• Publications
  • Influence
On the features and challenges of security and privacy in distributed internet of things
TLDR
In the Internet of Things, services can be provisioned using centralized architectures where central entities acquire, process, and provide information. Expand
  • 869
  • 41
  • PDF
A fair non-repudiation protocol
  • J. Zhou, D. Gollmann
  • Computer Science
  • Proceedings IEEE Symposium on Security and…
  • 6 May 1996
TLDR
We present a fair non-repudiation protocol that requires a trusted third party but attempts to minimize its involvement in the execution of the protocol. Expand
  • 453
  • 35
  • PDF
Applying intrusion detection systems to wireless sensor networks
TLDR
The research of Intrusion Detection Systems (IDS) is a mature area in wired networks, and has also attracted many attentions in wireless ad hoc networks recently. Expand
  • 260
  • 21
  • PDF
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
TLDR
We describe new public-key cryptosystems that produce constant-size ciphertexts such that efficient delegation of decryption rights for any set of Ciphertexts are possible. Expand
  • 318
  • 18
  • PDF
An intensive survey of fair non-repudiation protocols
TLDR
We define the properties a fair non-repudiation protocol must respect, and give a survey of the most important non- repudiation protocols without and with trusted third party (TTP). Expand
  • 280
  • 16
  • PDF
Surveying the Development of Biometric User Authentication on Mobile Phones
TLDR
We present a taxonomy of existing biometric authentication techniques on mobile phones, particularly on touch-enabled devices, with reference to 11 biometric approaches (five physiological and six behavioral). Expand
  • 189
  • 14
An efficient non-repudiation protocol
  • J. Zhou, D. Gollmann
  • Computer Science
  • Proceedings 10th Computer Security Foundations…
  • 10 June 1997
TLDR
We present a variant of our fair nonrepudiation protocol (1996), where the trusted third party is involved only in the case that one party cannot obtain the expected non- repudiation evidence from the other party. Expand
  • 180
  • 14
Linkable Ring Signature with Unconditional Anonymity
TLDR
In this paper, we construct a linkable ring signature scheme with unconditional anonymity. Expand
  • 57
  • 13
Efficient online/offline identity-based signature for wireless sensor network
TLDR
We present an online/offline identity-based signature scheme for the wireless sensor network (WSN). Expand
  • 137
  • 12
  • PDF
On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks
TLDR
This paper surveys recently proposed works on Intrusion Detection Systems (IDS) in WSNs, and presents a comprehensive classification of various IDS approaches according to their employed detection techniques. Expand
  • 173
  • 12
  • PDF
...
1
2
3
4
5
...