Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Zheng Yang 0001
@article{DBLP:journals/tifs/JinYXAZ23, author = {Chenglu Jin and Zheng Yang and Tao Xiang and Sridhar Adepu and Jianying Zhou}, title = {{HMACCE:} Establishing Authenticated and Confidential Channel From Historical Data for Industrial Internet of Things}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {1080--1094}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2023.3234873}, doi = {10.1109/TIFS.2023.3234873}, timestamp = {Wed, 10 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/JinYXAZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/CaiJALY23, author = {Tianyang Cai and Tao Jia and Sridhar Adepu and Yuqi Li and Zheng Yang}, title = {{ADAM:} An Adaptive DDoS Attack Mitigation Scheme in Software-Defined Cyber-Physical System}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {19}, number = {6}, pages = {7802--7813}, year = {2023}, url = {https://doi.org/10.1109/TII.2023.3240586}, doi = {10.1109/TII.2023.3240586}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/CaiJALY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscwd/CaiLJZY23, author = {Tianyang Cai and Yuqi Li and Tao Jia and Leo Yu Zhang and Zheng Yang}, editor = {Weiming Shen and Jean{-}Paul A. Barth{\`{e}}s and Junzhou Luo and Adriana S. Vivacqua and Daniel Schneider and Cheng Xie and Jinghui Zhang and Haibin Zhu and Kunkun Peng and Cl{\'{a}}udia Lage Rebello da Motta}, title = {Catch Me If You Can: {A} New Low-Rate DDoS Attack Strategy Disguised by Feint}, booktitle = {26th International Conference on Computer Supported Cooperative Work in Design, {CSCWD} 2023, Rio de Janeiro, Brazil, May 24-26, 2023}, pages = {1710--1715}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CSCWD57460.2023.10152609}, doi = {10.1109/CSCWD57460.2023.10152609}, timestamp = {Tue, 06 Feb 2024 14:19:46 +0100}, biburl = {https://dblp.org/rec/conf/cscwd/CaiLJZY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ReijsbergenM0D023, author = {Dani{\"{e}}l Reijsbergen and Aung Maw and Zheng Yang and Tien Tuan Anh Dinh and Jianying Zhou}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {{TAP:} Transparent and Privacy-Preserving Data Services}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {6489--6506}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/reijsbergen}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/ReijsbergenM0D023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-15248, author = {Tianyang Cai and Yuqi Li and Tao Jia and Leo Yu Zhang and Zheng Yang}, title = {Catch Me If You Can: {A} New Low-Rate DDoS Attack Strategy Disguised by Feint}, journal = {CoRR}, volume = {abs/2306.15248}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.15248}, doi = {10.48550/ARXIV.2306.15248}, eprinttype = {arXiv}, eprint = {2306.15248}, timestamp = {Fri, 30 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-15248.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/LiuLYYH22, author = {Chao Liu and Xiaoyang Liu and Zheng Yang and Hongyu Yang and Junjian Huang}, title = {New stability results of generalized impulsive functional differential equations}, journal = {Sci. China Inf. Sci.}, volume = {65}, number = {2}, year = {2022}, url = {https://doi.org/10.1007/s11432-019-2711-4}, doi = {10.1007/S11432-019-2711-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/LiuLYYH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/0001YKD022, author = {Zheng Yang and Chao Yin and Junming Ke and Tien Tuan Anh Dinh and Jianying Zhou}, title = {If You Can't Beat Them, Pay Them: Bitcoin Protection Racket is Profitable}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {727--741}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3567983}, doi = {10.1145/3564625.3567983}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/0001YKD022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/0001DYYYC022, author = {Zheng Yang and Tien Tuan Anh Dinh and Chao Yin and Yingying Yao and Dianshi Yang and Xiaolin Chang and Jianying Zhou}, editor = {Sven Dietrich and Omar Chowdhury and Daniel Takabi}, title = {{LARP:} {A} Lightweight Auto-Refreshing Pseudonym Protocol for {V2X}}, booktitle = {{SACMAT} '22: The 27th {ACM} Symposium on Access Control Models and Technologies, New York, NY, USA, June 8 - 10, 2022}, pages = {49--60}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3532105.3535027}, doi = {10.1145/3532105.3535027}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/0001DYYYC022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-11702, author = {Dani{\"{e}}l Reijsbergen and Aung Maw and Zheng Yang and Tien Tuan Anh Dinh and Jianying Zhou}, title = {{TAP:} Transparent and Privacy-Preserving Data Services}, journal = {CoRR}, volume = {abs/2210.11702}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.11702}, doi = {10.48550/ARXIV.2210.11702}, eprinttype = {arXiv}, eprint = {2210.11702}, timestamp = {Tue, 25 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-11702.