scispace - formally typeset
Z

Zheng Yan

Researcher at Shanghai Jiao Tong University

Publications -  490
Citations -  12887

Zheng Yan is an academic researcher from Shanghai Jiao Tong University. The author has contributed to research in topics: Computer science & Cloud computing. The author has an hindex of 47, co-authored 420 publications receiving 8786 citations. Previous affiliations of Zheng Yan include Helsinki University of Technology & Huawei.

Papers
More filters
Book ChapterDOI

Secure encrypted data deduplication with ownership proof and user revocation

TL;DR: This paper proposes a secure encrypted data deduplication scheme with effective ownership proof and user revocation, and shows that the scheme is efficient and effective for potential practical employment.
Journal ArticleDOI

IEEE Access Special Section Editorial: Trusted Computing

TL;DR: The core of the trusted computing technologies of TCG is the Trusted Platform Module (TPM), a tamper-resistant module embedded in a platform, which is implemented by a TPM chip and designed to resist software attacks and moderate hardware attacks.
Proceedings ArticleDOI

AAKA-D2D: Anonymous Authentication and Key Agreement Protocol in D2D Communications

TL;DR: AAKA-D2D is proposed, an anonymous authentication and key agreement secure protocol for D2D communications, by which two User Equipments in close proximity could mutually authenticate without leaking their real identities and negotiate a session key for secure communications in D1D session without disclosing communication contents to Core Network.

Exploring Trust of Mobile Applications Based on User Behaviors (Work-in-Progress)

TL;DR: In this article, the authors proposed a conceptual trust model according to trust behavior study and achieved their model through Principal Component Analysis (PCA), reliability analysis, Confirmatory Factor Analysis (CFA) based on data collected from a questionnaire survey, which indicated that a user's trust behavior is a multidimensional construct composed of three main aspects: using behavior, reflection behavior, and correlation behavior.
Book ChapterDOI

Security via Trusted Communications

TL;DR: This chapter studies methodologies and mechanisms of providing a trustworthy computing platform for mobile devices, and seeks solutions to support trusted communications and collaboration among those platforms in a distributed and dynamic system.