Cryptographers' World
 

Jianying Zhou


Author's Web Page Link

10 papers in database with 167 citations 

Editor of 4 conference proceedings books

H-number: 5

Conference Proceedings

 
1. Jianying ZhouMoti YungFeng Bao, editors, Applied Cryptography and Network Security, 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings. Springer, 2006. ISBN 3-540-34703-8.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

2. Markus JakobssonMoti YungJianying Zhou, editors, Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings. Springer, 2004. ISBN 3-540-22217-0.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

3. Feng BaoRobert H. DengJianying Zhou, editors, Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004. Springer, 2004. ISBN 3-540-21018-0.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

4. Jianying ZhouMoti YungYongfei Han, editors, Applied Cryptography and Network Security, First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings. Springer, 2003. ISBN 3-540-20208-0.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Joonsang Baek,  Willy Susilo,  Joseph K. Liu,  Jianying Zhou,  A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack, pp. 143 - 155, ACNS 2009.

[Electronic Edition][No citation]

2. Joseph K. Liu,  Jianying Zhou,  An Efficient Identity-Based Online/Offline Encryption Scheme, pp. 156 - 167, ACNS 2009.

[Electronic Edition][Cited 4 times ]

3. Joonsang Baek,  Jianying Zhou,  Feng Bao,  Generic Constructions of Stateful Public Key Encryption and Their Applications, pp. 75 - 93, ACNS 2008.

[Electronic Edition][Cited 5 times ]

4. Tanmoy Kanti Das,  Jianying Zhou,  Cryptanalysis of Barni et al. Watermarking Scheme, pp. 197 - 208, INDOCRYPT 2005.

[Electronic Edition][No citation]

5. Jose Antonio Onieva,  Jianying Zhou,  Javier Lopez,  Attacking an Asynchronous Multi-party Contract Signing Protocol, pp. 311 - 321, INDOCRYPT 2005.

[Electronic Edition][Cited 3 times ]

6. Zhuowei Li,  Amitabha Das,  Jianying Zhou,  Model Generalization and Its Implications on Intrusion Detection, pp. 222 - 237, ACNS 2005.

[Electronic Edition][Cited 8 times ]

7. Guilin Wang,  Feng Bao,  Jianying Zhou,  On the Security of a Certified E-Mail Scheme, pp. 48 - 60, INDOCRYPT 2004.

[Electronic Edition][Cited 10 times ]

8. Jianying Zhou,  Robert H. Deng,  Feng Bao,  Some Remarks on a Fair Exchange Protocol, pp. 46 - 57, PKC 2000.

[Electronic Edition][Cited 63 times Red Star]

9. Jianying Zhou,  Kwok-Yan Lam,  A Secure Pay-per View Scheme for Web-Based Video Service, pp. 315 - 326, PKC 1999.

[Electronic Edition][Cited 9 times ]

10. Jianying Zhou,  Dieter Gollmann,  Observations on Non-repudiation, pp. 133 - 144, ASIACRYPT 1996.

[Electronic Edition][Cited 65 times Red Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...