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YangJNLDZ22, author = {Zheng Yang and Chenglu Jin and Jianting Ning and Zengpeng Li and Tien Tuan Anh Dinh and Jianying Zhou}, title = {Group Time-based One-time Passwords and its Application to Efficient Privacy-Preserving Proof of Location}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1280}, year = {2022}, url = {https://eprint.iacr.org/2022/1280}, timestamp = {Sat, 22 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YangJNLDZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YangDYYYCZ22, author = {Zheng Yang and Tien Tuan Anh Dinh and Chao Yin and Yingying Yao and Dianshi Yang and Xiaolin Chang and Jianying Zhou}, title = {{LARP:} {A} Lightweight Auto-Refreshing Pseudonym Protocol for {V2X}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1281}, year = {2022}, url = {https://eprint.iacr.org/2022/1281}, timestamp = {Sat, 22 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YangDYYYCZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/0001A021, author = {Zheng Yang and Sridhar Adepu and Jianying Zhou}, title = {Opportunities and Challenges in Securing Critical Infrastructures Through Cryptography}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {5}, pages = {57--65}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3090022}, doi = {10.1109/MSEC.2021.3090022}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/0001A021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/JosephlalAYZ21, author = {Edwin Franco Myloth Josephlal and Sridhar Adepu and Zheng Yang and Jianying Zhou}, title = {Enabling isolation and recovery in {PLC} redundancy framework of metro train systems}, journal = {Int. J. Inf. Sec.}, volume = {20}, number = {6}, pages = {783--795}, year = {2021}, url = {https://doi.org/10.1007/s10207-020-00529-0}, doi = {10.1007/S10207-020-00529-0}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/JosephlalAYZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imamci/SunLYLYH21, author = {Dihua Sun and Chao Liu and Zheng Yang and Xiaoyang Liu and Hongyu Yang and Junjian Huang}, title = {Stability of delayed switched systems via Razumikhin technique and application to switched neural networks}, journal = {{IMA} J. Math. Control. Inf.}, volume = {38}, number = {2}, pages = {576--593}, year = {2021}, url = {https://doi.org/10.1093/imamci/dnaa027}, doi = {10.1093/IMAMCI/DNAA027}, timestamp = {Wed, 11 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imamci/SunLYLYH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/LiYSZ21, author = {Zengpeng Li and Zheng Yang and Pawel Szalachowski and Jianying Zhou}, title = {Building Low-Interactivity Multifactor Authenticated Key Exchange for Industrial Internet of Things}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {2}, pages = {844--859}, year = {2021}, url = {https://doi.org/10.1109/JIOT.2020.3008773}, doi = {10.1109/JIOT.2020.3008773}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/LiYSZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/0001BJL021, author = {Zheng Yang and Zhiting Bao and Chenglu Jin and Zhe Liu and Jianying Zhou}, title = {PLCrypto: {A} Symmetric Cryptographic Library for Programmable Logic Controllers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {3}, pages = {170--217}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i3.170-217}, doi = {10.46586/TOSC.V2021.I3.170-217}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/0001BJL021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/0001JNLD021, author = {Zheng Yang and Chenglu Jin and Jianting Ning and Zengpeng Li and Anh Dinh and Jianying Zhou}, title = {Group Time-based One-time Passwords and its Application to Efficient Privacy-Preserving Proof of Location}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {497--512}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3488009}, doi = {10.1145/3485832.3488009}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/0001JNLD021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cpss/0001YJN021, author = {Zheng Yang and Chao Yin and Chenglu Jin and Jianting Ning and Jianying Zhou}, editor = {Jiannong Cao and Man Ho Au and Mauro Conti and Nils Ole Tippenhauer