What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Zheng Yan
Google Scholar
ORCID:
0000-0002-9697-2108
17
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
AuthScatter: Accurate, Robust, and Scalable Mutual Authentication in Physical Layer for Backscatter Communications.
Yifan Zhang
Boxuan Xie
Yishan Yang
Zheng Yan
Riku Jäntti
Zhu Han
2025
journals/tifs
HABC: A Mutual and Handover Authentication Scheme for Backscatter Communications With High Robustness.
Yishan Yang
Zheng Yan
Niya Luo
Jiajun Li
Mianxiong Dong
Kaoru Ota
2025
conf/sp
P2C2T: Preserving the Privacy of Cross-Chain Transfer.
Panpan Han
Zheng Yan
Laurence T. Yang
Elisa Bertino
2024
journals/tifs
BatchAuth: A Physical Layer Batch Authentication Scheme for Multiple Backscatter Devices.
Yishan Yang
Jiajun Li
Niya Luo
Zheng Yan
Yifan Zhang
Kai Zeng
2024
journals/tifs
BGKey: Group Key Generation for Backscatter Communications Among Multiple Devices.
Jiajun Li
Pu Wang
Zheng Yan
Yishan Yang
Kai Zeng
2024
journals/tifs
iCoding: Countermeasure Against Interference and Eavesdropping in Wireless Communications.
Yicheng Liu
Zhao Li
Kang G. Shin
Zheng Yan
Jia Liu
2024
conf/sp
FlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited Knowledge.
Jiahe Lan
Jie Wang
Baochen Yan
Zheng Yan
Elisa Bertino
2023
journals/tifs
Security Analysis of Triangle Channel-Based Physical Layer Key Generation in Wireless Backscatter Communications.
Jiajun Li
Pu Wang
Long Jiao
Zheng Yan
Kai Zeng
Yishan Yang
2022
journals/tifs
BCAuth: Physical Layer Enhanced Authentication and Attack Tracing for Backscatter Communications.
Pu Wang
Zheng Yan
Kai Zeng
2020
journals/compsec
Game theoretical study on client-controlled cloud data deduplication.
Xueqin Liang
Zheng Yan
Robert H. Deng
2019
journals/istr
Conditional privacy-preserving authentication and key agreement scheme for roaming services in VANETs.
Yousheng Zhou
Xingwang Long
Lvjun Chen
Zheng Yan
2018
journals/compsec
AutoPrivacy: Automatic privacy protection and tagging suggestion for mobile social photo.
Zhuo Wei
Yongdong Wu
Yanjiang Yang
Zheng Yan
Qingqi Pei
Yajuan Xie
Jian Weng
2018
conf/cns
A Study and Simulation Research of Blackhole Attack on Mobile AdHoc Network.
Guoquan Li
Zheng Yan
Yulong Fu
2017
journals/compsec
A secure SDN based multi-RANs architecture for future 5G networks.
Yulong Fu
Zheng Yan
Hui Li
Xiao-Long Xin
Jin Cao
2014
journals/compsec
Analysis on the acceptance of Global Trust Management for unwanted traffic control based on game theory.
Yue Shen
Zheng Yan
Raimo Kantola
2014
journals/compsec
Editorial: Special issue on trust in cyber, physical and social computing.
Zheng Yan
Guojun Wang
Valtteri Niemi
Robert H. Deng
2013
conf/cns
Secure pervasive social networking based on multi-dimensional trust levels.
Zheng Yan
Mingjun Wang
Valtteri Niemi
Raimo Kantola
Coauthors
Baochen Yan
(1)
Boxuan Xie
(1)
Elisa Bertino
(2)
Guojun Wang
(1)
Guoquan Li
(1)
Hui Li
(1)
Jia Liu
(1)
Jiahe Lan
(1)
Jiajun Li
(4)
Jian Weng
(1)
Jie Wang
(1)
Jin Cao
(1)
Kai Zeng
(4)
Kang G. Shin
(1)
Kaoru Ota
(1)
Laurence T. Yang
(1)
Long Jiao
(1)
Lvjun Chen
(1)
Mianxiong Dong
(1)
Mingjun Wang
(1)
Niya Luo
(2)
Panpan Han
(1)
Pu Wang
(3)
Qingqi Pei
(1)
Raimo Kantola
(2)
Riku Jäntti
(1)
Robert H. Deng
(2)
Valtteri Niemi
(2)
Xiao-Long Xin
(1)
Xingwang Long
(1)
Xueqin Liang
(1)
Yajuan Xie
(1)
Yanjiang Yang
(1)
Yicheng Liu
(1)
Yifan Zhang
(2)
Yishan Yang
(5)
Yongdong Wu
(1)
Yousheng Zhou
(1)
Yue Shen
(1)
Yulong Fu
(2)
Zhao Li
(1)
Zheng Yan
(17)
Zhu Han
(1)
Zhuo Wei
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to