BibTeX records: Zheng Yang 0001

download as .bib file

@article{DBLP:journals/tifs/JinYXAZ23,
  author       = {Chenglu Jin and
                  Zheng Yang and
                  Tao Xiang and
                  Sridhar Adepu and
                  Jianying Zhou},
  title        = {{HMACCE:} Establishing Authenticated and Confidential Channel From
                  Historical Data for Industrial Internet of Things},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {1080--1094},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2023.3234873},
  doi          = {10.1109/TIFS.2023.3234873},
  timestamp    = {Wed, 10 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/JinYXAZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/CaiJALY23,
  author       = {Tianyang Cai and
                  Tao Jia and
                  Sridhar Adepu and
                  Yuqi Li and
                  Zheng Yang},
  title        = {{ADAM:} An Adaptive DDoS Attack Mitigation Scheme in Software-Defined
                  Cyber-Physical System},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {19},
  number       = {6},
  pages        = {7802--7813},
  year         = {2023},
  url          = {https://doi.org/10.1109/TII.2023.3240586},
  doi          = {10.1109/TII.2023.3240586},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/CaiJALY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscwd/CaiLJZY23,
  author       = {Tianyang Cai and
                  Yuqi Li and
                  Tao Jia and
                  Leo Yu Zhang and
                  Zheng Yang},
  editor       = {Weiming Shen and
                  Jean{-}Paul A. Barth{\`{e}}s and
                  Junzhou Luo and
                  Adriana S. Vivacqua and
                  Daniel Schneider and
                  Cheng Xie and
                  Jinghui Zhang and
                  Haibin Zhu and
                  Kunkun Peng and
                  Cl{\'{a}}udia Lage Rebello da Motta},
  title        = {Catch Me If You Can: {A} New Low-Rate DDoS Attack Strategy Disguised
                  by Feint},
  booktitle    = {26th International Conference on Computer Supported Cooperative Work
                  in Design, {CSCWD} 2023, Rio de Janeiro, Brazil, May 24-26, 2023},
  pages        = {1710--1715},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CSCWD57460.2023.10152609},
  doi          = {10.1109/CSCWD57460.2023.10152609},
  timestamp    = {Tue, 06 Feb 2024 14:19:46 +0100},
  biburl       = {https://dblp.org/rec/conf/cscwd/CaiLJZY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ReijsbergenM0D023,
  author       = {Dani{\"{e}}l Reijsbergen and
                  Aung Maw and
                  Zheng Yang and
                  Tien Tuan Anh Dinh and
                  Jianying Zhou},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {{TAP:} Transparent and Privacy-Preserving Data Services},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {6489--6506},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/reijsbergen},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ReijsbergenM0D023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-15248,
  author       = {Tianyang Cai and
                  Yuqi Li and
                  Tao Jia and
                  Leo Yu Zhang and
                  Zheng Yang},
  title        = {Catch Me If You Can: {A} New Low-Rate DDoS Attack Strategy Disguised
                  by Feint},
  journal      = {CoRR},
  volume       = {abs/2306.15248},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.15248},
  doi          = {10.48550/ARXIV.2306.15248},
  eprinttype    = {arXiv},
  eprint       = {2306.15248},
  timestamp    = {Fri, 30 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-15248.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/LiuLYYH22,
  author       = {Chao Liu and
                  Xiaoyang Liu and
                  Zheng Yang and
                  Hongyu Yang and
                  Junjian Huang},
  title        = {New stability results of generalized impulsive functional differential
                  equations},
  journal      = {Sci. China Inf. Sci.},
  volume       = {65},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11432-019-2711-4},
  doi          = {10.1007/S11432-019-2711-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/LiuLYYH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/0001YKD022,
  author       = {Zheng Yang and
                  Chao Yin and
                  Junming Ke and
                  Tien Tuan Anh Dinh and
                  Jianying Zhou},
  title        = {If You Can't Beat Them, Pay Them: Bitcoin Protection Racket is Profitable},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {727--741},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3567983},
  doi          = {10.1145/3564625.3567983},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/0001YKD022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/0001DYYYC022,
  author       = {Zheng Yang and
                  Tien Tuan Anh Dinh and
                  Chao Yin and
                  Yingying Yao and
                  Dianshi Yang and
