Jiangshan Yu

Jiangshan Yu

Collaborateur scientifique

Faculté ou Centre Interdisciplinary Centre for Security, Reliability and Trust
Adresse postale Université du Luxembourg
Maison du Nombre
6, Avenue de la Fonte
L-4364 Esch-sur-Alzette
Bureau sur le campus MNO, E02 0245-040
E-mail
Téléphone (+352) 46 66 44 5984
Fax (+352) 46 66 44 35984

Jiangshan Yu is a research fellow working with Prof. Paulo Esteves-Verissimo at CritiX, SnT, University of Luxembourg; and an honorary research fellow working with Prof. Mark Ryan at security and privacy group, the University of Birmingham, UK, where he received his PhD in computer science in 2016. He is a recipient of multiple awards including ``Chinese Government Award for outstanding PhD scholar abroad''.

He has broad research interests in cyber security and cryptography. In particular, the focus of his research has been on design and analysis of cryptographic protocols, cryptographic key management, secure authentication, post compromise security, crypto-currencies, and public-ledger-based applications.

His patent-pending public ledger application has attracted funding support from Innovate UK; and he co-designed a `system on a chip (SoC) secure boot' solution for Huawei Ltd, the largest telecommunications equipment manufacturer in the world, to manage their next generation network devices securely.

Please find more information on his home page: www.jiangshanyu.com

Last updated on: mercredi, 18 octobre 2017

powered by
orbilu.uni.lu

2017

Full Text
See detailAutomatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications
Milner, Kevin; Cremers, Cas; Yu, Jiangshan; Ryan, Mark

in 30th IEEE Computer Security Foundations Symposium (2017)

Full Text
See detailPermanent Reencryption: How to Survive Generations of Cryptanalysts to Come
Volp, Marcus; Rocha, Francisco; Decouchant, Jérémie; Yu, Jiangshan; Verissimo, Paulo

in Twenty-fifth International Workshop on Security Protocols (2017)

Full Text
See detailChapter 7: Evaluating web PKIs
Yu, Jiangshan; Ryan, Mark

in Software Architecture for Big Data and the Cloud, 1st Edition, Chapter 7, June 2017. (2017)

Full Text
See detailAuthenticating compromisable storage systems
Yu, Jiangshan; Ryan, Mark; Chen, Liqun

in The 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (2017)

Full Text
See detailDECIM: Detecting Endpoint Compromise In Messaging
Yu, Jiangshan; Ryan, Mark; Cremers, Cas

in IEEE Transactions on Information Forensics & Security (2017)

Top of Page

2016

Full Text
See detailDTKI: A New Formalized PKI with Verifiable Trusted Parties
Yu, Jiangshan; Cheval, Vincent; Ryan, Mark

in The Computer Journal (2016), 59(11), 1695--1713

Top of Page

2015

Full Text
See detailDevice Attacker Models: Fact and Fiction
Yu, Jiangshan; Ryan, Mark Dermot

in Security Protocols XXIII - 23rd International Workshop, Cambridge UK, March 31 - April 2, 2015, Revised Selected Papers (2015)

Top of Page

2014

Full Text
See detailAn Efficient Generic Framework for Three-Factor Authentication With Provably Secure Instantiation
Yu, Jiangshan; Wang, Guilin; Mu, Yi; Gao, Wei

in IEEE Transactions on Information Forensics and Security (2014), 9(12), 2302--2313

Top of Page

2013

Full Text
See detailSecurity Analysis of a Single Sign-On Mechanism for Distributed Computer Networks
Wang, Guilin; Yu, Jiangshan; Xie, Qi

in IEEE Transactions on Industrial Informatics (2013), 9(1), 294--302

Top of Page

2012

Full Text
See detailProvably Secure Single Sign-on Scheme in Distributed Systems and Networks
Yu, Jiangshan; Wang, Guilin; Mu, Yi

in 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012, Liverpool, United Kingdom, June 25-27, 2012 (2012)

Top of Page