On the features and challenges of security and privacy in distributed internet of things R Roman, J Zhou, J Lopez Computer networks 57 (10), 2266-2279, 2013 | 1427 | 2013 |
A fair non-repudiation protocol J Zhou, D Gollmann IEEE S&P'96, 55-61, 1996 | 716 | 1996 |
Key-aggregate cryptosystem for scalable data sharing in cloud storage CK Chu, SSM Chow, WG Tzeng, J Zhou, RH Deng IEEE Transactions on Parallel and Distributed Systems 25 (2), 468-477, 2014 | 447 | 2014 |
An intensive survey of fair non-repudiation protocols S Kremer, O Markowitch, J Zhou Computer Communications 25 (17), 1606-1621, 2002 | 419 | 2002 |
Applying intrusion detection systems to wireless sensor networks R Roman, J Zhou, J Lopez IEEE CCNC'06, 640-644, 2006 | 358 | 2006 |
Surveying the development of biometric user authentication on mobile phones W Meng, D Wong, S Furnell, J Zhou IEEE Communications Surveys & Tutorials 17 (3), 1268-1293, 2015 | 294 | 2015 |
Weak leakage-resilient client-side deduplication of encrypted data in cloud storage J Xu, EC Chang, J Zhou ACM AsiaCCS'13, 195-206, 2013 | 294* | 2013 |
A generic framework for three-factor authentication: Preserving security and privacy in distributed systems X Huang, Y Xiang, A Chonka, J Zhou, RH Deng IEEE Transactions on Parallel and Distributed Systems 22 (8), 1390-1397, 2011 | 276 | 2011 |
On the vital areas of intrusion detection systems in wireless sensor networks A Abduvaliyev, A Pathan, J Zhou, R Roman, W Wong IEEE Communications Surveys & Tutorials 15 (3), 1223-1237, 2013 | 263 | 2013 |
An efficient non-repudiation protocol J Zhou, D Gollmann IEEE CSFW'97, 126-132, 1997 | 240 | 1997 |
Improving privacy and security in decentralized ciphertext-policy attribute-based encryption J Han, W Susilo, Y Mu, J Zhou, MHA Au IEEE Transactions on Information Forensics and Security 10 (3), 665-678, 2015 | 197 | 2015 |
HealthDep: An efficient and secure deduplication scheme for cloud-sssisted eHealth systems Y Zhang, C Xu, H Li, K Yang, J Zhou, X Lin IEEE Transactions on Industrial Informatics 14 (9), 4101-4112, 2018 | 181 | 2018 |
Efficient online/offline identity-based signature for wireless sensor network JK Liu, J Baek, J Zhou, Y Yang, JW Wong International Journal of Information Security 9 (4), 287-296, 2010 | 170 | 2010 |
Conditional proxy broadcast re-encryption CK Chu, J Weng, S Chow, J Zhou, R Deng ACISP'09, 327-342, 2009 | 163 | 2009 |
Cost-effective authentic and anonymous data sharing with forward security X Huang, J Liu, S Tang, Y Xiang, K Liang, L Xu, J Zhou IEEE Transactions on Computers 64 (4), 971-983, 2015 | 156 | 2015 |
Dynamic secure cloud storage with provenance SSM Chow, CK Chu, X Huang, J Zhou, RH Deng Cryptography and Security: From Theory to Applications: Essays Dedicated to …, 2012 | 153 | 2012 |
Towards verification of non-repudiation protocols J Zhou, D Gollmann IRW'98, 370-380, 1998 | 147 | 1998 |
Robust multi-factor authentication for fragile communications X Huang, Y Xiang, E Bertino, J Zhou, L Xu IEEE Transactions on Dependable and Secure Computing 11 (6), 568-581, 2014 | 146 | 2014 |
Some remarks on a fair exchange protocol J Zhou, R Deng, F Bao PKC'00, 46-57, 2000 | 138 | 2000 |
Detecting node replication attacks in wireless sensor networks: a survey WT Zhu, J Zhou, RH Deng, F Bao Journal of Network and Computer Applications 35 (3), 1022-1034, 2012 | 137 | 2012 |