                  Xiaolin Chang and
                  Jianying Zhou},
  editor       = {Sven Dietrich and
                  Omar Chowdhury and
                  Daniel Takabi},
  title        = {{LARP:} {A} Lightweight Auto-Refreshing Pseudonym Protocol for {V2X}},
  booktitle    = {{SACMAT} '22: The 27th {ACM} Symposium on Access Control Models and
                  Technologies, New York, NY, USA, June 8 - 10, 2022},
  pages        = {49--60},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3532105.3535027},
  doi          = {10.1145/3532105.3535027},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/0001DYYYC022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-11702,
  author       = {Dani{\"{e}}l Reijsbergen and
                  Aung Maw and
                  Zheng Yang and
                  Tien Tuan Anh Dinh and
                  Jianying Zhou},
  title        = {{TAP:} Transparent and Privacy-Preserving Data Services},
  journal      = {CoRR},
  volume       = {abs/2210.11702},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.11702},
  doi          = {10.48550/ARXIV.2210.11702},
  eprinttype    = {arXiv},
  eprint       = {2210.11702},
  timestamp    = {Tue, 25 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-11702.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangJNLDZ22,
  author       = {Zheng Yang and
                  Chenglu Jin and
                  Jianting Ning and
                  Zengpeng Li and
                  Tien Tuan Anh Dinh and
                  Jianying Zhou},
  title        = {Group Time-based One-time Passwords and its Application to Efficient
                  Privacy-Preserving Proof of Location},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1280},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1280},
  timestamp    = {Sat, 22 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YangJNLDZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangDYYYCZ22,
  author       = {Zheng Yang and
                  Tien Tuan Anh Dinh and
                  Chao Yin and
                  Yingying Yao and
                  Dianshi Yang and
                  Xiaolin Chang and
                  Jianying Zhou},
  title        = {{LARP:} {A} Lightweight Auto-Refreshing Pseudonym Protocol for {V2X}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1281},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1281},
  timestamp    = {Sat, 22 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YangDYYYCZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/0001A021,
  author       = {Zheng Yang and
                  Sridhar Adepu and
                  Jianying Zhou},
  title        = {Opportunities and Challenges in Securing Critical Infrastructures
                  Through Cryptography},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {5},
  pages        = {57--65},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3090022},
  doi          = {10.1109/MSEC.2021.3090022},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/0001A021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/JosephlalAYZ21,
  author       = {Edwin Franco Myloth Josephlal and
                  Sridhar Adepu and
                  Zheng Yang and
                  Jianying Zhou},
  title        = {Enabling isolation and recovery in {PLC} redundancy framework of metro
                  train systems},
  journal      = {Int. J. Inf. Sec.},
  volume       = {20},
  number       = {6},
  pages        = {783--795},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10207-020-00529-0},
  doi          = {10.1007/S10207-020-00529-0},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/JosephlalAYZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imamci/SunLYLYH21,
  author       = {Dihua Sun and
                  Chao Liu and
                  Zheng Yang and
                  Xiaoyang Liu and
                  Hongyu Yang and
                  Junjian Huang},
  title        = {Stability of delayed switched systems via Razumikhin technique and
                  application to switched neural networks},
  journal      = {{IMA} J. Math. Control. Inf.},
  volume       = {38},
  number       = {2},
  pages        = {576--593},
  year         = {2021},
  url          = {https://doi.org/10.1093/imamci/dnaa027},
  doi          = {10.1093/IMAMCI/DNAA027},
  timestamp    = {Wed, 11 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imamci/SunLYLYH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LiYSZ21,
  author       = {Zengpeng Li and
                  Zheng Yang and
                  Pawel Szalachowski and
                  Jianying Zhou},
  title        = {Building Low-Interactivity Multifactor Authenticated Key Exchange
                  for Industrial Internet of Things},
  journal      = {{IEEE} Internet Things J.},
  volume       = {8},
  number       = {2},
  pages        = {844--859},
  year         = {2021},
  url          = {https://doi.org/10.1109/JIOT.2020.3008773},
  doi          = {10.1109/JIOT.2020.3008773},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/LiYSZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/0001BJL021,
