Yanyan Ji

Orcid: 0000-0003-0559-0700

According to our database1, Yanyan Ji authored at least 19 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Efficient Key-Escrow-Free and Vehicle-Revocable Data Sharing Protocol for Vehicular Ad Hoc Network.
IEEE Internet Things J., April, 2024

2022
Comment on "A Lightweight Auditing Service for Shared Data With Secure User Revocation in Cloud Storage".
IEEE Trans. Serv. Comput., 2022

Toward Usable Cloud Storage Auditing, Revisited.
IEEE Syst. J., 2022

Identity-based remote data checking with a designated verifier.
J. Cloud Comput., 2022

Secure medical data management with privacy-preservation and authentication properties in smart healthcare system.
Comput. Networks, 2022

Flexible identity-based remote data integrity checking for cloud storage with privacy preserving property.
Clust. Comput., 2022

2021
Efficient TPA-based auditing scheme for secure cloud storage.
Clust. Comput., 2021

Secure network coding from secure proof of retrievability.
Sci. China Inf. Sci., 2021

2020
Comment on "A Tag Encoding Scheme Against Pollution Attack to Linear Network Coding".
IEEE Trans. Parallel Distributed Syst., 2020

Certificateless Homomorphic Signature Scheme for Network Coding.
IEEE/ACM Trans. Netw., 2020

Efficient Identity-Based Provable Multi-Copy Data Possession in Multi-Cloud Storage, Revisited.
IEEE Commun. Lett., 2020

Privacy-preserving certificateless provable data possession scheme for big data storage on cloud, revisited.
Appl. Math. Comput., 2020

RKA Security for Identity-Based Signature Scheme.
IEEE Access, 2020

2019
General transformations from single-generation to multi-generation for homomorphic message authentication schemes in network coding.
Future Gener. Comput. Syst., 2019

On the KDM-CCA Security from Partial Trapdoor One-Way Family in the Random Oracle Model.
Comput. J., 2019

Security Analysis of an Efficient Null Space-Based Homomorphic MAC Scheme Against Tag Pollution Attacks in RLNC.
IEEE Access, 2019

2018
On the RKA Security of the Standard-Model-Based BFKW Network Coding Signature Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

2015
SEE_ME: Software Engineering Education Methodology Exploration.
Proceedings of the IEEE International Conference on Teaching, 2015

2012
How to control a DC Motor using ZX.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012


  Loading...