Yang Zheng
Cited by
Cited by
Modeling the propagation of mobile malware on complex networks
W Liu, C Liu, Z Yang, X Liu, Y Zhang, Z Wei
Communications in Nonlinear Science and Numerical Simulation 37, 249-264, 2016
On the Security of the Pre-Shared Key Ciphersuites of TLS
Y Li, S Schäge, Z Yang, F Kohlar, J Schwenk
17th International Conference on Practice and Theory in Public-Key …, 2014
The death and rebirth of privacy-preserving WiFi fingerprint localization with Paillier encryption
Z Yang, K Järvinen
IEEE INFOCOM 2018-IEEE conference on computer communications, 1223-1231, 2018
PILOT: Practical privacy-preserving indoor localization using outsourcing
K Järvinen, H Leppäkoski, ES Lohan, P Richter, T Schneider, ...
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 448-463, 2019
Efficient eck-secure authenticated key exchange protocols in the standard model
Z Yang
International Conference on Information and Communications Security, 185-193, 2013
Faster authenticated key agreement with perfect forward secrecy for industrial internet-of-things
Z Yang, J He, Y Tian, J Zhou
IEEE Transactions on Industrial Informatics 16 (10), 6584-6596, 2019
Stability of neural networks with delay and variable-time impulses
C Liu, W Liu, Z Yang, X Liu, C Li, G Zhang
Neurocomputing 171, 1644-1654, 2016
A novel authenticated key agreement protocol with dynamic credential for WSNs
Z Yang, J Lai, Y Sun, J Zhou
ACM Transactions on Sensor Networks (TOSN) 15 (2), 1-27, 2019
New modular compilers for authenticated key exchange
Y Li, S Schäge, Z Yang, C Bader, J Schwenk
International Conference on Applied Cryptography and Network Security, 1-18, 2014
Is it all a conspiracy? Conspiracy theories and people’s attitude to COVID-19 vaccination
Z Yang, X Luo, H Jia
Vaccines 9 (10), 1051, 2021
Faster privacy-preserving location proximity schemes
K Järvinen, Á Kiss, T Schneider, O Tkachenko, Z Yang
International Conference on Cryptology and Network Security, 3-22, 2018
On the security of a provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks
J He, Z Yang, J Zhang, W Liu, C Liu
International Journal of Distributed Sensor Networks 14 (1), 1550147718756311, 2018
Stability of switched neural networks with time-varying delays
C Liu, Z Yang, D Sun, X Liu, W Liu
Neural Computing and Applications 30 (7), 2229-2244, 2018
On security analysis of an after-the-fact leakage resilient key exchange protocol
Z Yang, S Li
Information Processing Letters 116 (1), 33-40, 2016
Network emulation as a service (neaas): Towards a cloud-based network emulation platform
J Lai, J Tian, K Zhang, Z Yang, D Jiang
Mobile Networks and Applications 26 (2), 766-780, 2021
Ibwh: an intermittent block withholding attack with optimal mining reward rate
J Ke, P Szalachowski, J Zhou, Q Xu, Z Yang
International Conference on Information Security, 3-24, 2019
Building low-interactivity multifactor authenticated key exchange for industrial internet of things
Z Li, Z Yang, P Szalachowski, J Zhou
IEEE Internet of Things Journal 8 (2), 844-859, 2020
Modeling privacy in WiFi fingerprinting indoor localization
Z Yang, K Järvinen
International Conference on Provable Security, 329-346, 2018
Towards Modelling Perfect Forward Secrecy for One-round Group Key Exchange.
Z Yang, D Zhang
Int. J. Netw. Secur. 18 (2), 304-315, 2016
Strongly secure one-round group authenticated key exchange in the standard model
Y Li, Z Yang
International Conference on Cryptology and Network Security, 122-138, 2013
The system can't perform the operation now. Try again later.
Articles 1–20