Modeling the propagation of mobile malware on complex networks W Liu, C Liu, Z Yang, X Liu, Y Zhang, Z Wei Communications in Nonlinear Science and Numerical Simulation 37, 249-264, 2016 | 67 | 2016 |
On the Security of the Pre-Shared Key Ciphersuites of TLS Y Li, S Schäge, Z Yang, F Kohlar, J Schwenk 17th International Conference on Practice and Theory in Public-Key …, 2014 | 45 | 2014 |
The death and rebirth of privacy-preserving WiFi fingerprint localization with Paillier encryption Z Yang, K Järvinen IEEE INFOCOM 2018-IEEE conference on computer communications, 1223-1231, 2018 | 38 | 2018 |
PILOT: Practical privacy-preserving indoor localization using outsourcing K Järvinen, H Leppäkoski, ES Lohan, P Richter, T Schneider, ... 2019 IEEE European Symposium on Security and Privacy (EuroS&P), 448-463, 2019 | 30 | 2019 |
Efficient eck-secure authenticated key exchange protocols in the standard model Z Yang International Conference on Information and Communications Security, 185-193, 2013 | 27 | 2013 |
Faster authenticated key agreement with perfect forward secrecy for industrial internet-of-things Z Yang, J He, Y Tian, J Zhou IEEE Transactions on Industrial Informatics 16 (10), 6584-6596, 2019 | 22 | 2019 |
Stability of neural networks with delay and variable-time impulses C Liu, W Liu, Z Yang, X Liu, C Li, G Zhang Neurocomputing 171, 1644-1654, 2016 | 17 | 2016 |
A novel authenticated key agreement protocol with dynamic credential for WSNs Z Yang, J Lai, Y Sun, J Zhou ACM Transactions on Sensor Networks (TOSN) 15 (2), 1-27, 2019 | 16 | 2019 |
New modular compilers for authenticated key exchange Y Li, S Schäge, Z Yang, C Bader, J Schwenk International Conference on Applied Cryptography and Network Security, 1-18, 2014 | 15 | 2014 |
Is it all a conspiracy? Conspiracy theories and people’s attitude to COVID-19 vaccination Z Yang, X Luo, H Jia Vaccines 9 (10), 1051, 2021 | 14 | 2021 |
Faster privacy-preserving location proximity schemes K Järvinen, Á Kiss, T Schneider, O Tkachenko, Z Yang International Conference on Cryptology and Network Security, 3-22, 2018 | 13 | 2018 |
On the security of a provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks J He, Z Yang, J Zhang, W Liu, C Liu International Journal of Distributed Sensor Networks 14 (1), 1550147718756311, 2018 | 13 | 2018 |
Stability of switched neural networks with time-varying delays C Liu, Z Yang, D Sun, X Liu, W Liu Neural Computing and Applications 30 (7), 2229-2244, 2018 | 12 | 2018 |
On security analysis of an after-the-fact leakage resilient key exchange protocol Z Yang, S Li Information Processing Letters 116 (1), 33-40, 2016 | 12 | 2016 |
Network emulation as a service (neaas): Towards a cloud-based network emulation platform J Lai, J Tian, K Zhang, Z Yang, D Jiang Mobile Networks and Applications 26 (2), 766-780, 2021 | 10 | 2021 |
Ibwh: an intermittent block withholding attack with optimal mining reward rate J Ke, P Szalachowski, J Zhou, Q Xu, Z Yang International Conference on Information Security, 3-24, 2019 | 10 | 2019 |
Building low-interactivity multifactor authenticated key exchange for industrial internet of things Z Li, Z Yang, P Szalachowski, J Zhou IEEE Internet of Things Journal 8 (2), 844-859, 2020 | 8 | 2020 |
Modeling privacy in WiFi fingerprinting indoor localization Z Yang, K Järvinen International Conference on Provable Security, 329-346, 2018 | 8 | 2018 |
Towards Modelling Perfect Forward Secrecy for One-round Group Key Exchange. Z Yang, D Zhang Int. J. Netw. Secur. 18 (2), 304-315, 2016 | 8 | 2016 |
Strongly secure one-round group authenticated key exchange in the standard model Y Li, Z Yang International Conference on Cryptology and Network Security, 122-138, 2013 | 8 | 2013 |