• Publications
  • Influence
On the features and challenges of security and privacy in distributed internet of things
tl;dr
In the Internet of Things, services can be provisioned using centralized architectures where central entities acquire, process, and provide information. Expand
  • 802
  • 40
A fair non-repudiation protocol
  • J. Zhou, D. Gollmann
  • Computer Science
  • Proceedings IEEE Symposium on Security and…
  • 6 May 1996
tl;dr
We present a fair non-repudiation protocol that requires a trusted third party but attempts to minimize its involvement in the execution of the protocol. Expand
  • 443
  • 34
Applying intrusion detection systems to wireless sensor networks
tl;dr
The research of Intrusion Detection Systems (IDS) is a mature area in wired networks, and has also attracted many attentions in wireless ad hoc networks recently. Expand
  • 249
  • 20
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
tl;dr
We describe new public-key cryptosystems that produce constant-size ciphertexts such that efficient delegation of decryption rights for any set of Ciphertexts are possible. Expand
  • 296
  • 17
An intensive survey of fair non-repudiation protocols
tl;dr
We define the properties a fair non-repudiation protocol must respect, and give a survey of the most important non- repudiation protocols without and with trusted third party (TTP). Expand
  • 277
  • 16
An efficient non-repudiation protocol
  • J. Zhou, D. Gollmann
  • Computer Science
  • Proceedings 10th Computer Security Foundations…
  • 10 June 1997
tl;dr
We present a variant of our fair nonrepudiation protocol (1996), where the trusted third party is involved only in the case that one party cannot obtain the expected non- repudiation evidence from the other party. Expand
  • 177
  • 14
Surveying the Development of Biometric User Authentication on Mobile Phones
tl;dr
We present a taxonomy of existing biometric authentication techniques on mobile phones, particularly on touch-enabled devices, with reference to 11 biometric approaches (five physiological and six behavioral). Expand
  • 162
  • 13
Linkable Ring Signature with Unconditional Anonymity
tl;dr
In this paper, we construct a linkable ring signature scheme with unconditional anonymity. Expand
  • 53
  • 13
Efficient online/offline identity-based signature for wireless sensor network
tl;dr
We present an online/offline identity-based signature scheme for the wireless sensor network (WSN). Expand
  • 132
  • 12
On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks
tl;dr
This paper surveys recently proposed works on Intrusion Detection Systems (IDS) in WSNs, and presents a comprehensive classification of various IDS approaches according to their employed detection techniques. Expand
  • 156
  • 12