Yong Yu

According to our database1, Yong Yu authored at least 103 papers between 2007 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems.
IEEE Trans. Dependable Sec. Comput., 2019

An alternative approach to public cloud data auditing supporting data dynamics.
Soft Comput., 2019

An Approach Enabling Various Queries on Encrypted Industrial Data Stream.
Security and Communication Networks, 2019

Enabling Secure Intelligent Network with Cloud-Assisted Privacy-Preserving Machine Learning.
IEEE Network, 2019

Advances of Provable Security Techniques.
J. UCS, 2019

Blockchain based privacy-preserving software updates with proof-of-delivery for Internet of Things.
J. Parallel Distrib. Comput., 2019

Machine learning based privacy-preserving fair data trading in big data market.
Inf. Sci., 2019

Efficient attribute-based encryption with attribute revocation for assured data deletion.
Inf. Sci., 2019

LRCoin: Leakage-Resilient Cryptocurrency Based on Bitcoin for Data Trading in IoT.
IEEE Internet of Things Journal, 2019

Preface: Special Issue Cryptography and Provable Security.
Int. J. Found. Comput. Sci., 2019

Blockchain based Privacy-Preserving Software Updates with Proof-of-Delivery for Internet of Things.
CoRR, 2019

A Blockchain-based Self-tallying Voting Scheme in Decentralized IoT.
CoRR, 2019

An Efficient Linkable Group Signature for Payer Tracing in Anonymous Cryptocurrencies.
CoRR, 2019

Leakage Resilient CCA Security in Stronger Model: Branch Hidden ABO-LTFs and Their Applications.
Comput. J., 2019

2018
Blockchain-Based Solutions to Security and Privacy Issues in the Internet of Things.
IEEE Wireless Commun., 2018

Privacy-Preserving Smart Parking Navigation Supporting Efficient Driving Guidance Retrieval.
IEEE Trans. Vehicular Technology, 2018

Assured Data Deletion With Fine-Grained Access Control for Fog-Based Industrial Applications.
IEEE Trans. Industrial Informatics, 2018

Updatable Identity-Based Hash Proof System Based on Lattices and Its Application to Leakage-Resilient Public-Key Encryption Schemes.
J. Comput. Sci. Technol., 2018

Data integrity checking with reliable data transfer for secure cloud storage.
IJWGS, 2018

Privacy preserving cloud data auditing with efficient key update.
Future Generation Comp. Syst., 2018

Content Protection in Named Data Networking: Challenges and Potential Solutions.
CoRR, 2018

LRCoin: Leakage-resilient Cryptocurrency Based on Bitcoin for Data Trading in IoT.
CoRR, 2018

Assured Data Deletion with Fine-grained Access Control for Fog-based Industrial Applications.
CoRR, 2018

Content Protection in Named Data Networking: Challenges and Potential Solutions.
IEEE Communications Magazine, 2018

Exploring New Authentication Protocols for Sensitive Data Protection on Smartphones.
IEEE Communications Magazine, 2018

Structural Key Recovery of Simple Matrix Encryption Scheme Family.
Comput. J., 2018

Novel Smooth Hash Proof Systems Based on Lattices.
Comput. J., 2018

Secure Pub-Sub: Blockchain-Based Fair Payment With Reputation for Reliable Cyber Physical Systems.
IEEE Access, 2018

An Efficient Privacy Preserving Batch Authentication Scheme with Deterable Function for VANETs.
Proceedings of the Network and System Security - 12th International Conference, 2018

DSH: Deniable Secret Handshake Framework.
Proceedings of the Information Security Practice and Experience, 2018

A Bignum Network Coding Scheme for Multipath Transmission in Vehicular Networks.
Proceedings of the IEEE Global Communications Conference, 2018

An Efficient Anonymous Authentication Scheme Based on Double Authentication Preventing Signature for Mobile Healthcare Crowd Sensing.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

Anonymous Identity-Based Hash Proof System from Lattices in the Standard Model.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage.
IEEE Trans. Information Forensics and Security, 2017

EACSIP: Extendable Access Control System With Integrity Protection for Enhancing Collaboration in the Cloud.
IEEE Trans. Information Forensics and Security, 2017

Efficient E-coupon systems with strong user privacy.
Telecommunication Systems, 2017

Improved dynamic remote data auditing protocol for smart city security.
Personal and Ubiquitous Computing, 2017

One-Round Attribute-Based Key Exchange in the Multi-Party Setting.
Int. J. Found. Comput. Sci., 2017

Cloud computing security and privacy: Standards and regulations.
Computer Standards & Interfaces, 2017

Identity-based provable data possession revisited: Security analysis and generic construction.
Computer Standards & Interfaces, 2017

Achieving public verifiability and data dynamics for cloud data in the standard model.
Cluster Computing, 2017

Privacy-Preserving Extraction of HOG Features Based on Integer Vector Homomorphic Encryption.
Proceedings of the Information Security Practice and Experience, 2017

Privacy-Preserving k-time Authenticated Secret Handshakes.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Comments on "Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification".
IEEE Trans. Information Forensics and Security, 2016

Survey on key revocation mechanisms in wireless sensor networks.
J. Network and Computer Applications, 2016

Cloud data integrity checking with an identity-based auditing mechanism from RSA.
Future Generation Comp. Syst., 2016

Provable multiple replication data possession with full dynamics for secure cloud storage.
Concurrency and Computation: Practice and Experience, 2016

SDIVIP2: shared data integrity verification with identity privacy preserving in mobile clouds.
Concurrency and Computation: Practice and Experience, 2016