and Alessandro Brighente}, title = {Lightweight Delegated Authentication with Identity Fraud Detection for Cyber-physical Systems}, booktitle = {Proceedings of the 7th {ACM} on Cyber-Physical System Security Workshop, CPSS@AsiaCCS 2021, Virtual Event / Hong Kong, 7 June 2021}, pages = {17--28}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3457339.3457984}, doi = {10.1145/3457339.3457984}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cpss/0001YJN021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ReijsbergenYMDZ21, author = {Dani{\"{e}}l Reijsbergen and Zheng Yang and Aung Maw and Tien Tuan Anh Dinh and Jianying Zhou}, editor = {Elisa Bertino and Haya Schulmann and Michael Waidner}, title = {Transparent Electricity Pricing with Privacy}, booktitle = {Computer Security - {ESORICS} 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12973}, pages = {439--460}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88428-4\_22}, doi = {10.1007/978-3-030-88428-4\_22}, timestamp = {Tue, 17 Oct 2023 10:41:56 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ReijsbergenYMDZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2104-07949, author = {Dani{\"{e}}l Reijsbergen and Zheng Yang and Aung Maw and Tien Tuan Anh Dinh and Jianying Zhou}, title = {Transparent Electricity Pricing with Privacy}, journal = {CoRR}, volume = {abs/2104.07949}, year = {2021}, url = {https://arxiv.org/abs/2104.07949}, eprinttype = {arXiv}, eprint = {2104.07949}, timestamp = {Wed, 22 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2104-07949.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeejas/LiuYLH20, author = {Chao Liu and Zheng Yang and Xiaoyang Liu and Xianying Huang}, title = {Stability of delayed switched systems with state-dependent switching}, journal = {{IEEE} {CAA} J. Autom. Sinica}, volume = {7}, number = {3}, pages = {872--881}, year = {2020}, url = {https://doi.org/10.1109/jas.2019.1911624}, doi = {10.1109/JAS.2019.1911624}, timestamp = {Wed, 11 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeejas/LiuYLH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/JarvinenKSTY20, author = {Kimmo J{\"{a}}rvinen and {\'{A}}gnes Kiss and Thomas Schneider and Oleksandr Tkachenko and Zheng Yang}, title = {Faster privacy-preserving location proximity schemes for circles and polygons}, journal = {{IET} Inf. Secur.}, volume = {14}, number = {3}, pages = {254--265}, year = {2020}, url = {https://doi.org/10.1049/iet-ifs.2019.0125}, doi = {10.1049/IET-IFS.2019.0125}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-ifs/JarvinenKSTY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/YangHTZ20, author = {Zheng Yang and Jun He and Yangguang Tian and Jianying Zhou}, title = {Faster Authenticated Key Agreement With Perfect Forward Secrecy for Industrial Internet-of-Things}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {16}, number = {10}, pages = {6584--6596}, year = {2020}, url = {https://doi.org/10.1109/TII.2019.2963328}, doi = {10.1109/TII.2019.2963328}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/YangHTZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/0001JTL020, author = {Zheng Yang and Chenglu Jin and Yangguang Tian and Junyu Lai and Jianying Zhou}, editor = {Hung{-}Min Sun and Shiuh{-}Pyng Shieh and Guofei Gu and Giuseppe Ateniese}, title = {LiS: Lightweight Signature Schemes for Continuous Message Authentication in Cyber-Physical Systems}, booktitle = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020}, pages = {719--731}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3320269.3372195}, doi = {10.1145/3320269.3372195}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/0001JTL020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/Yang019, author = {Zheng Yang and Kimmo J{\"{a}}rvinen}, title = {Towards Modeling Privacy in WiFi Fingerprinting Indoor Localization and its Application}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {10}, number = {1}, pages = {4--22}, year = {2019}, url = {https://doi.org/10.22667/JOWUA.2019.03.31.004}, doi = {10.22667/JOWUA.2019.03.31.004}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/Yang019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosn/YangLSZ19, author = {Zheng Yang and Junyu Lai and Yingbing Sun and Jianying Zhou}, title = {A Novel Authenticated Key Agreement Protocol With Dynamic Credential for WSNs}, journal = {{ACM} Trans. Sens. Networks}, volume = {15}, number = {2}, pages = {22:1--22:27}, year = {2019}, url = {https://doi.org/10.1145/3303704}, doi = {10.1145/3303704}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosn/YangLSZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/JinYD019, author = {Chenglu Jin and Zheng Yang and Marten van Dijk and Jianying Zhou}, editor = {David Balenson}, title = {Proof of aliveness}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {1--16}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359827}, doi = {10.1145/3359789.3359827}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/JinYD019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/0001LLR0TY19, author = {Kimmo J{\"{a}}rvinen and Helena Lepp{\"{a}}koski and Elena Simona Lohan and Philipp Richter and Thomas Schneider and Oleksandr Tkachenko and Zheng Yang}, title = {{PILOT:} Practical Privacy-Preserving Indoor Localization Using OuTsourcing}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2019, Stockholm, Sweden, June 17-19, 2019}, pages = {448--463}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EuroSP.2019.00040}, doi = {10.1109/EUROSP.2019.00040}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/0001LLR0TY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fsdm/LuoYY019, author = {Song Luo and Su Yu and Lu Yan and Zheng Yang}, editor = {Antonio J. Tall{\'{o}}n{-}Ballesteros}, title = {An Improved Unbounded {HIBE} Scheme in the Prime Order Setting}, booktitle = {Fuzzy Systems and Data Mining {V} - Proceedings of {FSDM} 2019, Kitakyushu City, Japan, October 18-21, 2019}, series = {Frontiers in Artificial Intelligence and Applications}, volume = {320}, pages = {1111--1117}, publisher = {{IOS} Press}, year = {2019}, url = {https://doi.org/10.3233/FAIA190291}, doi = {10.3233/FAIA190291}, timestamp = {Tue, 14 Jan 2020 11:25:32 +0100}, biburl = {https://dblp.org/rec/conf/fsdm/LuoYY019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/KeSZXY19, author = {Junming Ke and Pawel Szalachowski and Jianying Zhou and Qiuliang Xu and Zheng Yang}, editor = {Zhiqiang Lin and Charalampos Papamanthou and Michalis Polychronakis}, title = {{IBWH:} An Intermittent Block Withholding Attack with Optimal Mining Reward Rate}, booktitle = {Information Security - 22nd International Conference, {ISC} 2019, New York City, NY, USA, September 16-18, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11723}, pages = {3--24}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30215-3\_1}, doi = {10.1007/978-3-030-30215-3\_1}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/KeSZXY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JinYAZ19, author = {Chenglu Jin and Zheng Yang and Sridhar Adepu and Jianying Zhou}, title = {{HMAKE:} Legacy-Compliant Multi-factor Authenticated Key Exchange from Historical Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {450}, year = {2019}, url = {https://eprint.iacr.org/2019/450}, timestamp = {Fri, 31 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JinYAZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/YangL18, author = {Zheng Yang and Junyu Lai}, title = {New constructions for (multiparty) one-round key exchange with strong security}, journal = {Sci. China Inf. Sci.}, volume = {61}, number = {5}, pages = {059102:1--059102:3}, year = {2018}, url = {https://doi.org/10.1007/s11432-017-9177-7}, doi = {10.1007/S11432-017-9177-7}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/YangL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/YangLL18, author = {Zheng Yang and Junyu Lai and Guoyuan Li}, title = {Cryptanalysis of a generic one-round key exchange protocol with strong security}, journal = {{IET} Inf. Secur.}, volume = {12}, number = {1}, pages = {71--78}, year = {2018}, url = {https://doi.org/10.1049/iet-ifs.2017.0055}, doi = {10.1049/IET-IFS.2017.0055}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/YangLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/He0ZLL18, author = {Jun He and Zheng Yang and Jianxun Zhang and Wanping Liu and Chao Liu}, title = {On the security of a provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks}, journal = {Int. J. Distributed Sens. Networks}, volume = {14}, number = {1}, year = {2018}, url = {https://doi.org/10.1177/1550147718756311}, doi = {10.1177/1550147718756311}, timestamp = {Wed, 11 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdsn/He0ZLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/YangLLZL18, author = {Zheng Yang and Chao Liu and Wanping Liu and Daigu Zhang and Song Luo}, title = {A new strong security model for stateful authenticated group key exchange}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {4}, pages = {423--440}, year = {2018}, url = {https://doi.org/10.1007/s10207-017-0373-1}, doi = {10.1007/S10207-017-0373-1}, timestamp = {Wed, 11 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/YangLLZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nca/Liu0SLL18, author = {Chao Liu and Zheng Yang and Dihua Sun and Xiaoyang Liu and Wanping Liu}, title = {Stability of switched neural networks with time-varying delays}, journal = {Neural Comput. Appl.}, volume = {30}, number = {7}, pages = {2229--2244}, year = {2018}, url = {https://doi.org/10.1007/s00521-016-2805-7}, doi = {10.1007/S00521-016-2805-7}, timestamp = {Wed, 11 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nca/Liu0SLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/0001K0TY18, author = {Kimmo J{\"{a}}rvinen and {\'{A}}gnes Kiss and Thomas Schneider and Oleksandr Tkachenko and Zheng Yang}, editor = {Jan Camenisch and Panos Papadimitratos}, title = {Faster Privacy-Preserving Location Proximity Schemes}, booktitle = {Cryptology and Network Security - 17th International Conference, {CANS} 2018, Naples, Italy, September 30 - October 3, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11124}, pages = {3--22}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00434-7\_1}, doi = {10.1007/978-3-030-00434-7\_1}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/0001K0TY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/Yang0L18, author = {Zheng Yang and Yu Chen and Song Luo}, editor = {Nigel P. Smart}, title = {Two-Message Key Exchange with Strong Security from Ideal Lattices}, booktitle = {Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers' Track at the {RSA} Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10808}, pages = {98--115}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76953-0\_6}, doi = {10.1007/978-3-319-76953-0\_6}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/Yang0L18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icl-gnss/RichterLLYJTS18, author = {Philipp Richter and Helena Lepp{\"{a}}koski and Elena Simona Lohan and Zheng Yang and Kimmo J{\"{a}}rvinen and Oleksandr Tkachenko and Thomas Schneider}, title = {Received Signal Strength Quantization for Secure Indoor Positioning via Fingerprinting}, booktitle = {8th International Conference on Localization and GNSS, {ICL-GNSS} 2018, Guimaraes, Portugal, June 26-28, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICL-GNSS.2018.8440910}, doi = {10.1109/ICL-GNSS.2018.8440910}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icl-gnss/RichterLLYJTS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/Yang018, author = {Zheng Yang and Kimmo J{\"{a}}rvinen}, title = {The Death and Rebirth of Privacy-Preserving WiFi Fingerprint Localization with Paillier Encryption}, booktitle = {2018 {IEEE} Conference on Computer Communications, {INFOCOM} 2018, Honolulu, HI, USA, April 16-19, 2018}, pages = {1223--1231}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/INFOCOM.2018.8486221}, doi = {10.1109/INFOCOM.2018.8486221}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/Yang018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/0001KLH18, author = {Zheng Yang and Mohsin Khan and Wanping Liu and Jun He}, editor = {Nils Gruschka}, title = {On Security Analysis of Generic Dynamic Authenticated Group Key Exchange}, booktitle = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11252}, pages = {121--137}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03638-6\_8}, doi = {10.1007/978-3-030-03638-6\_8}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/0001KLH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/Yang018, author = {Zheng Yang and Kimmo J{\"{a}}rvinen}, editor = {Joonsang Baek and Willy Susilo and Jongkil Kim}, title = {Modeling Privacy in WiFi Fingerprinting Indoor Localization}, booktitle = {Provable Security - 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11192}, pages = {329--346}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01446-9\_19}, doi = {10.1007/978-3-030-01446-9\_19}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/Yang018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YangJ18, author = {Zheng Yang and Kimmo J{\"{a}}rvinen}, title = {The Death and Rebirth of Privacy-Preserving WiFi Fingerprint Localization with Paillier Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {259}, year = {2018}, url = {http://eprint.iacr.org/2018/259}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YangJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Yang0L18, author = {Zheng Yang and Yu Chen and Song Luo}, title = {Two-message Key Exchange with Strong Security from Ideal Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {361}, year = {2018}, url = {https://eprint.iacr.org/2018/361}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Yang0L18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JarvinenKSTY18, author = {Kimmo J{\"{a}}rvinen and {\'{A}}gnes Kiss and Thomas Schneider and Oleksandr Tkachenko and Zheng Yang}, title = {Faster Privacy-Preserving Location Proximity Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {694}, year = {2018}, url = {https://eprint.iacr.org/2018/694}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JarvinenKSTY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/YangLLLL17, author = {Zheng Yang and Junyu Lai and Chao Liu and Wanping Liu and Shuangqing Li}, title = {Simpler Generic Constructions for Strongly Secure One-round Key Exchange from Weaker Assumptions}, journal = {Comput. J.}, volume = {60}, number = {8}, pages = {1145--1160}, year = {2017}, url = {https://doi.org/10.1093/comjnl/bxw095}, doi = {10.1093/COMJNL/BXW095}, timestamp = {Wed, 11 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/YangLLLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChenMYSGZ17, author = {Rongmao Chen and Yi Mu and Guomin Yang and Willy Susilo and Fuchun Guo and Zheng Yang}, title = {A note on the strong authenticated key exchange with auxiliary inputs}, journal = {Des. Codes Cryptogr.}, volume = {85}, number = {1}, pages = {175--178}, year = {2017}, url = {https://doi.org/10.1007/s10623-017-0386-9}, doi = {10.1007/S10623-017-0386-9}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChenMYSGZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/YangLLLL17, author = {Zheng Yang and Junyu Lai and Wanping Liu and Chao Liu and Song Luo}, title = {SignORKE: improving pairing-based one-round key exchange without random oracles}, journal = {{IET} Inf. Secur.}, volume = {11}, number = {5}, pages = {243--249}, year = {2017}, url = {https://doi.org/10.1049/iet-ifs.2016.0320}, doi = {10.1049/IET-IFS.2016.0320}, timestamp = {Wed, 11 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-ifs/YangLLLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YangLLL17, author = {Zheng Yang and Chao Liu and Wanping Liu and Song Luo}, title = {Randomized authentication primitive problem in key exchange with strong security}, journal = {J. Inf. Secur. Appl.}, volume = {36}, pages = {127--134}, year = {2017}, url = {https://doi.org/10.1016/j.jisa.2017.09.001}, doi = {10.1016/J.JISA.2017.09.001}, timestamp = {Wed, 11 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/YangLLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsc/LiuYSLL17, author = {Chao Liu and Zheng Yang and Dihua Sun and Xiaoyang Liu and Wanping Liu}, title = {Synchronization of Chaotic Systems with Time Delays via Periodically Intermittent Control}, journal = {J. Circuits Syst. Comput.}, volume = {26}, number = {9}, pages = {1750139:1--1750139:20}, year = {2017}, url = {https://doi.org/10.1142/S0218126617501390}, doi = {10.1142/S0218126617501390}, timestamp = {Wed, 11 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsc/LiuYSLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LuoYWY17, author = {Song Luo and Lu Yan and Jian Weng and Zheng Yang}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {New Proof for {BKP} {IBE} Scheme and Improvement in the {MIMC} Setting}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {136--155}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_8}, doi = {10.1007/978-3-319-72359-4\_8}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/LuoYWY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cnsns/LiuL0LZW16, author = {Wanping Liu and Chao Liu and Zheng Yang and Xiaoyang Liu and Yihao Zhang and Zuxue Wei}, title = {Modeling the propagation of mobile malware on complex networks}, journal = {Commun. Nonlinear Sci. Numer. Simul.}, volume = {37}, pages = {249--264}, year = {2016}, url = {https://doi.org/10.1016/j.cnsns.2016.01.019}, doi = {10.1016/J.CNSNS.2016.01.019}, timestamp = {Fri, 19 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cnsns/LiuL0LZW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/YangZ16, author = {Zheng Yang and Daigu Zhang}, title = {Towards Modelling Perfect Forward Secrecy for One-round Group Key Exchange}, journal = {Int. J. Netw. Secur.}, volume = {18}, number = {2}, pages = {304--315}, year = {2016}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v18-n2/ijns-2016-v18-n2-p304-315.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/YangZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/YangLLLLL16, author = {Zheng Yang and Chao Liu and Wanping Liu and Song Luo and Hua Long and Shuangqing Li}, title = {A Lightweight Generic Compiler for Authenticated Key Exchange from Non-interactive Key Exchange with Auxiliary Input}, journal = {Int. J. Netw. Secur.