Jia Yu
Affiliations:- Nanjing University of Information Science & Technology, Nanjing, China
- Qingdao University, Qingdao, China
- Shandong University, Jinan, China
According to our database1,
Jia Yu
authored at least 32 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Comput. Secur., January, 2024
2018
Intrusion-resilient identity-based signatures: Concrete scheme in the standard model and generic construction.
Inf. Sci., 2018
2017
J. Internet Serv. Inf. Secur., 2017
Remote data possession checking with privacy-preserving authenticators for cloud storage.
Future Gener. Comput. Syst., 2017
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017
2015
Analysis and Improvement of a Verifiable Phrase Search over Encrypted Data in a Single Phrase.
Proceedings of the 10th International Conference on P2P, 2015
Proceedings of the 10th International Conference on P2P, 2015
2014
Inf. Sci., 2014
2012
J. Syst. Softw., 2012
J. Inf. Sci. Eng., 2012
Erratum to the paper: Forward-Secure Identity-Based Public-Key Encryption without Random Oracles.
Fundam. Informaticae, 2012
2011
Inf. Sci., 2011
Fundam. Informaticae, 2011
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2011
Proceedings of the Information Security, 14th International Conference, 2011
2010
J. Networks, 2010
2009
J. Softw., 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
How to Construct Forward Secure Single-Server, Multi-Server and Threshold-Server Assisted Signature Schemes Using Bellare-Miner Scheme.
J. Commun., 2008
J. Commun., 2008
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008
Proceedings of the Provable Security, Second International Conference, 2008
Proceedings of the Provable Security, Second International Conference, 2008
How to Publicly Verifiably Expand a Member without Changing Old Shares in a Secret Sharing Scheme.
Proceedings of the Intelligence and Security Informatics, 2008
Proceedings of The International Symposium on Electronic Commerce and Security, 2008
2007
New Left-to-Right Radix- <i>r</i> Signed-Digit Recoding Algorithm for Pairing-Based Cryptosystems.
Proceedings of the Theory and Applications of Models of Computation, 2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007
2006
Inf. Process. Lett., 2006
Proceedings of the Computational Intelligence and Security, International Conference, 2006