Infocomm Security (ICS)
Department






Selected Publications


To appear

  1. Peng Zhou, Rocky Chang, Xiaojing Gu, Minrui Fei, and Jianying Zhou. "Magic Train: Design of Measurement Methods against Bandwidth Inflation Attacks". IEEE Transactions on Dependable and Secure Computing. [IF = 1.351]

  2. Chunhua Su, Bagus Santoso, Yingjiu Li, Robert Deng, and Xinyi Huang. "Universally Composable RFID Mutual Authentication". IEEE Transactions on Dependable and Secure Computing. [IF = 1.137]

2016

  1. Aldar Chan, Jun-Wen Wong, Jianying Zhou, and Joseph Teo. "Scalable Two-factor Authentication using Historical Data". ESORICS'16, Heraklion, Greece.

  2. Jia Xu, Anjia Yang, Jianying Zhou, and Duncan Wong. "Lightweight Delegatable Proofs of Storage". ESORICS'16, Heraklion, Greece.

  3. Weizhi Meng, Wenjuan Li, Duncan Wong, and Jianying Zhou. "TMGuard: A Touch Movement-based Security Mechanism for Screen Unlock Patterns on Smartphones". ACNS'16, London, UK.

  4. Zhen Li. "Optimization of Rainbow Tables for Practically Cracking GSM A5/1 based on Validated Success Rate Modeling". CT-RSA'16, San Francisco, USA.

2015

  1. Aldar Chan and Jianying Zhou. "A Secure, Intelligent Electric Vehicle Ecosystem for Safe Integration with the Smart Grid". IEEE Transactions on Intelligent Transportation Systems, December 2015. [IF = 2.377]

  2. Yanjiang Yang, Joseph Liu, Kaitai Liang, Raymond Choo, and Jianying Zhou. "Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data". ESORICS'15, Vienna, Austria. (Best Paper Award)

  3. Ming-Deh Huang, Michiel Kosters, and Sze Ling Yeo. “Last Fall Degree, HFE, and Weil Descent Attacks on ECDLP”. Crypto'15, Santa Barbara, USA.

  4. Weizhi Meng, Duncan Wong, Steven Furnell, and Jianying Zhou. "Surveying the Development of Biometric User Authentication on Mobile Phones". IEEE Communications Surveys & Tutorials, July 2015. [IF = 6.806]

  5. Jiqiang Lu, Zhen Li, and Matt Henricksen. “Time-Memory Trade-off Attack on the GSM A5/1 Stream Cipher Using Commodity GPGPU”. ACNS'15, New York, USA.

  6. Jinguang Han, Willy Susilo, Yi Mu, Jianying Zhou, and Man-Ho Au. "Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-based Encryption". IEEE Transactions on Information Forensics and Security, March 2015. [IF = 2.408]

  7. Peng Zhou, Siwei Jiang, Athirai Aravazhi Irissappane, Jie Zhang, Jianying Zhou, and Joseph Teo. "Towards Energy-Efficient Trust System through Watchdog Optimization for WSNs". IEEE Transactions on Information Forensics and Security, March 2015. [IF = 2.408]

  8. Lujo Bauer, Shaoying Cai, Limin Jia, Timothy Passaro, Michael Stroucken, and Yuan Tian. "Run-time Monitoring and Formal Analysis of Information Flows in Chromium". NDSS'15, San Diego, USA.

  9. Joseph Liu, Cheng-Kang Chu, Sherman Chow, Xinyi Huang, Man-Ho Au, and Jianying Zhou. "Time-Bound Anonymous Authentication for Roaming Networks". IEEE Transactions on Information Forensics and Security, January 2015. [IF = 2.408]

  10. Yongdong Wu, Zhigang Zhao, Feng Bao and Robert Deng. "Software Puzzle: A Countermeasure to Resource-Inflated Denial-of-Service Attacks". IEEE Transactions on Information Forensics and Security, January 2015. [IF = 2.408]

2014

  1. Xinyi Huang, Yang Xiang, Elisa Bertino, Jianying Zhou, and Li Xu. "Robust Multi-Factor Authentication for Fragile Communications". IEEE Transactions on Dependable and Secure Computing, November 2014. [IF = 1.137]

  2. Tsz-Hon Yuen, Ye Zhang, Siu-Ming Yiu, and Joseph Liu. "Identity-based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks". ESORICS'14, Wroclaw, Poland. (Best Paper Award)

  3. Joseph Liu, Man-Ho Au, Xinyi Huang, Willy Susilo, Jianying Zhou, and Yong Yu. "New Insight to Preserve Online Survey Accuracy and Privacy in Big Data Era". ESORICS'14, Wroclaw, Poland.