  author       = {Zheng Yang and
                  Zhiting Bao and
                  Chenglu Jin and
                  Zhe Liu and
                  Jianying Zhou},
  title        = {PLCrypto: {A} Symmetric Cryptographic Library for Programmable Logic
                  Controllers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {3},
  pages        = {170--217},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i3.170-217},
  doi          = {10.46586/TOSC.V2021.I3.170-217},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/0001BJL021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/0001JNLD021,
  author       = {Zheng Yang and
                  Chenglu Jin and
                  Jianting Ning and
                  Zengpeng Li and
                  Anh Dinh and
                  Jianying Zhou},
  title        = {Group Time-based One-time Passwords and its Application to Efficient
                  Privacy-Preserving Proof of Location},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {497--512},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3488009},
  doi          = {10.1145/3485832.3488009},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/0001JNLD021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cpss/0001YJN021,
  author       = {Zheng Yang and
                  Chao Yin and
                  Chenglu Jin and
                  Jianting Ning and
                  Jianying Zhou},
  editor       = {Jiannong Cao and
                  Man Ho Au and
                  Mauro Conti and
                  Nils Ole Tippenhauer and
                  Alessandro Brighente},
  title        = {Lightweight Delegated Authentication with Identity Fraud Detection
                  for Cyber-physical Systems},
  booktitle    = {Proceedings of the 7th {ACM} on Cyber-Physical System Security Workshop,
                  CPSS@AsiaCCS 2021, Virtual Event / Hong Kong, 7 June 2021},
  pages        = {17--28},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3457339.3457984},
  doi          = {10.1145/3457339.3457984},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cpss/0001YJN021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ReijsbergenYMDZ21,
  author       = {Dani{\"{e}}l Reijsbergen and
                  Zheng Yang and
                  Aung Maw and
                  Tien Tuan Anh Dinh and
                  Jianying Zhou},
  editor       = {Elisa Bertino and
                  Haya Schulmann and
                  Michael Waidner},
  title        = {Transparent Electricity Pricing with Privacy},
  booktitle    = {Computer Security - {ESORICS} 2021 - 26th European Symposium on Research
                  in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12973},
  pages        = {439--460},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-88428-4\_22},
  doi          = {10.1007/978-3-030-88428-4\_22},
  timestamp    = {Tue, 17 Oct 2023 10:41:56 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/ReijsbergenYMDZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2104-07949,
  author       = {Dani{\"{e}}l Reijsbergen and
                  Zheng Yang and
                  Aung Maw and
                  Tien Tuan Anh Dinh and
                  Jianying Zhou},
  title        = {Transparent Electricity Pricing with Privacy},
  journal      = {CoRR},
  volume       = {abs/2104.07949},
  year         = {2021},
  url          = {https://arxiv.org/abs/2104.07949},
  eprinttype    = {arXiv},
  eprint       = {2104.07949},
  timestamp    = {Wed, 22 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2104-07949.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeejas/LiuYLH20,
  author       = {Chao Liu and
                  Zheng Yang and
                  Xiaoyang Liu and
                  Xianying Huang},
  title        = {Stability of delayed switched systems with state-dependent switching},
  journal      = {{IEEE} {CAA} J. Autom. Sinica},
  volume       = {7},
  number       = {3},
  pages        = {872--881},
  year         = {2020},
  url          = {https://doi.org/10.1109/jas.2019.1911624},
  doi          = {10.1109/JAS.2019.1911624},
  timestamp    = {Wed, 11 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeejas/LiuYLH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/JarvinenKSTY20,
  author       = {Kimmo J{\"{a}}rvinen and
                  {\'{A}}gnes Kiss and
                  Thomas Schneider and
                  Oleksandr Tkachenko and
                  Zheng Yang},
  title        = {Faster privacy-preserving location proximity schemes for circles and
                  polygons},
  journal      = {{IET} Inf. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {254--265},
  year         = {2020},
  url          = {https://doi.org/10.1049/iet-ifs.2019.0125},
  doi          = {10.1049/IET-IFS.2019.0125},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/JarvinenKSTY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/YangHTZ20,
  author       = {Zheng Yang and
                  Jun He and
                  Yangguang Tian and
