scispace - formally typeset
L

Lu Zhou

Publications -  1268
Citations -  5415

Lu Zhou is an academic researcher. The author has contributed to research in topics: Key (cryptography) & Authentication. The author has an hindex of 22, co-authored 1268 publications receiving 5415 citations.

Papers
More filters
Patent

Access control system generated and verified on the basis of dynamic password and authentication method thereof

Lu Zhou, +1 more
TL;DR: In this article, an access control system based on dynamic password and an identity verification method is presented. But the system is not suitable for the use of dynamic passwords and it cannot be used to verify the validity and availability of the dynamic password of the user.
Patent

Method and system for identity authentication based on dynamic password

Lu Zhou, +1 more
TL;DR: In this paper, a method and a system for identity authentication based on a dynamic password, belonging to the field of information security, is presented. But the method is not suitable for the use of the dynamic password in the authentication process.
Patent

Method and system for updating certification key

Lu Zhou, +1 more
TL;DR: In this article, Wang et al. proposed a method for updating authentication cipher (AC) remotely, which includes steps: server end calculates random seed and random number to generate verification data; server end carries out encryption operation for original AC and verification data, and transfers random seed this article and result of encryption operation to client end.
Patent

Dynamic cipher certifying system and method

Lu Zhou, +1 more
TL;DR: In this article, the system includes interface at client end, authentication server, database, management server, and dynamic token containing individual information of user, which is used to authenticate user identity.
Patent

Verification method and system thereof

Lu Zhou, +1 more
TL;DR: In this article, an authenticating method and a system thereof, which relates to information security field and solves the problem that the user information is not safe in transaction process is presented.