L
Lu Zhou
Publications - 1268
Citations - 5415
Lu Zhou is an academic researcher. The author has contributed to research in topics: Key (cryptography) & Authentication. The author has an hindex of 22, co-authored 1268 publications receiving 5415 citations.
Papers
More filters
Patent
Access control system generated and verified on the basis of dynamic password and authentication method thereof
Lu Zhou,Huazhang Yu +1 more
TL;DR: In this article, an access control system based on dynamic password and an identity verification method is presented. But the system is not suitable for the use of dynamic passwords and it cannot be used to verify the validity and availability of the dynamic password of the user.
Patent
Method and system for identity authentication based on dynamic password
Lu Zhou,Huazhang Yu +1 more
TL;DR: In this paper, a method and a system for identity authentication based on a dynamic password, belonging to the field of information security, is presented. But the method is not suitable for the use of the dynamic password in the authentication process.
Patent
Method and system for updating certification key
Lu Zhou,Huazhang Yu +1 more
TL;DR: In this article, Wang et al. proposed a method for updating authentication cipher (AC) remotely, which includes steps: server end calculates random seed and random number to generate verification data; server end carries out encryption operation for original AC and verification data, and transfers random seed this article and result of encryption operation to client end.
Patent
Dynamic cipher certifying system and method
Lu Zhou,Huazhang Yu +1 more
TL;DR: In this article, the system includes interface at client end, authentication server, database, management server, and dynamic token containing individual information of user, which is used to authenticate user identity.
Patent
Verification method and system thereof
Lu Zhou,Huazhang Yu +1 more
TL;DR: In this article, an authenticating method and a system thereof, which relates to information security field and solves the problem that the user information is not safe in transaction process is presented.