Yao Lu
Affiliations:- University of Tokyo, Department of Complexity Science and Engineering, Japan
- Chinese Academy of Sciences, Institute of Information Engineering, State Key Laboratory of Information Security, Beijing, China (PhD 2015)
According to our database1,
Yao Lu
authored at least 23 papers
between 2012 and 2019.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2019
2018
Proceedings of the Information and Communications Security - 20th International Conference, 2018
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing.
IEEE Trans. Dependable Secur. Comput., 2017
Fine-grained access control system based on fully outsourced attribute-based encryption.
J. Syst. Softw., 2017
Provably secure cloud storage for mobile networks with less computation and smaller overhead.
Sci. China Inf. Sci., 2017
Proceedings of the Mathematical Modelling for Next-Generation Cryptography: CREST Crypto-Math Project, 2017
2016
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016
2015
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015
Proceedings of the Advances in Information and Computer Security, 2015
Proceedings of the Progress in Cryptology - INDOCRYPT 2015, 2015
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015
2014
New Results on Solving Linear Equations Modulo Unknown Divisors and its Applications.
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Applied Cryptography and Network Security, 2014
2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013
2012
Proceedings of the Pairing-Based Cryptography - Pairing 2012, 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
A New Variant of Time Memory Trade-Off on the Improvement of Thing and Ying's Attack.
Proceedings of the Information and Communications Security - 14th International Conference, 2012