Anjia Yang

According to our database1, Anjia Yang authored at least 20 papers between 2012 and 2018.

Collaborative distances:



In proceedings 
PhD thesis 




Two-Hop Distance-Bounding Protocols: Keep Your Friends Close.
IEEE Trans. Mob. Comput., 2018

REMT: A Real-Time End-to-End Media Data Transmission Mechanism in UAV-Aided Networks.
IEEE Network, 2018

OTP-IoT: An ownership transfer protocol for the Internet of Things.
J. Inf. Sec. Appl., 2018

Notes on a provably-secure certificate-based encryption against malicious CA attacks.
Inf. Sci., 2018

Exploring relationship between indistinguishability-based and unpredictability-based RFID privacy models.
Future Generation Comp. Syst., 2018

HB+DB: Distance bounding meets human based authentication.
Future Generation Comp. Syst., 2018

Fully distributed certificateless threshold signature without random oracles.
SCIENCE CHINA Information Sciences, 2018

A New ADS-B Authentication Framework Based on Efficient Hierarchical Identity-Based Signature with Batch Verification.
IEEE Trans. Services Computing, 2017

Strongly Unforgeable Certificateless Signature Resisting Attacks from Malicious-But-Passive KGC.
Security and Communication Networks, 2017

Security Analysis of Some Diffusion Mechanisms Used in Chaotic Ciphers.
I. J. Bifurcation and Chaos, 2017

CrowdBC: A Blockchain-based Decentralized Framework for Crowdsourcing.
IACR Cryptology ePrint Archive, 2017

Practical limitation of co-operative RFID jamming methods in environments without accurate signal synchronization.
Computer Networks, 2016

Lightweight Delegatable Proofs of Storage.
Proceedings of the Computer Security - ESORICS 2016, 2016

A new unpredictability-based radio frequency identification forward privacy model and a provably secure construction.
Security and Communication Networks, 2015

A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing.
Future Generation Comp. Syst., 2015

HB+DB, mitigating man-in-the-middle attacks against HB+ with distance bounding.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

Lightweight and Privacy-Preserving Delegatable Proofs of Storage.
IACR Cryptology ePrint Archive, 2014

A Highly Efficient RFID Distance Bounding Protocol without Real-Time PRF Evaluation.
Proceedings of the Network and System Security - 7th International Conference, 2013

A New Unpredictability-Based RFID Privacy Model.
Proceedings of the Network and System Security - 7th International Conference, 2013

An Efficient Single-Slow-Phase Mutually Authenticated RFID Distance Bounding Protocol with Tag Privacy.
Proceedings of the Information and Communications Security - 14th International Conference, 2012