                  Jianying Zhou},
  title        = {Faster Authenticated Key Agreement With Perfect Forward Secrecy for
                  Industrial Internet-of-Things},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {16},
  number       = {10},
  pages        = {6584--6596},
  year         = {2020},
  url          = {https://doi.org/10.1109/TII.2019.2963328},
  doi          = {10.1109/TII.2019.2963328},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/YangHTZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/0001JTL020,
  author       = {Zheng Yang and
                  Chenglu Jin and
                  Yangguang Tian and
                  Junyu Lai and
                  Jianying Zhou},
  editor       = {Hung{-}Min Sun and
                  Shiuh{-}Pyng Shieh and
                  Guofei Gu and
                  Giuseppe Ateniese},
  title        = {LiS: Lightweight Signature Schemes for Continuous Message Authentication
                  in Cyber-Physical Systems},
  booktitle    = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications
                  Security, Taipei, Taiwan, October 5-9, 2020},
  pages        = {719--731},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3320269.3372195},
  doi          = {10.1145/3320269.3372195},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/0001JTL020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/Yang019,
  author       = {Zheng Yang and
                  Kimmo J{\"{a}}rvinen},
  title        = {Towards Modeling Privacy in WiFi Fingerprinting Indoor Localization
                  and its Application},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {10},
  number       = {1},
  pages        = {4--22},
  year         = {2019},
  url          = {https://doi.org/10.22667/JOWUA.2019.03.31.004},
  doi          = {10.22667/JOWUA.2019.03.31.004},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/Yang019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosn/YangLSZ19,
  author       = {Zheng Yang and
                  Junyu Lai and
                  Yingbing Sun and
                  Jianying Zhou},
  title        = {A Novel Authenticated Key Agreement Protocol With Dynamic Credential
                  for WSNs},
  journal      = {{ACM} Trans. Sens. Networks},
  volume       = {15},
  number       = {2},
  pages        = {22:1--22:27},
  year         = {2019},
  url          = {https://doi.org/10.1145/3303704},
  doi          = {10.1145/3303704},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosn/YangLSZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/JinYD019,
  author       = {Chenglu Jin and
                  Zheng Yang and
                  Marten van Dijk and
                  Jianying Zhou},
  editor       = {David Balenson},
  title        = {Proof of aliveness},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {1--16},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359827},
  doi          = {10.1145/3359789.3359827},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/JinYD019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/0001LLR0TY19,
  author       = {Kimmo J{\"{a}}rvinen and
                  Helena Lepp{\"{a}}koski and
                  Elena Simona Lohan and
                  Philipp Richter and
                  Thomas Schneider and
                  Oleksandr Tkachenko and
                  Zheng Yang},
  title        = {{PILOT:} Practical Privacy-Preserving Indoor Localization Using OuTsourcing},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2019, Stockholm, Sweden, June 17-19, 2019},
  pages        = {448--463},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EuroSP.2019.00040},
  doi          = {10.1109/EUROSP.2019.00040},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/0001LLR0TY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fsdm/LuoYY019,
  author       = {Song Luo and
                  Su Yu and
                  Lu Yan and
                  Zheng Yang},
  editor       = {Antonio J. Tall{\'{o}}n{-}Ballesteros},
  title        = {An Improved Unbounded {HIBE} Scheme in the Prime Order Setting},
  booktitle    = {Fuzzy Systems and Data Mining {V} - Proceedings of {FSDM} 2019, Kitakyushu
                  City, Japan, October 18-21, 2019},
  series       = {Frontiers in Artificial Intelligence and Applications},
  volume       = {320},
  pages        = {1111--1117},
  publisher    = {{IOS} Press},
  year         = {2019},
  url          = {https://doi.org/10.3233/FAIA190291},
  doi          = {10.3233/FAIA190291},
  timestamp    = {Tue, 14 Jan 2020 11:25:32 +0100},
  biburl       = {https://dblp.org/rec/conf/fsdm/LuoYY019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/KeSZXY19,
  author       = {Junming Ke and
                  Pawel Szalachowski and
                  Jianying Zhou and
                  Qiuliang Xu and
                  Zheng Yang},
  editor       = {Zhiqiang Lin and
                  Charalampos Papamanthou and
                  Michalis Polychronakis},
  title        = {{IBWH:} An Intermittent Block Withholding Attack with Optimal Mining
                  Reward Rate},