  4. Kaitai Liang, Joseph Liu, Duncan Wong, and Willy Susilo. "An Efficient Cloud-based Revocable Identity-based Proxy Re-encryption Scheme for Public Clouds Data Sharing". ESORICS'14, Wroclaw, Poland.

  5. Jinguang Han, Willy Susilo, Yi Mu, Jianying Zhou, and Man-Ho Au. "PPDCP-ABE: Privacy-Preserving Decentralized Cipher-Policy Attribute-Based Encryption". ESORICS'14, Wroclaw, Poland.

  6. Aldar Chan and Jianying Zhou. "Cyber-Physical Device Authentication for Smart Grid Electric Vehicle Ecosystem". IEEE Journal on Selected Areas in Communications, July 2014. [IF = 4.138]

  7. Jia Xu and Jianying Zhou. "Leakage Resilient Proofs of Ownership in Cloud Storage, Revisited". ACNS'14, Lausanne, Switzerland.

  8. Cheng-Kang Chu, Sherman Chow, Wen-Guey Tzeng, Jianying Zhou, and Robert Deng. "Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage". IEEE Transactions on Parallel and Distributed Systems, February 2014. [IF = 2.173]

  9. Man-Ho Au, Joseph Liu, Junbin Fang, Zoe Jiang, Willy Susilo, and Jianying Zhou. "A New Payment System for Enhancing Location Privacy of Electric Vehicles". IEEE Transactions on Vehicular Technology, January 2014. [IF = 2.642]

2013

  1. Man-Ho Au, Joseph Liu, Willy Susilo, and Jianying Zhou. "Realizing Fully Secure Unrestricted ID-based Ring Signature in the Standard Model based on HIBE". IEEE Transactions on Information Forensics and Security, December 2013. [IF = 1.895]

  2. Cheng-Kang Chu, Wentao Zhu, Jin Han, Joseph Liu, Jia Xu, and Jianying Zhou. "Security Concerns in Popular Cloud Storage Services". IEEE Pervasive Computing, October 2013. [IF = 2.06]

  3. Abror Abduvaliyev, Al-Sakib Khan Pathan, Jianying Zhou, Rodrigo Roman, and Wai-Choong Wong. "On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks". IEEE Communications Surveys & Tutorials, July 2013. [IF = 6.311]

  4. Yi-Ruei Chen, Cheng-Kang Chu, Wen-Guey Tzeng, and Jianying Zhou. "CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing". ACNS'13, Banff, Canada.

  5. Jin Han, Su-Mon Kywe, Qiang Yan, Feng Bao, Robert Deng, Debin Gao, Yingjiu Li, and Jianying Zhou. "Launching Generic Attacks on iOS with Approved Third-Party Applications". ACNS'13, Banff, Canada.

  6. Jiqiang Lu, Wun-She Yap, and Yongzhuang Wei. "Weak Keys of the Full MISTY1 Block Cipher for Related-Key Differential Cryptanalysis". CT-RSA'13, San Francisco, USA.

  7. Jin Han, Qiang Yan, Debin Gao, Jianying Zhou, and Robert Deng. "Comparing Mobile Privacy Protection through Cross-Platform Applications". NDSS'13, San Diego, USA.

  8. Aldar Chan and Jianying Zhou. "On Smart Grid Cybersecurity Standardization: Issues of Designing with the NISTIR 7628". IEEE Communications Magazine, January 2013. [IF = 3.785]

Early publications

  1. Joseph Liu, Man-Ho Au, Willy Susilo, and Jianying Zhou. "Enhancing Location Privacy for Electric Vehicles (at the right time)". ESORICS'12, Pisa, Italy.

