Yinchun Yang

According to our database1, Yinchun Yang authored at least 13 papers between 2009 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
A generic construction of identity-based proxy signature scheme in the standard model.
Int. J. Inf. Comput. Secur., 2019

2017
An improved efficient identity-based proxy signature in the standard model.
Int. J. Comput. Math., 2017

2015
A verifiable hierarchical circular shift cipher scheme for P2P chunk exchanges.
Peer Peer Netw. Appl., 2015

Security Analysis of an Efficient Identity-Based Proxy Signature in the Standard Model.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Sustaining a perpetual wireless sensor network by multiple on-demand mobile wireless chargers.
Proceedings of the 12th IEEE International Conference on Networking, Sensing and Control, 2015

An Efficient Identity-Based Proxy Signature Scheme in the Standard Model with Tight Reduction.
Proceedings of the International Joint Conference, 2015

2014
Constant Size Ciphertext and Private Key HIBE without Random Oracles.
J. Inf. Sci. Eng., 2014

Programming wireless recharging for target-oriented rechargeable sensor networks.
Proceedings of 11th IEEE International Conference on Networking, Sensing and Control, 2014

A Preliminary Analysis of Yiban Microblogging Service.
Proceedings of the Enterprise Systems Conference, 2014

Characterizing Patterns of Chinese Yiban Blogging Service.
Proceedings of the 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2014

2013
Short Hierarchical Identity-based Encryption in the Selective-ID Model.
J. Softw., 2013

Measurement and analysis of Shanghai Xinmin microblog website.
Proceedings of the 2013 IEEE International Conference on Granular Computing, 2013

2009
Identity Based Proxy Re-Signature Schemes without Random Oracle.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009


  Loading...