  booktitle    = {Information Security - 22nd International Conference, {ISC} 2019,
                  New York City, NY, USA, September 16-18, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11723},
  pages        = {3--24},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30215-3\_1},
  doi          = {10.1007/978-3-030-30215-3\_1},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/KeSZXY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JinYAZ19,
  author       = {Chenglu Jin and
                  Zheng Yang and
                  Sridhar Adepu and
                  Jianying Zhou},
  title        = {{HMAKE:} Legacy-Compliant Multi-factor Authenticated Key Exchange
                  from Historical Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {450},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/450},
  timestamp    = {Fri, 31 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JinYAZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/YangL18,
  author       = {Zheng Yang and
                  Junyu Lai},
  title        = {New constructions for (multiparty) one-round key exchange with strong
                  security},
  journal      = {Sci. China Inf. Sci.},
  volume       = {61},
  number       = {5},
  pages        = {059102:1--059102:3},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11432-017-9177-7},
  doi          = {10.1007/S11432-017-9177-7},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/YangL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/YangLL18,
  author       = {Zheng Yang and
                  Junyu Lai and
                  Guoyuan Li},
  title        = {Cryptanalysis of a generic one-round key exchange protocol with strong
                  security},
  journal      = {{IET} Inf. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {71--78},
  year         = {2018},
  url          = {https://doi.org/10.1049/iet-ifs.2017.0055},
  doi          = {10.1049/IET-IFS.2017.0055},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/YangLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/He0ZLL18,
  author       = {Jun He and
                  Zheng Yang and
                  Jianxun Zhang and
                  Wanping Liu and
                  Chao Liu},
  title        = {On the security of a provably secure, efficient, and flexible authentication
                  scheme for ad hoc wireless sensor networks},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {14},
  number       = {1},
  year         = {2018},
  url          = {https://doi.org/10.1177/1550147718756311},
  doi          = {10.1177/1550147718756311},
  timestamp    = {Wed, 11 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdsn/He0ZLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/YangLLZL18,
  author       = {Zheng Yang and
                  Chao Liu and
                  Wanping Liu and
                  Daigu Zhang and
                  Song Luo},
  title        = {A new strong security model for stateful authenticated group key exchange},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {4},
  pages        = {423--440},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-017-0373-1},
  doi          = {10.1007/S10207-017-0373-1},
  timestamp    = {Wed, 11 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/YangLLZL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nca/Liu0SLL18,
  author       = {Chao Liu and
                  Zheng Yang and
                  Dihua Sun and
                  Xiaoyang Liu and
                  Wanping Liu},
  title        = {Stability of switched neural networks with time-varying delays},
  journal      = {Neural Comput. Appl.},
  volume       = {30},
  number       = {7},
  pages        = {2229--2244},
  year         = {2018},
  url          = {https://doi.org/10.1007/s00521-016-2805-7},
  doi          = {10.1007/S00521-016-2805-7},
  timestamp    = {Wed, 11 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/nca/Liu0SLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/0001K0TY18,
  author       = {Kimmo J{\"{a}}rvinen and
                  {\'{A}}gnes Kiss and
                  Thomas Schneider and
                  Oleksandr Tkachenko and
                  Zheng Yang},
  editor       = {Jan Camenisch and
                  Panos Papadimitratos},
  title        = {Faster Privacy-Preserving Location Proximity Schemes},
  booktitle    = {Cryptology and Network Security - 17th International Conference, {CANS}
                  2018, Naples, Italy, September 30 - October 3, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11124},
  pages        = {3--22},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00434-7\_1},
  doi          = {10.1007/978-3-030-00434-7\_1},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/0001K0TY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/Yang0L18,
  author       = {Zheng Yang and
                  Yu Chen and
                  Song Luo},
  editor       = {Nigel P. Smart},
  title        = {Two-Message Key Exchange with Strong Security from Ideal Lattices},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers' Track at
