Z
Zheng Yan
Researcher at Shanghai Jiao Tong University
Publications - 490
Citations - 12887
Zheng Yan is an academic researcher from Shanghai Jiao Tong University. The author has contributed to research in topics: Computer science & Cloud computing. The author has an hindex of 47, co-authored 420 publications receiving 8786 citations. Previous affiliations of Zheng Yan include Helsinki University of Technology & Huawei.
Papers
More filters
Book ChapterDOI
Secure encrypted data deduplication with ownership proof and user revocation
TL;DR: This paper proposes a secure encrypted data deduplication scheme with effective ownership proof and user revocation, and shows that the scheme is efficient and effective for potential practical employment.
Journal ArticleDOI
IEEE Access Special Section Editorial: Trusted Computing
TL;DR: The core of the trusted computing technologies of TCG is the Trusted Platform Module (TPM), a tamper-resistant module embedded in a platform, which is implemented by a TPM chip and designed to resist software attacks and moderate hardware attacks.
Proceedings ArticleDOI
AAKA-D2D: Anonymous Authentication and Key Agreement Protocol in D2D Communications
TL;DR: AAKA-D2D is proposed, an anonymous authentication and key agreement secure protocol for D2D communications, by which two User Equipments in close proximity could mutually authenticate without leaking their real identities and negotiate a session key for secure communications in D1D session without disclosing communication contents to Core Network.
Exploring Trust of Mobile Applications Based on User Behaviors (Work-in-Progress)
TL;DR: In this article, the authors proposed a conceptual trust model according to trust behavior study and achieved their model through Principal Component Analysis (PCA), reliability analysis, Confirmatory Factor Analysis (CFA) based on data collected from a questionnaire survey, which indicated that a user's trust behavior is a multidimensional construct composed of three main aspects: using behavior, reflection behavior, and correlation behavior.
Book ChapterDOI
Security via Trusted Communications
TL;DR: This chapter studies methodologies and mechanisms of providing a trustworthy computing platform for mobile devices, and seeks solutions to support trusted communications and collaboration among those platforms in a distributed and dynamic system.