Yanwei Zhou

Orcid: 0000-0002-7254-3579

According to our database1, Yanwei Zhou authored at least 52 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
An Anonymous and Efficient Certificate-Based Identity Authentication Protocol for VANET.
IEEE Internet Things J., April, 2024

An Efficient and Secure Lightweight Certificateless Hybrid Signcryption Scheme.
IEEE Internet Things J., April, 2024

An efficient identity authentication protocol with revocation, tracking and fine-grained access control for electronic medical system.
Comput. Stand. Interfaces, March, 2024

An efficient and secure certificateless aggregate signature scheme.
J. Syst. Archit., February, 2024

2023
An Efficient Certificateless Signature Scheme With Provably Security and Its Applications.
IEEE Syst. J., December, 2023

Leakage-resilient identity-based cryptography from minimal assumptions.
Des. Codes Cryptogr., November, 2023

A Novel Construction Of Certificateless Aggregate Signature Scheme For Healthcare Wireless Medical Sensor Networks.
Comput. J., November, 2023

A redesigned secure and efficient data transaction protocol for mobile payment system.
J. Syst. Archit., October, 2023

An Efficient and Provably Secure Identity Authentication Scheme for VANET.
IEEE Internet Things J., October, 2023

An Efficient Identity Authentication Scheme With Dynamic Anonymity for VANETs.
IEEE Internet Things J., June, 2023

Identity-Based Encryption With Continuous Leakage-Resilient CCA Security From Static Complexity Assumption.
Comput. J., April, 2023

An Efficient Identity Authentication Scheme With Provable Security and Anonymity for Mobile Edge Computing.
IEEE Syst. J., March, 2023

An Efficient Certificate-Based Aggregate Signature Scheme With Provable Security for Industrial Internet of Things.
IEEE Syst. J., March, 2023

Public-key encryption scheme with optimal continuous leakage resilience.
Inf. Process. Lett., 2023

An Anonymous and Efficient Multimessage and Multireceiver Certificateless Signcryption Scheme for VANET.
IEEE Internet Things J., 2023

An Anonymous and Revocable Authentication Protocol for Vehicle-to-Vehicle Communications.
IEEE Internet Things J., 2023

A direct construction of continuous leakage-resilient (H)IBE scheme with CCA security from dual system encryption.
Comput. Stand. Interfaces, 2023

A Certificateless Aggregate Signature Scheme with Better Security.
Proceedings of the Provable and Practical Security, 2023

2022
Secure and Efficient Certificate-Based Proxy Signature Schemes for Industrial Internet of Things.
IEEE Syst. J., 2022

Improved Secure Transaction Scheme With Certificateless Cryptographic Primitives for IoT-Based Mobile Payments.
IEEE Syst. J., 2022

Continuous Leakage-Amplified Public-Key Encryption With CCA Security.
Comput. J., 2022

Continual Leakage-Resilient Hedged Public-Key Encryption.
Comput. J., 2022

2021
Continuous leakage-resilient certificate-based signcryption scheme and application in cloud computing.
Theor. Comput. Sci., 2021

Novel generic construction of leakage-resilient PKE scheme with CCA security.
Des. Codes Cryptogr., 2021

Novel Public-Key Encryption with Continuous Leakage Amplification.
Comput. J., 2021

2020
Identity-based encryption with leakage-amplified chosen-ciphertext attacks security.
Theor. Comput. Sci., 2020

Novel updatable identity-based hash proof system and its applications.
Theor. Comput. Sci., 2020

Fully secure wicked identity-based encryption resilient to continual auxiliary- inputs leakage.
J. Inf. Secur. Appl., 2020

A generic construction of CCA-secure deterministic encryption.
Inf. Process. Lett., 2020

Practical continuous leakage-resilient CCA secure identity-based encryption.
Frontiers Comput. Sci., 2020

Continuous Leakage-Resilient Certificate-Based Encryption Scheme Without Bilinear Pairings.
Comput. J., 2020

Improvement of Attribute-Based Encryption Using Blakley Secret Sharing.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020

2019
The generic construction of continuous leakage-resilient identity-based cryptosystems.
Theor. Comput. Sci., 2019

Anonymous and Updatable Identity-Based Hash Proof System.
IEEE Syst. J., 2019

An Approach Enabling Various Queries on Encrypted Industrial Data Stream.
Secur. Commun. Networks, 2019

Identity-based encryption resilient to continuous key leakage.
IET Inf. Secur., 2019

Continuous leakage-resilient identity-based encryption with leakage amplification.
Des. Codes Cryptogr., 2019

Continuous Leakage-Resilient Identity-Based Encryption with Tight Security.
Comput. J., 2019

Provably Secure Proactive Secret Sharing Without the Adjacent Assumption.
Proceedings of the Provable Security, 2019

Leakage-Resilient Certificateless Signcryption Scheme.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019

2018
Aleakage-resilient certificateless public key encryption scheme with CCA2 security.
Frontiers Inf. Technol. Electron. Eng., 2018

Updatable Identity-Based Hash Proof System Based on Lattices and Its Application to Leakage-Resilient Public-Key Encryption Schemes.
J. Comput. Sci. Technol., 2018

Leakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairing.
Inf. Process. Lett., 2018

Continuous Leakage-Resilient Identity-Based Encryption without Random Oracles.
Comput. J., 2018

Continuous leakage-resilient access control for wireless sensor networks.
Ad Hoc Networks, 2018

Verifiable Secret Sharing Based on Hyperplane Geometry with Its Applications to Optimal Resilient Proactive Cryptosystems.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Continuous leakage-resilient certificateless public key encryption with CCA security.
Knowl. Based Syst., 2017

Continuous Leakage-Resilient Public-Key Encryption Scheme with CCA Security.
Comput. J., 2017

An Efficient Key-Policy Attribute-Based Searchable Encryption in Prime-Order Groups.
Proceedings of the Provable Security, 2017

2016
CCA2 secure public-key encryption scheme tolerating continual leakage attacks.
Secur. Commun. Networks, 2016

Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing.
Discret. Appl. Math., 2016

2009
Behavioral Modeling of RF Power amplifiers Using Modified Volterra Series.
J. Circuits Syst. Comput., 2009


  Loading...