                  the {RSA} Conference 2018, San Francisco, CA, USA, April 16-20, 2018,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10808},
  pages        = {98--115},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76953-0\_6},
  doi          = {10.1007/978-3-319-76953-0\_6},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/Yang0L18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icl-gnss/RichterLLYJTS18,
  author       = {Philipp Richter and
                  Helena Lepp{\"{a}}koski and
                  Elena Simona Lohan and
                  Zheng Yang and
                  Kimmo J{\"{a}}rvinen and
                  Oleksandr Tkachenko and
                  Thomas Schneider},
  title        = {Received Signal Strength Quantization for Secure Indoor Positioning
                  via Fingerprinting},
  booktitle    = {8th International Conference on Localization and GNSS, {ICL-GNSS}
                  2018, Guimaraes, Portugal, June 26-28, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICL-GNSS.2018.8440910},
  doi          = {10.1109/ICL-GNSS.2018.8440910},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icl-gnss/RichterLLYJTS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/Yang018,
  author       = {Zheng Yang and
                  Kimmo J{\"{a}}rvinen},
  title        = {The Death and Rebirth of Privacy-Preserving WiFi Fingerprint Localization
                  with Paillier Encryption},
  booktitle    = {2018 {IEEE} Conference on Computer Communications, {INFOCOM} 2018,
                  Honolulu, HI, USA, April 16-19, 2018},
  pages        = {1223--1231},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/INFOCOM.2018.8486221},
  doi          = {10.1109/INFOCOM.2018.8486221},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/Yang018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/0001KLH18,
  author       = {Zheng Yang and
                  Mohsin Khan and
                  Wanping Liu and
                  Jun He},
  editor       = {Nils Gruschka},
  title        = {On Security Analysis of Generic Dynamic Authenticated Group Key Exchange},
  booktitle    = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo,
                  Norway, November 28-30, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11252},
  pages        = {121--137},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03638-6\_8},
  doi          = {10.1007/978-3-030-03638-6\_8},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/0001KLH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/Yang018,
  author       = {Zheng Yang and
                  Kimmo J{\"{a}}rvinen},
  editor       = {Joonsang Baek and
                  Willy Susilo and
                  Jongkil Kim},
  title        = {Modeling Privacy in WiFi Fingerprinting Indoor Localization},
  booktitle    = {Provable Security - 12th International Conference, ProvSec 2018, Jeju,
                  South Korea, October 25-28, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11192},
  pages        = {329--346},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01446-9\_19},
  doi          = {10.1007/978-3-030-01446-9\_19},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/Yang018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangJ18,
  author       = {Zheng Yang and
                  Kimmo J{\"{a}}rvinen},
  title        = {The Death and Rebirth of Privacy-Preserving WiFi Fingerprint Localization
                  with Paillier Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {259},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/259},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YangJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Yang0L18,
  author       = {Zheng Yang and
                  Yu Chen and
                  Song Luo},
  title        = {Two-message Key Exchange with Strong Security from Ideal Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {361},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/361},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Yang0L18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JarvinenKSTY18,
  author       = {Kimmo J{\"{a}}rvinen and
                  {\'{A}}gnes Kiss and
                  Thomas Schneider and
                  Oleksandr Tkachenko and
                  Zheng Yang},
  title        = {Faster Privacy-Preserving Location Proximity Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {694},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/694},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JarvinenKSTY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/YangLLLL17,
  author       = {Zheng Yang and
                  Junyu Lai and
                  Chao Liu and
                  Wanping Liu and
                  Shuangqing Li},
  title        = {Simpler Generic Constructions for Strongly Secure One-round Key Exchange
                  from Weaker Assumptions},
  journal      = {Comput. J.},
  volume       = {60},
  number       = {8},
  pages        = {1145--1160},
  year         = {2017},
  url          = {https://doi.org/10.1093/comjnl/bxw095},