  2. Shuang Wu, Dengguo Feng, Wenling Wu, Jian Guo, Le Dong, and Jian Zou. "(Pseudo) Preimage Attack on Reduced-Round Grøstl Hash Function and Others". FSE'12, Washington DC, USA.

  3. Alexandre Duc, Jian Guo, Thomas Peyrin, and Lei We. "Unaligned Rebound Attack: Application to Keccak". FSE'12, Washington DC, USA.

  4. Jiqiang Lu. "A Methodology for Differential-Linear Cryptanalysis and Its Applications". FSE'12, Washington DC, USA.

  5. Jian Guo, Thomas Peyrin, Axel Poschmann, and Matt Robshaw. "The LED Block Cipher". CHES'11, Nara, Japan. [citation]

  6. Jian Guo, Thomas Peyrin, and Axel Poschmann. "The PHOTON Family of Lightweight Hash Functions". Crypto'11, Santa Barbara, USA. [citation]

  7. Feng Bao, Robert Deng, Xuhua Ding, Junzuo Lai, and Yunlei Zhao. "Hierarchical Identity-Based Chameleon Hash and Its Applications". ACNS'11, Malaga, Spain.

  8. Joonsang Baek, Cheng-Kang Chu, and Jianying Zhou. "On Shortening Ciphertexts: New Constructions for Compact Public Key and Stateful Encryption Schemes". CT-RSA'11, San Francisco, USA.

  9. Yanjiang Yang, Jianying Zhou, Jun-Wen Wong, and Feng Bao. "Towards Practical Anonymous Password Authentication". ACSAC'10, Austin, USA.

  10. Joseph Liu, Man-Ho Au, Willy Susilo, and Jianying Zhou. "Short Generic Transformation to Strongly Unforgeable Signature in the Standard Model". ESORICS'10, Athens, Greece.

  11. Yanjiang Yang, Jianying Zhou, Jian Weng, and Feng Bao. "A New Approach for Anonymous Password Authentication". ACSAC'09, Honolulu, USA.

  12. Changshe Ma, Yingjiu Li, Robert Deng, and Tieyan Li. "RFID Privacy: Relation between two Notions, Minimal Condition, and Efficient Construction". ACM CCS'09, Chicago, USA.

  13. Joseph Liu and Jianying Zhou. "An Efficient Identity-Based Online/Offline Encryption Scheme". ACNS'09, Paris, France.

  14. Joonsang Baek, Willy Susilo, Joseph Liu, and Jianying Zhou. "A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack". ACNS'09, Paris, France.

  15. Jung-Hoon Ha, Sang-Jae Moon, Jianying Zhou, and Jae-Cheol Ha. "A New Formal Proof Model for RFID Location Privacy". ESORICS'08, Malaga, Spain.

  16. Joonsang Baek, Jianying Zhou, and Feng Bao. "Generic Constructions of Stateful Public Key Encryption and Their Applications". ACNS'08, New York, USA.

  17. Man Ho Au, Qiong Huang, Joseph K. Liu, Willy Susilo, Duncan S. Wong, and Guomin Yang. "Traceable and Retrievable Identity-Based Encryption". ACNS'08, New York, USA.

  18. Tong-Lee Lim, A. Lakshminarayanan, and Vira Saksen. "A Practical and Efficient Tree-List Structure for Public-Key Certificate Validation". ACNS'08, New York, USA.

  19. Sherman S. M. Chow, Joseph K. Liu, and Duncan S. Wong. "Robust Receipt-Free Election System with Ballot Secrecy and Verifiability". NDSS'08, San Diego, USA.

  20. Muhammad Reza Z'aba, Håvard Raddum, Matt Henricksen, and Ed Dawson. "Bit-Pattern Based Integral Attack". FSE'08, Lausanne, Switzerland.

  21. Michalis Polychronakis, Kostas Anagnostakis, and Evangelos Markatos. "Emulation-Based Detection of Non-self-contained Polymorphic Shellcode". RAID'07, Queensland, Australia.

