Yong Li

Orcid: 0000-0002-6920-0663

Affiliations:
  • Huawei Technologies Düsseldorf GmbH, Germany
  • Ruhr University Bochum, Germany (PhD 2016)


According to our database1, Yong Li authored at least 15 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Practical Certificate-Less Infrastructure with Application in TLS.
Cryptogr., September, 2023

Efficient Forward Secrecy for TLS-PSK from Pure Symmetric Cryptography.
Proceedings of the Information Security - 26th International Conference, 2023

2021
Flexible Group Non-interactive Key Exchange in the Standard Model.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2021

Perfect Anonymous Authentication and Secure Communication in Internet-of-Things.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2021

2020
Non-interactive certificate update protocol for efficient authentication in IoT.
Future Gener. Comput. Syst., 2020

Lightweight key management system for inter-node communication in IoT.
Proceedings of the IoT '20: 10th International Conference on the Internet of Things, 2020

2018
Flexible certificate revocation list for efficient authentication in IoT.
Proceedings of the 8th International Conference on the Internet of Things, 2018

2017
Secure Deduplication of Encrypted Data: Refined Model and New Constructions.
IACR Cryptol. ePrint Arch., 2017

No-Match Attacks and Robust Partnering Definitions - Defining Trivial Attacks for Security Protocols is Not Trivial.
IACR Cryptol. ePrint Arch., 2017

2016
Design and analysis of cryptographic protocols.
PhD thesis, 2016

2015
On the Impossibility of Tight Cryptographic Reductions.
IACR Cryptol. ePrint Arch., 2015

2014
On the Security of the Pre-Shared Key Ciphersuites of TLS.
IACR Cryptol. ePrint Arch., 2014

Tightly-Secure Authenticated Key Exchange.
IACR Cryptol. ePrint Arch., 2014

New Modular Compilers for Authenticated Key Exchange.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
Strongly Secure One-round Group Authenticated Key Exchange in the Standard Model.
IACR Cryptol. ePrint Arch., 2013


  Loading...