Fanyu Kong

According to our database1, Fanyu Kong authored at least 49 papers between 2005 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Wireless Charger Placement and Power Allocation for Maximizing Charging Quality.
IEEE Trans. Mob. Comput., 2018

Intrusion-resilient identity-based signatures: Concrete scheme in the standard model and generic construction.
Inf. Sci., 2018

2017
Optimizing Itinerary Selection and Charging Association for Mobile Chargers.
IEEE Trans. Mob. Comput., 2017

An Efficient Symmetric Searchable Encryption Scheme for Cloud Storage.
J. Internet Serv. Inf. Secur., 2017

Remote data possession checking with privacy-preserving authenticators for cloud storage.
Future Generation Comp. Syst., 2017

Networklet: Concept and Deployment.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Modeling and Deploying Networklet.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Fault Attack on an Improved CRT-RSA Algorithm with the Modulus Chaining Method.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

2016
DietCam: Multiview Food Recognition Using a Multikernel SVM.
IEEE J. Biomedical and Health Informatics, 2016

2015
Moment invariants under similarity transformation.
Pattern Recognition, 2015

DietCam: Multi-view regular shape food recognition with a camera phone.
Pervasive and Mobile Computing, 2015

P3: Joint optimization of charger placement and power allocation for wireless power transfer.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Analysis and Improvement of a Verifiable Phrase Search over Encrypted Data in a Single Phrase.
Proceedings of the 10th International Conference on P2P, 2015

A Novel Privacy Preserving Keyword Search Scheme over Encrypted Cloud Data.
Proceedings of the 10th International Conference on P2P, 2015

2014
One forward-secure signature scheme using bilinear maps and its applications.
Inf. Sci., 2014

2012
DietCam: Automatic dietary assessment with mobile camera phones.
Pervasive and Mobile Computing, 2012

Intrusion-resilient identity-based signature: Security definition and construction.
Journal of Systems and Software, 2012

Non-Interactive Forward-Secure Threshold Signature without Random Oracles.
J. Inf. Sci. Eng., 2012

Erratum to the paper: Forward-Secure Identity-Based Public-Key Encryption without Random Oracles.
Fundam. Inform., 2012

2011
New Forward-Secure Signature Scheme with Untrusted Update.
J. Inf. Sci. Eng., 2011

Forward-secure identity-based signature: Security notions and construction.
Inf. Sci., 2011

Forward-Secure Identity-Based Public-Key Encryption without Random Oracles.
Fundam. Inform., 2011

Two Protocols for Member Revocation in Secret Sharing Schemes.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2011

Security Analysis of an RSA Key Generation Algorithm with a Large Private Key.
Proceedings of the Information Security, 14th International Conference, 2011

DietCam: Regular Shape Food Recognition with a Camera Phone.
Proceedings of the International Conference on Body Sensor Networks, 2011

2010
Forward-Secure Multisignature, Threshold Signature and Blind Signature Schemes.
JNW, 2010

Lattice-Based Proxy Signature.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

2009
A Forward Secure Threshold Signature Scheme Based on the Structure of Binary Tree.
JSW, 2009

New left-to-right minimal weight signed-digit radix-r representation.
Computers & Electrical Engineering, 2009

HealthAware: Tackling obesity with health aware smart phone systems.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2009

A 3D object model for wireless camera networks with network constraints.
Proceedings of the Third ACM/IEEE International Conference on Distributed Smart Cameras, 2009

Number-Theoretic Attack on Lyuu-Wu's Multi-proxy Multi-signature Scheme.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Cryptanalysis of a Type of CRT-Based RSA Algorithms.
J. Comput. Sci. Technol., 2008

How to Construct Forward Secure Single-Server, Multi-Server and Threshold-Server Assisted Signature Schemes Using Bellare-Miner Scheme.
JCM, 2008

Publicly Verifiable Secret Sharing Member-join Protocol For Threshold Signatures.
JCM, 2008

A Publicly Verifiable Dynamic Sharing Protocol for Data Secure Storage.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005.
Proceedings of the Provable Security, Second International Conference, 2008

Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps.
Proceedings of the Provable Security, Second International Conference, 2008

How to Publicly Verifiably Expand a Member without Changing Old Shares in a Secret Sharing Scheme.
Proceedings of the Intelligence and Security Informatics, 2008

Construction of Server-assisted Forward Secure Signature Using Bellare-Miner Scheme.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

2007
New Left-to-Right Radix- r Signed-Digit Recoding Algorithm for Pairing-Based Cryptosystems.
Proceedings of the Theory and Applications of Models of Computation, 2007

Publicly Verifiable Secret Sharing with Enrollment Ability.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Security Analysis of wrNAF and SPA Resistant Scalar Multiplication.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Wide-w-NAF Method for Scalar Multiplication on Köblitz Curves.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Security Analysis and Improvement of a ($t, n$) Threshold Proxy Signature Scheme.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Cryptanalysis of Server-Aided RSA Key Generation Protocols at MADNES 2005.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

2006
Improved generalized Atkin algorithm for computing square roots in finite fields.
Inf. Process. Lett., 2006

Forward Secure Threshold Signature Scheme from Bilinear Pairings.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

2005
A Note on Signed Binary Window Algorithm for Elliptic Curve Cryptosystems.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005


  Loading...