  22. Periklis Akritidis, Wee-Yung Chin, Vinh-The Lam, Stelios Sidiroglou, and Kostas Anagnostakis. "Proximity Breeds Danger: Emerging Threats in Metro-area Wireless Networks". USENIX Security'07, Boston, USA.

  23. Guilin Wang, Joonsang Baek, Duncan S. Wong, and Feng Bao. "On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures". PKC'07, Beijing, China.

  24. Vinh-The Lam, Spyros Antonatos, Periklis Akritidis, and Kostas Anagnostakis. "Puppetnets: Misusing Web Browsers as a Distributed Attack Infrastructure". ACM CCS'06, Alexandria, USA.

  25. Shuhong Wang, Xuhua Ding, Robert Deng, and Feng Bao. "Private Information Retrieval Using Trusted Hardware". ESORICS'06, Hamburg, Germany.

  26. Elias Athanasopoulos, Kostas Anagnostakis, and Evangelos Markatos. "Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets". ACNS'06, Singapore.

  27. Huafei Zhu and Feng Bao. "Augmented Oblivious Polynomial Evaluation Protocol and Its Applications". ESORICS'05, Milan, Italy.

  28. Zhuowei Li, Amitabha Das, and Jianying Zhou. "Model Generalization and its Implications on Intrusion Detection". ACNS'05, New York, USA.

  29. Feng Bao. "Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes". Asiacrypt'04, Jeju Island, Korea.

  30. Bin Zhang, Hongjun Wu, Dengguo Feng, and Feng Bao. "Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem". ACNS'04, Yellow Mountain, China.

  31. Hongjun Wu. "A New Stream Cipher HC-256". FSE'04, Delhi, India.

  32. Gang Yao, Kui Ren, Feng Bao, Robert Deng, and Dengguo Feng. "Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient". ACNS'03, Kunming, China.

  33. Tieyan Li and Yongdong Wu. "Trust on Web Browser: Attack vs. Defense". ACNS'03, Kunming, China.

  34. Robert Deng, Jianying Zhou, and Feng Bao. "Defending against Redirect Attacks in Mobile IP". ACM CCS'02, Washington DC, USA.

  35. Jianying Zhou, Robert Deng, and Feng Bao. "Some Remarks on a Fair Exchange Protocol". PKC'00, Melbourne, Australia. [citation]

  36. Hongjun Wu, Feng Bao, Robert Deng, and Qinzhong Ye. "Improved Truncated Differential Attacks on SAFER". Asiacrypt'98, Beijing, China.

  37. Hongjun Wu, Feng Bao, Robert Deng, and Qinzhong Ye. "Cryptanalysis of Rijmen-Preneel Trapdoor Ciphers". Asiacrypt'98, Beijing, China.

  38. Jianying Zhou and Kwok-Yan Lam. "Undeniable Billing in Mobile Communication". ACM/IEEE MobiCom'98, Dallas, USA.

  39. Feng Bao, Robert Deng, and Wenbo Mao. "Efficient and Practical Fair Exchange Protocols with Off-Line TTP". IEEE S&P'98, Oakland, USA. [citation]

  40. Feng Bao and Robert Deng. "A Signcryption Scheme with Signature Directly Verifiable by Public Key". PKC'98, Pacifico Yokohama, Japan. [citation]

  41. Jianying Zhou and Dieter Gollmann. "An Efficient Non-repudiation Protocol". IEEE CSFW'97, Rockport, USA. [citation]

  42. Jianying Zhou and Dieter Gollmann. "Observations on Non-repudiation". Asiacrypt'96, Kyongju, Korea.

  43. Jianying Zhou and Dieter Gollmann. "Certified Electronic Mail". ESORICS'96, Rome, Italy.

  44. Jianying Zhou and Dieter Gollmann. "A Fair Non-repudiation Protocol". IEEE S&P'96, Oakland, USA. [citation > 500]

  45. Robert Deng, Shailendra Bhonsle, Weiguo Wang, and Aurel Lazar. "Integrating Security in CORBA based Object Architectures". IEEE S&P'95, Oakland, USA.