• Publications
  • Influence
On the features and challenges of security and privacy in distributed internet of things
In the Internet of Things, services can be provisioned using centralized architectures where central entities acquire, process, and provide information. Expand
  • 802
  • 40
A fair non-repudiation protocol
  • J. Zhou, D. Gollmann
  • Computer Science
  • Proceedings IEEE Symposium on Security and…
  • 6 May 1996
We present a fair non-repudiation protocol that requires a trusted third party but attempts to minimize its involvement in the execution of the protocol. Expand
  • 443
  • 34
Applying intrusion detection systems to wireless sensor networks
The research of Intrusion Detection Systems (IDS) is a mature area in wired networks, and has also attracted many attentions in wireless ad hoc networks recently. Expand
  • 249
  • 20
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
We describe new public-key cryptosystems that produce constant-size ciphertexts such that efficient delegation of decryption rights for any set of Ciphertexts are possible. Expand
  • 296
  • 17
An intensive survey of fair non-repudiation protocols
We define the properties a fair non-repudiation protocol must respect, and give a survey of the most important non- repudiation protocols without and with trusted third party (TTP). Expand
  • 277
  • 16
An efficient non-repudiation protocol
  • J. Zhou, D. Gollmann
  • Computer Science
  • Proceedings 10th Computer Security Foundations…
  • 10 June 1997
We present a variant of our fair nonrepudiation protocol (1996), where the trusted third party is involved only in the case that one party cannot obtain the expected non- repudiation evidence from the other party. Expand
  • 177
  • 14
Surveying the Development of Biometric User Authentication on Mobile Phones
We present a taxonomy of existing biometric authentication techniques on mobile phones, particularly on touch-enabled devices, with reference to 11 biometric approaches (five physiological and six behavioral). Expand
  • 162
  • 13
Linkable Ring Signature with Unconditional Anonymity
In this paper, we construct a linkable ring signature scheme with unconditional anonymity. Expand
  • 53
  • 13
Efficient online/offline identity-based signature for wireless sensor network
We present an online/offline identity-based signature scheme for the wireless sensor network (WSN). Expand
  • 132
  • 12
On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks
This paper surveys recently proposed works on Intrusion Detection Systems (IDS) in WSNs, and presents a comprehensive classification of various IDS approaches according to their employed detection techniques. Expand
  • 156
  • 12