Yannan Li

According to our database1, Yannan Li authored at least 27 papers between 2012 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems.
IEEE Trans. Dependable Sec. Comput., 2019

Natural sd-RCCA Secure Public-key Encryptions from Hybrid Paradigms.
J. UCS, 2019

Machine learning based privacy-preserving fair data trading in big data market.
Inf. Sci., 2019

Efficient attribute-based encryption with attribute revocation for assured data deletion.
Inf. Sci., 2019

LRCoin: Leakage-Resilient Cryptocurrency Based on Bitcoin for Data Trading in IoT.
IEEE Internet of Things Journal, 2019

Novel Identity-Based Hash Proof System with Compact Master Public Key from Lattices in the Standard Model.
Int. J. Found. Comput. Sci., 2019

Blockchain based Privacy-Preserving Software Updates with Proof-of-Delivery for Internet of Things.
CoRR, 2019

A Blockchain-based Self-tallying Voting Scheme in Decentralized IoT.
CoRR, 2019

An Efficient Linkable Group Signature for Payer Tracing in Anonymous Cryptocurrencies.
CoRR, 2019

2018
Blockchain-Based Solutions to Security and Privacy Issues in the Internet of Things.
IEEE Wireless Commun., 2018

Assured Data Deletion With Fine-Grained Access Control for Fog-Based Industrial Applications.
IEEE Trans. Industrial Informatics, 2018

Privacy preserving cloud data auditing with efficient key update.
Future Generation Comp. Syst., 2018

Content Protection in Named Data Networking: Challenges and Potential Solutions.
CoRR, 2018

LRCoin: Leakage-resilient Cryptocurrency Based on Bitcoin for Data Trading in IoT.
CoRR, 2018

Assured Data Deletion with Fine-grained Access Control for Fog-based Industrial Applications.
CoRR, 2018

Content Protection in Named Data Networking: Challenges and Potential Solutions.
IEEE Communications Magazine, 2018

Secure Pub-Sub: Blockchain-Based Fair Payment With Reputation for Reliable Cyber Physical Systems.
IEEE Access, 2018

CrowdBuy: Privacy-friendly Image Dataset Purchasing via Crowdsourcing.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

An Efficient Anonymous Authentication Scheme Based on Double Authentication Preventing Signature for Mobile Healthcare Crowd Sensing.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2017
Improved dynamic remote data auditing protocol for smart city security.
Personal and Ubiquitous Computing, 2017

Provable data transfer from provable data possession and deletion in cloud storage.
Computer Standards & Interfaces, 2017

Single Reference Image based Scene Relighting via Material Guided Filtering.
CoRR, 2017

2016
Comments on "Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification".
IEEE Trans. Information Forensics and Security, 2016

Delegation of signing rights for emerging 5G networks.
Concurrency and Computation: Practice and Experience, 2016

Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2013
A New Construction of Proxy Signature Using Chameleon Hash Function.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

2012
The intersection numbers of KTSs with a common parallel class.
Discrete Mathematics, 2012


  Loading...