Yi Tang

According to our database1, Yi Tang authored at least 15 papers between 2003 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
A Homomorphic Network Coding Signature Scheme for Multiple Sources and its Application in IoT.
Security and Communication Networks, 2018

Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks.
J. Network and Computer Applications, 2018

Normal Cloud Model-Based Algorithm for Multi-Attribute Trusted Cloud Service Selection.
IEEE Access, 2018

An ID-Based Linearly Homomorphic Signature Scheme and Its Application in Blockchain.
IEEE Access, 2018

2012
Trusted architecture for farmland wireless sensor networks.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

2010
AASC: Anonymizing network addresses based on subnet clustering.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

2006
A Method for Reducing False Hits in Querying Encrypted Databases.
Proceedings of the Eighth IEEE International Conference on E-Commerce Technology (CEC 2006) / Third IEEE International Conference on Enterprise Computing, 2006

Anting: An Adaptive Scanning Method for Computer Worms.
Proceedings of the 2006 IEEE / WIC / ACM International Conference on Web Intelligence (WI 2006), 2006

Sharing Session Keys in Encrypted Databases.
Proceedings of the 2006 IEEE International Conference on e-Business Engineering (ICEBE 2006), 2006

A Multi-agent Based Method for Reconstructing Buckets in Encrypted Databases.
Proceedings of the 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2006

2005
INFO: An Improving Strategy for Searching the Small World Networks.
Proceedings of the 2005 IEEE / WIC / ACM International Conference on Web Intelligence (WI 2005), 2005

Adaptive Bucket Formation in Encrypted Databases.
Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March, 2005

2004
Multi-agent collaborative service and distributed problem solving.
Cognitive Systems Research, 2004

Aggregating Local Behaviors Based Upon a Discrete Lagrange Multiplier Method.
Proceedings of the 2004 IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT 2004), 2004

2003
Agent Compromises in Distributed Problem Solving.
Proceedings of the Intelligent Data Engineering and Automated Learning, 2003


  Loading...