  doi          = {10.1093/COMJNL/BXW095},
  timestamp    = {Wed, 11 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/YangLLLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChenMYSGZ17,
  author       = {Rongmao Chen and
                  Yi Mu and
                  Guomin Yang and
                  Willy Susilo and
                  Fuchun Guo and
                  Zheng Yang},
  title        = {A note on the strong authenticated key exchange with auxiliary inputs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {85},
  number       = {1},
  pages        = {175--178},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-017-0386-9},
  doi          = {10.1007/S10623-017-0386-9},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChenMYSGZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/YangLLLL17,
  author       = {Zheng Yang and
                  Junyu Lai and
                  Wanping Liu and
                  Chao Liu and
                  Song Luo},
  title        = {SignORKE: improving pairing-based one-round key exchange without random
                  oracles},
  journal      = {{IET} Inf. Secur.},
  volume       = {11},
  number       = {5},
  pages        = {243--249},
  year         = {2017},
  url          = {https://doi.org/10.1049/iet-ifs.2016.0320},
  doi          = {10.1049/IET-IFS.2016.0320},
  timestamp    = {Wed, 11 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/YangLLLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YangLLL17,
  author       = {Zheng Yang and
                  Chao Liu and
                  Wanping Liu and
                  Song Luo},
  title        = {Randomized authentication primitive problem in key exchange with strong
                  security},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {36},
  pages        = {127--134},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jisa.2017.09.001},
  doi          = {10.1016/J.JISA.2017.09.001},
  timestamp    = {Wed, 11 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/YangLLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsc/LiuYSLL17,
  author       = {Chao Liu and
                  Zheng Yang and
                  Dihua Sun and
                  Xiaoyang Liu and
                  Wanping Liu},
  title        = {Synchronization of Chaotic Systems with Time Delays via Periodically
                  Intermittent Control},
  journal      = {J. Circuits Syst. Comput.},
  volume       = {26},
  number       = {9},
  pages        = {1750139:1--1750139:20},
  year         = {2017},
  url          = {https://doi.org/10.1142/S0218126617501390},
  doi          = {10.1142/S0218126617501390},
  timestamp    = {Wed, 11 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsc/LiuYSLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/LuoYWY17,
  author       = {Song Luo and
                  Lu Yan and
                  Jian Weng and
                  Zheng Yang},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {New Proof for {BKP} {IBE} Scheme and Improvement in the {MIMC} Setting},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {136--155},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_8},
  doi          = {10.1007/978-3-319-72359-4\_8},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/LuoYWY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cnsns/LiuL0LZW16,
  author       = {Wanping Liu and
                  Chao Liu and
                  Zheng Yang and
                  Xiaoyang Liu and
                  Yihao Zhang and
                  Zuxue Wei},
  title        = {Modeling the propagation of mobile malware on complex networks},
  journal      = {Commun. Nonlinear Sci. Numer. Simul.},
  volume       = {37},
  pages        = {249--264},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cnsns.2016.01.019},
  doi          = {10.1016/J.CNSNS.2016.01.019},
  timestamp    = {Fri, 19 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cnsns/LiuL0LZW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/YangZ16,
  author       = {Zheng Yang and
                  Daigu Zhang},
  title        = {Towards Modelling Perfect Forward Secrecy for One-round Group Key
                  Exchange},
  journal      = {Int. J. Netw. Secur.},
  volume       = {18},
  number       = {2},
  pages        = {304--315},
  year         = {2016},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v18-n2/ijns-2016-v18-n2-p304-315.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/YangZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/YangLLLLL16,
  author       = {Zheng Yang and
                  Chao Liu and
                  Wanping Liu and
                  Song Luo and
                  Hua Long and
                  Shuangqing Li},
  title        = {A Lightweight Generic Compiler for Authenticated Key Exchange from
                  Non-interactive Key Exchange with Auxiliary Input},
  journal      = {Int. J. Netw. Secur.},
  volume       = {18},
  number       = {6},
  pages        = {1109--1121},
  year         = {2016},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v18-n6/ijns-2016-v18-n6-p1109-1121.pdf},
