Yannan Li

According to our database1, Yannan Li authored at least 17 papers between 2012 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems.
IEEE Trans. Dependable Sec. Comput., 2019

Machine learning based privacy-preserving fair data trading in big data market.
Inf. Sci., 2019

Efficient attribute-based encryption with attribute revocation for assured data deletion.
Inf. Sci., 2019

2018
Blockchain-Based Solutions to Security and Privacy Issues in the Internet of Things.
IEEE Wireless Commun., 2018

Assured Data Deletion With Fine-Grained Access Control for Fog-Based Industrial Applications.
IEEE Trans. Industrial Informatics, 2018

Privacy preserving cloud data auditing with efficient key update.
Future Generation Comp. Syst., 2018

Content Protection in Named Data Networking: Challenges and Potential Solutions.
IEEE Communications Magazine, 2018

Secure Pub-Sub: Blockchain-Based Fair Payment With Reputation for Reliable Cyber Physical Systems.
IEEE Access, 2018

CrowdBuy: Privacy-friendly Image Dataset Purchasing via Crowdsourcing.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

An Efficient Anonymous Authentication Scheme Based on Double Authentication Preventing Signature for Mobile Healthcare Crowd Sensing.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2017
Improved dynamic remote data auditing protocol for smart city security.
Personal and Ubiquitous Computing, 2017

Provable data transfer from provable data possession and deletion in cloud storage.
Computer Standards & Interfaces, 2017

2016
Comments on "Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification".
IEEE Trans. Information Forensics and Security, 2016

Delegation of signing rights for emerging 5G networks.
Concurrency and Computation: Practice and Experience, 2016

Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2013
A New Construction of Proxy Signature Using Chameleon Hash Function.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

2012
The intersection numbers of KTSs with a common parallel class.
Discrete Mathematics, 2012


  Loading...