Anjia Yang

According to our database1, Anjia Yang
  • authored at least 14 papers between 2012 and 2018.
  • has a "Dijkstra number"2 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
HB+DB: Distance bounding meets human based authentication.
Future Generation Comp. Syst., 2018

2017
A New ADS-B Authentication Framework Based on Efficient Hierarchical Identity-Based Signature with Batch Verification.
IEEE Trans. Services Computing, 2017

Strongly Unforgeable Certificateless Signature Resisting Attacks from Malicious-But-Passive KGC.
Security and Communication Networks, 2017

Security Analysis of Some Diffusion Mechanisms Used in Chaotic Ciphers.
I. J. Bifurcation and Chaos, 2017

CrowdBC: A Blockchain-based Decentralized Framework for Crowdsourcing.
IACR Cryptology ePrint Archive, 2017

2016
Practical limitation of co-operative RFID jamming methods in environments without accurate signal synchronization.
Computer Networks, 2016

Lightweight Delegatable Proofs of Storage.
Proceedings of the Computer Security - ESORICS 2016, 2016

2015
A new unpredictability-based radio frequency identification forward privacy model and a provably secure construction.
Security and Communication Networks, 2015

A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing.
Future Generation Comp. Syst., 2015

HB+DB, mitigating man-in-the-middle attacks against HB+ with distance bounding.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

2014
Lightweight and Privacy-Preserving Delegatable Proofs of Storage.
IACR Cryptology ePrint Archive, 2014

2013
A Highly Efficient RFID Distance Bounding Protocol without Real-Time PRF Evaluation.
Proceedings of the Network and System Security - 7th International Conference, 2013

A New Unpredictability-Based RFID Privacy Model.
Proceedings of the Network and System Security - 7th International Conference, 2013

2012
An Efficient Single-Slow-Phase Mutually Authenticated RFID Distance Bounding Protocol with Tag Privacy.
Proceedings of the Information and Communications Security - 14th International Conference, 2012


  Loading...