  timestamp    = {Wed, 11 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/YangLLLLL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijon/LiuLYLLZ16,
  author       = {Chao Liu and
                  Wanping Liu and
                  Zheng Yang and
                  Xiaoyang Liu and
                  Chuandong Li and
                  Guangjian Zhang},
  title        = {Stability of neural networks with delay and variable-time impulses},
  journal      = {Neurocomputing},
  volume       = {171},
  pages        = {1644--1654},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.neucom.2015.07.007},
  doi          = {10.1016/J.NEUCOM.2015.07.007},
  timestamp    = {Wed, 11 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijon/LiuLYLLZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/YangL16,
  author       = {Zheng Yang and
                  Shuangqing Li},
  title        = {On security analysis of an after-the-fact leakage resilient key exchange
                  protocol},
  journal      = {Inf. Process. Lett.},
  volume       = {116},
  number       = {1},
  pages        = {33--40},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.ipl.2015.08.006},
  doi          = {10.1016/J.IPL.2015.08.006},
  timestamp    = {Thu, 04 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ipl/YangL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Yang15,
  author       = {Zheng Yang},
  title        = {A new efficient signcryption scheme in the standard model},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {5},
  pages        = {778--789},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1034},
  doi          = {10.1002/SEC.1034},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Yang15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YangY15,
  author       = {Zheng Yang and
                  Wu Yang},
  title        = {A practical strongly secure one-round authenticated key exchange protocol
                  without random oracles},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {6},
  pages        = {1118--1131},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1067},
  doi          = {10.1002/SEC.1067},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YangY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Yang15a,
  author       = {Zheng Yang},
  title        = {An efficient strongly secure authenticated key exchange protocol without
                  random oracles},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {8},
  pages        = {1461--1473},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1095},
  doi          = {10.1002/SEC.1095},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Yang15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YangYZZ15,
  author       = {Zheng Yang and
                  Wu Yang and
                  Lingyun Zhu and
                  Daigu Zhang},
  title        = {Towards modelling perfect forward secrecy in two-message authenticated
                  key exchange under ephemeral-key revelation},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3356--3371},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1263},
  doi          = {10.1002/SEC.1263},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YangYZZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Yang15b,
  author       = {Zheng Yang},
  title        = {On constructing practical multi-recipient key-encapsulation with short
                  ciphertext and public key},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {4191--4202},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1334},
  doi          = {10.1002/SEC.1334},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Yang15b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YangG14,
  author       = {Zheng Yang and
                  Fei Guo},
  title        = {Authenticated key exchange with synchronized state},
  journal      = {Secur. Commun. Networks},
  volume       = {7},
  number       = {12},
  pages        = {2373--2388},
  year         = {2014},
  url          = {https://doi.org/10.1002/sec.948},
  doi          = {10.1002/SEC.948},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YangG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/Yang13,
  author       = {Zheng Yang},
  editor       = {Jean{-}Luc Danger and
                  Mourad Debbabi and
                  Jean{-}Yves Marion and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Nur Zincir{-}Heywood},
  title        = {Modelling Simultaneous Mutual Authentication for Authenticated Key
                  Exchange},
  booktitle    = {Foundations and Practice of Security - 6th International Symposium,
                  {FPS} 2013, La Rochelle, France, October 21-22, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8352},
  pages        = {46--62},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-05302-8\_4},
  doi          = {10.1007/978-3-319-05302-8\_4},
  timestamp    = {Fri, 08 Dec 2023 07:53:07 +0100},
  biburl       = {https://dblp.org/rec/conf/fps/Yang13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics