Yamin Wen

According to our database1, Yamin Wen authored at least 24 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A new Private Mutual Authentication scheme with group discovery.
J. Inf. Secur. Appl., September, 2023

Secret handshakes: Full dynamicity, deniability and lattice-based design.
Theor. Comput. Sci., 2023

2022
EdgeCRNN: an edge-computing oriented model of acoustic feature enhancement for keyword spotting.
J. Ambient Intell. Humaniz. Comput., 2022

Conjunctive multi-key searchable encryption with attribute-based access control for EHR systems.
Comput. Stand. Interfaces, 2022

Forward-Secure Revocable Secret Handshakes from Lattices.
Proceedings of the Post-Quantum Cryptography - 13th International Workshop, 2022

Protecting White-Box Block Ciphers with Galois/Counter Mode.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022

2021
Lattice-Based Secret Handshakes with Reusable Credentials.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

2020
A new secret handshake scheme with multi-symptom intersection for mobile healthcare social networks.
Inf. Sci., 2020

Intersection-policy private mutual authentication from authorized private set intersection.
Sci. China Inf. Sci., 2020

A New Lightweight CRNN Model for Keyword Spotting with Edge Computing Devices.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

2018
Towards practical white-box lightweight block cipher implementations for IoTs.
Future Gener. Comput. Syst., 2018

A new efficient authorized private set intersection protocol from Schnorr signature and its applications.
Clust. Comput., 2018

2017
SpongeMPH: A New Multivariate Polynomial Hash Function based on the Sponge Construction.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

2016
Solutions to the anti-piracy problem in oblivious transfer.
J. Comput. Syst. Sci., 2016

Biclique cryptanalysis using balanced complete bipartite subgraphs.
Sci. China Inf. Sci., 2016

2015
一种AVR环境下KLEIN分组密码抗计时和缓存边信道攻击的快速保护方法 (Fast Implementation of KLEIN for Resisting Timing and Cache Side-channel Attacks on AVR).
计算机科学, 2015

A Backward Unlinkable Secret Handshake Scheme with Revocation Support in the Standard Model.
Inf., 2015

Efficiency and Privacy Enhancement for a Track and Trace System of RFID-Based Supply Chains.
Inf., 2015

2014
Private mutual authentications with fuzzy matching.
Int. J. High Perform. Syst. Archit., 2014

A Dynamic Matching Secret Handshake Scheme without Random Oracles.
Proceedings of the Network and System Security - 8th International Conference, 2014

2013
An Unlinkable Secret Handshake with Fuzzy Matching for Social Networks.
Proceedings of the Eighth International Conference on P2P, 2013

2012
Secret handshakes from ID-based message recovery signatures: A new generic approach.
Comput. Electr. Eng., 2012

2011
Delegatable secret handshake scheme.
J. Syst. Softw., 2011

2010
A New Revocable Secret Handshake Scheme with Backward Unlinkability.
Proceedings of the Public Key Infrastructures, Services and Applications, 2010


  Loading...