Recent advances in security and privacy in large-scale networks.
Concurrency and Computation: Practice and Experience, 2016

Cloud-Based Privacy-Preserving Parking Navigation Through Vehicular Communications.
Proceedings of the Security and Privacy in Communication Networks, 2016

One-Round Attribute-Based Key Exchange in the Multi-party Setting.
Proceedings of the Provable Security, 2016

Device-invisible two-factor authenticated key agreement protocol for BYOD.
Proceedings of the 2016 IEEE/CIC International Conference on Communications in China, 2016

Secure outsourced data transfer with integrity verification in cloud storage.
Proceedings of the 2016 IEEE/CIC International Conference on Communications in China, 2016

Secure and Deduplicated Spatial Crowdsourcing: A Fog-Based Approach.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Comments on a Public Auditing Mechanism for Shared Cloud Data Service.
IEEE Trans. Services Computing, 2015

Recent Advances in Security and Privacy in Big Data.
J. UCS, 2015

Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage.
Int. J. Inf. Sec., 2015

Advanced security analysis of a signature scheme with message recovery.
IJICS, 2015

Remote data possession checking with enhanced security for cloud storage.
Future Generation Comp. Syst., 2015

A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing.
Future Generation Comp. Syst., 2015

Secure Delegation of Signing Power from Factorization.
Comput. J., 2015

On Indistinguishability in Remote Data Integrity Checking.
Comput. J., 2015

Provably Secure Identity Based Provable Data Possession.
Proceedings of the Provable Security, 2015

Provable Data Possession Supporting Secure Data Transfer for Cloud Storage.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

2014
On the Security of an Efficient Dynamic Auditing Protocol in Cloud Storage.
IEEE Trans. Parallel Distrib. Syst., 2014

Efficient public key encryption with revocable keyword search.
Security and Communication Networks, 2014

An Efficient Provable Secure Public Auditing Scheme for Cloud Storage.
TIIS, 2014

Security pitfalls of an efficient threshold proxy signature scheme for mobile agents.
Inf. Process. Lett., 2014

Short computational Diffie-Hellman-based proxy signature scheme in the standard model.
Int. J. Communication Systems, 2014

On the security of auditing mechanisms for secure cloud storage.
Future Generation Comp. Syst., 2014

Improved security of a dynamic remote data possession checking protocol for cloud storage.
Expert Syst. Appl., 2014

Identity Privacy-Preserving Public Auditing with Dynamic Group for Secure Mobile Cloud Storage.
Proceedings of the Network and System Security - 8th International Conference, 2014

Improvement of a Remote Data Possession Checking Protocol from Algebraic Signatures.
Proceedings of the Information Security Practice and Experience, 2014

An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data Sharing.
Proceedings of the Information Security Practice and Experience, 2014

New Insight to Preserve Online Survey Accuracy and Privacy in Big Data Era.
Proceedings of the Computer Security - ESORICS 2014, 2014

2013
A Secure Scalar Product Protocol Against Malicious Adversaries.
J. Comput. Sci. Technol., 2013

A Secure Scalar Product Protocol and Its Applications to Computational Geometry.
JCP, 2013

Security Analysis of a Distributed Reprogramming Protocol for Wireless Sensor Networks.
IEICE Transactions, 2013

A novel construction of SDVS with secure disavowability.
Cluster Computing, 2013

A Secure and Efficient E-Cheque Protocol from Chameleon Hash Function.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Private Set Intersection via Public Key Encryption with Multiple Keywords Search.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

A New Construction of Proxy Signature Using Chameleon Hash Function.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

2012
Provably secure proxy signature scheme from factorization.
Mathematical and Computer Modelling, 2012

Cryptanalysis of a Fuzzy Identity Based Encryption Scheme in the Standard Model.
Informatica, Lith. Acad. Sci., 2012

Improved certificateless signature scheme provably secure in the standard model.
IET Information Security, 2012

Further Analysis of a Practical Hierarchical Identity-Based Encryption Scheme.
IEICE Transactions, 2012

A Strong Designated Verifier Signature Scheme with Secure Disavowability.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Further Cryptanalysis of a Signature Scheme with Message Recovery.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

2011
Strongly unforgeable proxy signature scheme secure in the standard model.
Journal of Systems and Software, 2011

Improvement of a proxy multi-signature scheme without random oracles.
Computer Communications, 2011

Cryptanalysis of an Off-Line Electronic Cash Scheme Based on Proxy Blind Signature.
Comput. J., 2011

2009
Identity based signcryption scheme without random oracles.
Computer Standards & Interfaces, 2009

An efficient anonymous proxy signature scheme with provable security.
Computer Standards & Interfaces, 2009

Designated verifier proxy signature scheme without random oracles.
Computers & Mathematics with Applications, 2009

Analysis and Improvement of a Proxy Blind Multi-signature Scheme without a Secure Channel.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Identity Based Multi-proxy Multi-signcryption Scheme for Electronic Commerce.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Identity-Based Authenticated Key Agreement Protocols without Bilinear Pairings.
IEICE Transactions, 2008

An Efficient and Provably Secure ID-Based Threshold Signcryption Scheme.
IACR Cryptology ePrint Archive, 2008

2007
A provably secure ID-based mediated signcryption scheme.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

ID-based threshold signature and mediated signature schemes.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Efficient Identity-Based Signcryption Scheme for Multiple Receivers.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

Provably Secure Identity-Based Threshold Unsigncryption Scheme.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007


  Loading...