According to our database1, Yannan Li authored at least 17 papers between 2012 and 2019.
Legend:Book In proceedings Article PhD thesis Other
Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems.
IEEE Trans. Dependable Sec. Comput., 2019
Machine learning based privacy-preserving fair data trading in big data market.
Inf. Sci., 2019
Efficient attribute-based encryption with attribute revocation for assured data deletion.
Inf. Sci., 2019
Blockchain-Based Solutions to Security and Privacy Issues in the Internet of Things.
IEEE Wireless Commun., 2018
Assured Data Deletion With Fine-Grained Access Control for Fog-Based Industrial Applications.
IEEE Trans. Industrial Informatics, 2018
Privacy preserving cloud data auditing with efficient key update.
Future Generation Comp. Syst., 2018
Content Protection in Named Data Networking: Challenges and Potential Solutions.
IEEE Communications Magazine, 2018
Secure Pub-Sub: Blockchain-Based Fair Payment With Reputation for Reliable Cyber Physical Systems.
IEEE Access, 2018
CrowdBuy: Privacy-friendly Image Dataset Purchasing via Crowdsourcing.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
An Efficient Anonymous Authentication Scheme Based on Double Authentication Preventing Signature for Mobile Healthcare Crowd Sensing.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
Improved dynamic remote data auditing protocol for smart city security.
Personal and Ubiquitous Computing, 2017
Provable data transfer from provable data possession and deletion in cloud storage.
Computer Standards & Interfaces, 2017
Comments on "Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification".
IEEE Trans. Information Forensics and Security, 2016
Delegation of signing rights for emerging 5G networks.
Concurrency and Computation: Practice and Experience, 2016
Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
A New Construction of Proxy Signature Using Chameleon Hash Function.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
The intersection numbers of KTSs with a common parallel class.
Discrete Mathematics, 2012