Jiangshan Yu (于江山)
TitleCited byYear
Security analysis of a single sign-on mechanism for distributed computer networks
G Wang, J Yu, Q Xie
IEEE Transactions on Industrial Informatics 9 (1), 294-302, 2012
An Efficient Generic Framework for Three-Factor Authentication with Provably Secure Instantiation
J Yu, G Wang, Y Mu, W Gao
IEEE Transactions on Information Forensics and Security 9 (12), 2302-2313, 2014
DTKI: A New Formalized PKI with Verifiable Trusted Parties
J Yu, V Cheval, M Ryan
The Computer Journal 59 (11), 1695-1713, 2016
Provably secure single sign-on scheme in distributed systems and networks
J Yu, G Wang, Y Mu
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
DECIM: Detecting endpoint compromise in messaging
J Yu, M Ryan, C Cremers
IEEE Transactions on Information Forensics and Security, 2017
The KISS principle in Software-Defined Networking: a framework for secure communications
D Kreutz, J Yu, P Esteves-Verissimo, C Magalhaes, FMV Ramos
IEEE Security & Privacy 16 (5), 60-70, 2018
RepuCoin: Your Reputation is Your Power
J Yu, D Kozhaya, J Decouchant, P Esteves-Verissimo
IEEE Transactions on Computers, 2019
Evaluating web PKIs
J Yu, M Ryan
Software Architecture for Big Data and the Cloud, 105-126, 2017
New empirical traceability analysis of CryptoNote-style blockchains
Z Yu, MH Au, J Yu, R Yang, Q Xu, WF Lau
Proceedings of the 23rd International Conference on Financial Cryptography …, 2019
Automatically detecting the misuse of secrets: Foundations, design principles, and applications
K Milner, C Cremers, J Yu, M Ryan
2017 IEEE 30th Computer Security Foundations Symposium (CSF), 203-216, 2017
Device attacker models: fact and fiction
J Yu, M Ryan
Security Protocols XXIII, 158-167, 2015
Authenticating compromisable storage systems
J Yu, M Ryan, L Chen
IEEE TrustCom-17, 2017
ANCHOR: Logically Centralized Security for Software-Defined Networks
D Kreutz, J Yu, F Ramos, P Esteves-Verissimo
ACM Transactions on Privacy and Security (TOPS) 22 (2), 8, 2019
Challenges with End-to-End Email Encryption
J Yu, V Cheval, M Ryan
Springer Reference, 2014
Remote user authentication in distributed networks and systems
J Yu
University of Wollongong, 2012
On The Unforkability of Monero
DA Wijaya, JK Liu, R Steinfeld, D Liu, J Yu
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
Towards Fair and Decentralized Privacy-Preserving Deep Learning with Blockchain
L Lyu, J Yu, K Nandakumar, Y Li, X Ma, J Jin
arXiv preprint arXiv:1906.01167, 2019
Re-thinking untraceability in the CryptoNote-style blockchain
J Yu, MHA Au, P Esteves-Verissimo
IACR Cryptology ePrint Archive 2019, 186, 2019
FloodXMR: Low-cost transaction flooding attack with Monero's bulletproof protocol.
JOM Chervinski, D Kreutz, J Yu
IACR Cryptology ePrint Archive 2019, 455, 2019
Exploring the Monero Peer-to-Peer Network.
T Cao, J Yu, J Decouchant, X Luo, P Veríssimo
IACR Cryptology ePrint Archive 2019, 411, 2019
The system can't perform the operation now. Try again later.
Articles 1–20