Profil

YU Jiangshan

Main Referenced Co-authors
Ryan, Mark (5)
ESTEVES-VERISSIMO, Paulo  (4)
Wang, Guilin (3)
Cremers, Cas (2)
DECOUCHANT, Jérémie  (2)
Main Referenced Keywords
perfect forward secrecy (2); SDN (2); security (2); blockchain (1); control plane (1);
Main Referenced Unit & Research Centers
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > Critical and Extreme Security and Dependability Research Group (CritiX) (3)
Main Referenced Disciplines
Computer science (13)

Publications (total 13)

The most downloaded
798 downloads
Yu, J., Ryan, M., & Cremers, C. (2018). DECIM: Detecting Endpoint Compromise In Messaging. IEEE Transactions on Information Forensics and Security. doi:10.1109/TIFS.2017.2738609 https://hdl.handle.net/10993/32515

The most cited

74 citations (Scopus®)

Yu, J., Wang, G., Mu, Y., & Gao, W. (2014). An Efficient Generic Framework for Three-Factor Authentication With Provably Secure Instantiation. IEEE Transactions on Information Forensics and Security, 9 (12), 2302--2313. doi:10.1109/TIFS.2014.2362979 https://hdl.handle.net/10993/32510

Kreutz, D., Yu, J., Ramos, F. M. V., & Verissimo, P. (2019). ANCHOR: logically-centralized security for Software-Defined Networks. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/34586. doi:10.1145/3301305

Kreutz, D., Yu, J., Verissimo, P., Ramos, F., & Magalhaes, C. (October 2018). The KISS principle in Software-Defined Networking: a framework for secure communications. IEEE Security & Privacy Magazine, 16 (05), 60-70. doi:10.1109/MSP.2018.3761717
Peer reviewed

Cao, T., Yu, J., Decouchant, J., & Verissimo, P. (25 June 2018). Revisiting Network-Level Attacks on Blockchain Network [Paper presentation]. DSN Workshop on Byzantine Consensus and Resilient Blockchains.

Yu, J., Ryan, M., & Cremers, C. (2018). DECIM: Detecting Endpoint Compromise In Messaging. IEEE Transactions on Information Forensics and Security. doi:10.1109/TIFS.2017.2738609
Peer Reviewed verified by ORBi

Milner, K., Cremers, C., Yu, J., & Ryan, M. (2017). Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications. In 30th IEEE Computer Security Foundations Symposium.
Peer reviewed

Yu, J., & Ryan, M. (2017). Chapter 7: Evaluating web PKIs. In Software Architecture for Big Data and the Cloud, 1st Edition, Chapter 7, June 2017. Morgan Kaufmann.
Peer reviewed

Yu, J., Ryan, M., & Chen, L. (2017). Authenticating compromisable storage systems. In The 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. doi:10.1109/Trustcom/BigDataSE/ICESS.2017.216
Peer reviewed

Volp, M., Rocha, F., Decouchant, J., Yu, J., & Verissimo, P. (2017). Permanent Reencryption: How to Survive Generations of Cryptanalysts to Come. In Twenty-fifth International Workshop on Security Protocols.
Peer reviewed

Yu, J., Cheval, V., & Ryan, M. (2016). DTKI: A New Formalized PKI with Verifiable Trusted Parties. Computer Journal, 59 (11), 1695--1713. doi:10.1093/comjnl/bxw039
Peer Reviewed verified by ORBi

Yu, J., & Ryan, M. D. (2015). Device Attacker Models: Fact and Fiction. In Security Protocols XXIII - 23rd International Workshop, Cambridge UK, March 31 - April 2, 2015, Revised Selected Papers. doi:10.1007/978-3-319-26096-9_17
Peer reviewed

Yu, J., Wang, G., Mu, Y., & Gao, W. (2014). An Efficient Generic Framework for Three-Factor Authentication With Provably Secure Instantiation. IEEE Transactions on Information Forensics and Security, 9 (12), 2302--2313. doi:10.1109/TIFS.2014.2362979
Peer reviewed

Wang, G., Yu, J., & Xie, Q. (2013). Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks. IEEE Transactions on Industrial Informatics, 9 (1), 294--302. doi:10.1109/TII.2012.2215877
Peer reviewed

Yu, J., Wang, G., & Mu, Y. (2012). Provably Secure Single Sign-on Scheme in Distributed Systems and Networks. In 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012, Liverpool, United Kingdom, June 25-27, 2012. doi:10.1109/TrustCom.2012.228
Peer reviewed

Contact ORBilu