Yan Zhu

According to our database1, Yan Zhu authored at least 64 papers between 2005 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
New instant confirmation mechanism based on interactive incontestable signature in consortium blockchain.
Frontiers Comput. Sci., 2019

From Data-Driven to Intelligent-Driven: Technology Evolution of Network Security in Big Data Era.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

FlashGhost: Data Sanitization with Privacy Protection Based on Frequent Colliding Hash Table.
Proceedings of the 2019 IEEE International Conference on Services Computing, 2019

2018
Attribute-based Access Control for ICN Naming Scheme.
IEEE Trans. Dependable Sec. Comput., 2018

PHE: An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing in Cloud.
IEEE Trans. Cloud Computing, 2018

Verifiable random functions with Boolean function constraints.
SCIENCE CHINA Information Sciences, 2018

Dual-mode broadcast encryption.
SCIENCE CHINA Information Sciences, 2018

Provably Secure Cryptographic ABAC System to Enhance Reliability and Privacy Using Real-Time Token and Dynamic Policy.
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018

Secure Smart Contract System Built on SMPC Over Blockchain.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

An Efficient Retrograde Storage for Self-Destructing Messages on Frequently Colliding Hash Table.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

TBAC: Transaction-Based Access Control on Blockchain for Resource Sharing with Cryptographically Decentralized Authorization.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

Digital Asset Management with Distributed Permission over Blockchain and Attribute-Based Access Control.
Proceedings of the 2018 IEEE International Conference on Services Computing, 2018

2017
Multi-Factor Synthesis Decision-Making for Trust-Based Access Control on Cloud.
Int. J. Cooperative Inf. Syst., 2017

BC-PDS: Protecting Privacy and Self-Sovereignty through BlockChains for OpenPDS.
Proceedings of the 2017 IEEE Symposium on Service-Oriented System Engineering, 2017

2016
A System View of Financial Blockchains.
Proceedings of the 2016 IEEE Symposium on Service-Oriented System Engineering, 2016

Interactive Incontestable Signature for Transactions Confirmation in Bitcoin Blockchain.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

2015
From RBAC to ABAC: Constructing Flexible Data Access Control for Cloud Storage Services.
IEEE Trans. Services Computing, 2015

Tap-Wave-Rub: Lightweight Human Interaction Approach to Curb Emerging Smartphone Malware.
IEEE Trans. Information Forensics and Security, 2015

Efficient Attribute-Based Comparable Data Access Control.
IEEE Trans. Computers, 2015

Establishing A Personal On-Demand Execution Environment for Mobile Cloud Applications.
MONET, 2015

Identity-Set-based Broadcast Encryption supporting "Cut-or-Select" with Short Ciphertext.
IACR Cryptology ePrint Archive, 2015

Secure Snaps: A New Forward Secrecy Cryptosystem for Self-Destructing Messages in Mobile Services.
Proceedings of the 2015 IEEE International Conference on Mobile Services, MS 2015, New York City, NY, USA, June 27, 2015

Traitor Tracing and Revocation for Secure Decoders in File Syncing-and-Sharing Service.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

AR-ABAC: A New Attribute Based Access Control Model Supporting Attribute-Rules for Cloud Computing.
Proceedings of the IEEE Conference on Collaboration and Internet Computing, 2015

Identity-Set-based Broadcast Encryption supporting "Cut-or-Select" with Short Ciphertext.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Secure and efficient random functions with variable-length output.
J. Network and Computer Applications, 2014

Lattice-based key exchange on small integer solution problem.
SCIENCE CHINA Information Sciences, 2014

Traitor Tracing Based on Partially-Ordered Hierarchical Encryption.
Proceedings of the Trusted Systems - 6th International Conference, 2014

Attribute-based access control for ICN naming scheme.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2013
Dynamic Audit Services for Outsourced Storages in Clouds.
IEEE Trans. Services Computing, 2013

Role-Based Cryptosystem: A New Cryptographic RBAC System Based on Role-Key Hierarchy.
IEEE Trans. Information Forensics and Security, 2013

Location-Aware and Safer Cards: Enhancing RFID Security and Privacy via Location Sensing.
IEEE Trans. Dependable Sec. Comput., 2013

Tap-Wave-Rub: Lightweight Malware Prevention for Smartphones Using Intuitive Human Gestures
CoRR, 2013

Tap-Wave-Rub: lightweight malware prevention for smartphones using intuitive human gestures.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

Efficient Identity-Based Encryption without Pairings and Key Escrow for Mobile Devices.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2013

Enabling secure location-based services in mobile cloud computing.
Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing, 2013

End-to-end aggregate authentication of time-series data.
Proceedings of the first ACM workshop on Asia public-key cryptography, 2013

How to use attribute-based encryption to implement role-based access control in the cloud.
Proceedings of the 2013 International Workshop on Security in Cloud Computing, 2013

Cryptographic Spatio-temporal Predicates for Location-Based Services.
Proceedings of the Eighth International Conference on P2P, 2013

2012
Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage.
IEEE Trans. Parallel Distrib. Syst., 2012

Efficient audit service outsourcing for data integrity in clouds.
Journal of Systems and Software, 2012

Secure Collaborative Integrity Verification for Hybrid Cloud Environments.
Int. J. Cooperative Inf. Syst., 2012

Efficient construction of provably secure steganography under ordinary covert channels.
SCIENCE CHINA Information Sciences, 2012

Towards temporal access control in cloud computing.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Secure Data Retrieval of Outsourced Data with Complex Query Support.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

Secure and efficient constructions of hash, MAC and PRF for mobile devices.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Comparison-based encryption for fine-grained access control in clouds.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

2011
Provably Secure Role-Based Encryption with Revocation Mechanism.
J. Comput. Sci. Technol., 2011

Zero-knowledge proofs of retrievability.
SCIENCE CHINA Information Sciences, 2011

Dynamic audit services for integrity verification of outsourced storages in clouds.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Collaborative integrity verification in hybrid clouds.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011

Poster: temporal attribute-based encryption in clouds.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Attribute-Based Signature with Policy-and-Endorsement Mechanism.
J. Comput. Sci. Technol., 2010

Efficient provable data possession for hybrid clouds.
IACR Cryptology ePrint Archive, 2010

A Collaborative Framework for Privacy Protection in Online Social Networks.
IACR Cryptology ePrint Archive, 2010

Cryptographic Role-based Security Mechanisms based on Role-Key Hierarchy.
IACR Cryptology ePrint Archive, 2010

A collaborative framework for privacy protection in online social networks.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

Efficient provable data possession for hybrid clouds.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Cryptographic role-based security mechanisms based on role-key hierarchy.
Proceedings of the 5th ACM Symposium on Information, 2010

2007
Structural Digital Signature and Semi-Fragile Fingerprinting for Image Authentication in Wavelet Domain.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2006
A Secure Hierarchical Fragile Watermarking Method with Tamper Localization.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

Collusion secure convolutional fingerprinting information codes.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

Image-adaptive watermarking based on perceptually shaping watermark blockwise.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

2005
Collusion Secure Convolutional Spread Spectrum Fingerprinting.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005


  Loading...