}, volume = {18}, number = {6}, pages = {1109--1121}, year = {2016}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v18-n6/ijns-2016-v18-n6-p1109-1121.pdf}, timestamp = {Wed, 11 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/YangLLLLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/LiuLYLLZ16, author = {Chao Liu and Wanping Liu and Zheng Yang and Xiaoyang Liu and Chuandong Li and Guangjian Zhang}, title = {Stability of neural networks with delay and variable-time impulses}, journal = {Neurocomputing}, volume = {171}, pages = {1644--1654}, year = {2016}, url = {https://doi.org/10.1016/j.neucom.2015.07.007}, doi = {10.1016/J.NEUCOM.2015.07.007}, timestamp = {Wed, 11 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijon/LiuLYLLZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/YangL16, author = {Zheng Yang and Shuangqing Li}, title = {On security analysis of an after-the-fact leakage resilient key exchange protocol}, journal = {Inf. Process. Lett.}, volume = {116}, number = {1}, pages = {33--40}, year = {2016}, url = {https://doi.org/10.1016/j.ipl.2015.08.006}, doi = {10.1016/J.IPL.2015.08.006}, timestamp = {Thu, 04 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ipl/YangL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Yang15, author = {Zheng Yang}, title = {A new efficient signcryption scheme in the standard model}, journal = {Secur. Commun. Networks}, volume = {8}, number = {5}, pages = {778--789}, year = {2015}, url = {https://doi.org/10.1002/sec.1034}, doi = {10.1002/SEC.1034}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Yang15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YangY15, author = {Zheng Yang and Wu Yang}, title = {A practical strongly secure one-round authenticated key exchange protocol without random oracles}, journal = {Secur. Commun. Networks}, volume = {8}, number = {6}, pages = {1118--1131}, year = {2015}, url = {https://doi.org/10.1002/sec.1067}, doi = {10.1002/SEC.1067}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YangY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Yang15a, author = {Zheng Yang}, title = {An efficient strongly secure authenticated key exchange protocol without random oracles}, journal = {Secur. Commun. Networks}, volume = {8}, number = {8}, pages = {1461--1473}, year = {2015}, url = {https://doi.org/10.1002/sec.1095}, doi = {10.1002/SEC.1095}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Yang15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YangYZZ15, author = {Zheng Yang and Wu Yang and Lingyun Zhu and Daigu Zhang}, title = {Towards modelling perfect forward secrecy in two-message authenticated key exchange under ephemeral-key revelation}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3356--3371}, year = {2015}, url = {https://doi.org/10.1002/sec.1263}, doi = {10.1002/SEC.1263}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YangYZZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Yang15b, author = {Zheng Yang}, title = {On constructing practical multi-recipient key-encapsulation with short ciphertext and public key}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {4191--4202}, year = {2015}, url = {https://doi.org/10.1002/sec.1334}, doi = {10.1002/SEC.1334}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Yang15b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YangG14, author = {Zheng Yang and Fei Guo}, title = {Authenticated key exchange with synchronized state}, journal = {Secur. Commun. Networks}, volume = {7}, number = {12}, pages = {2373--2388}, year = {2014}, url = {https://doi.org/10.1002/sec.948}, doi = {10.1002/SEC.948}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YangG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/Yang13, author = {Zheng Yang}, editor = {Jean{-}Luc Danger and Mourad Debbabi and Jean{-}Yves Marion and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Nur Zincir{-}Heywood}, title = {Modelling Simultaneous Mutual Authentication for Authenticated Key Exchange}, booktitle = {Foundations and Practice of Security - 6th International Symposium, {FPS} 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8352}, pages = {46--62}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05302-8\_4}, doi = {10.1007/978-3-319-05302-8\_4}, timestamp = {Fri, 08 Dec 2023 07:53:07 +0100}, biburl = {https://dblp.org/rec/conf/fps/Yang13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.