Security and Cryptology
2011-07-29Paper
Identity-based server-aided decryption
Information Security and Privacy
2011-07-07Paper
scientific article; zbMATH DE number 5901648 (Why is no real title available?)2011-05-31Paper
On shortening ciphertexts: new constructions for compact public key and stateful encryption schemes
Topics in Cryptology – CT-RSA 2011
2011-02-11Paper
Optionally identifiable private handshakes
Information Security and Cryptology
2010-11-23Paper
Validating digital signatures without TTP's time-stamping and certificate revocation
Lecture Notes in Computer Science
2010-02-09Paper
Self-enforcing private inference control
Provable Security
2009-12-11Paper
Conditional Proxy Broadcast Re-Encryption
Information Security and Privacy
2009-06-25Paper
Fuzzy Identity-based Encryption: New and Efficient Schemes
Coding and Cryptology
2009-03-09Paper
Certificate-Based Signature Schemes without Pairings or Random Oracles
Lecture Notes in Computer Science
2008-11-20Paper
Efficient Certificate-Based Encryption in the Standard Model
Lecture Notes in Computer Science
2008-11-20Paper
Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework)
Lecture Notes in Computer Science
2008-11-20Paper
A New Formal Proof Model for RFID Location Privacy
Computer Security - ESORICS 2008
2008-10-27Paper
Generic Constructions of Stateful Public Key Encryption and Their Applications
Applied Cryptography and Network Security
2008-06-13Paper
Cryptanalysis of Barni et al. Watermarking Scheme
Progress in Cryptology - INDOCRYPT 2005
2008-03-17Paper
Attacking an Asynchronous Multi-party Contract Signing Protocol
Progress in Cryptology - INDOCRYPT 2005
2008-03-17Paper
Model Generalization and Its Implications on Intrusion Detection
Applied Cryptography and Network Security
2007-09-24Paper
Trust based pervasive computing
Wuhan University Journal of Natural Sciences
2007-06-01Paper
Producing negative permittivity via quantum coherence and local field effect in dense media
Journal of Modern Optics
2007-03-23Paper
Routing optimization security in mobile IPv6
Computer Networks
2007-03-15Paper
Information and Communications Security
Lecture Notes in Computer Science
2006-10-24Paper
Information and Communications Security
Lecture Notes in Computer Science
2006-10-24Paper
Information Security and Cryptology - ICISC 2003
Lecture Notes in Computer Science
2005-12-27Paper
Progress in Cryptology - INDOCRYPT 2004
Lecture Notes in Computer Science
2005-12-22Paper
Information Security and Privacy
Lecture Notes in Computer Science
2005-09-07Paper
Information and Communications Security
Lecture Notes in Computer Science
2005-08-19Paper
scientific article; zbMATH DE number 2080691 (Why is no real title available?)2004-08-04Paper
scientific article; zbMATH DE number 2030131 (Why is no real title available?)2004-03-18Paper
scientific article; zbMATH DE number 1950351 (Why is no real title available?)2003-07-17Paper
scientific article; zbMATH DE number 1759321 (Why is no real title available?)2003-03-24Paper
scientific article; zbMATH DE number 1440048 (Why is no real title available?)2001-08-21Paper
scientific article; zbMATH DE number 1303976 (Why is no real title available?)1999-11-02Paper
scientific article; zbMATH DE number 1341885 (Why is no real title available?)1999-09-22Paper
scientific article; zbMATH DE number 1304004 (Why is no real title available?)1999-06-17Paper
scientific article; zbMATH DE number 465433 (Why is no real title available?)1994-05-15Paper
Structural instability of the mapping z\(\to \lambda \,\exp (z)(\lambda >e^{-1})\)
Science in China. Series A
1989-01-01Paper
scientific article; zbMATH DE number 4038260 (Why is no real title available?)1987-01-01Paper
scientific article; zbMATH DE number 3960608 (Why is no real title available?)1986-01-01Paper
scientific article; zbMATH DE number 3965043 (Why is no real title available?)1985-01-01Paper
scientific article; zbMATH DE number 3980083 (Why is no real title available?)1985-01-01Paper
scientific article; zbMATH DE number 3774048 (Why is no real title available?)1982-01-01Paper


Research outcomes over time


This page was built for person: Jianying Zhou