Yongjun Ren

Orcid: 0000-0001-6602-9576

According to our database1, Yongjun Ren authored at least 72 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Virtual human pose estimation in a fire education system for children with autism spectrum disorders.
Multim. Syst., April, 2024

2023
BTDSI: A blockchain-based trusted data storage mechanism for Industry 5.0.
J. King Saud Univ. Comput. Inf. Sci., September, 2023

S-BDS: An Effective Blockchain-based Data Storage Scheme in Zero-Trust IoT.
ACM Trans. Internet Techn., August, 2023

Continuous trajectory similarity search with result diversification.
Future Gener. Comput. Syst., June, 2023

Access control mechanism for the Internet of Things based on blockchain and inner product encryption.
J. Inf. Secur. Appl., May, 2023

Blockchain Data Availability Scheme with Strong Data Privacy Protection.
Inf., February, 2023

Multi-server assisted data sharing supporting secure deduplication for metaverse healthcare systems.
Future Gener. Comput. Syst., 2023

BSMD: A blockchain-based secure storage mechanism for big spatio-temporal data.
Future Gener. Comput. Syst., 2023

Multimodal Spatiotemporal Feature Map for Dynamic Gesture Recognition.
Comput. Syst. Sci. Eng., 2023

Distributed Timestamp Mechanism Based on Verifiable Delay Functions.
Comput. Syst. Sci. Eng., 2023

Block Verification Mechanism Based on Zero-Knowledge Proof in Blockchain.
Comput. Syst. Sci. Eng., 2023

NVAS: A non-interactive verifiable federated learning aggregation scheme for COVID-19 based on game theory.
Comput. Commun., 2023

V-Curve25519: Efficient Implementation of Curve25519 on RISC-V Architecture.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

2022
Novel Vote Scheme for Decision-Making Feedback Based on Blockchain in Internet of Vehicles.
IEEE Trans. Intell. Transp. Syst., 2022

Verifiable Delay Function and Its Blockchain-Related Application: A Survey.
Sensors, 2022

Nonnegative matrix factorization-based privacy-preserving collaborative filtering on cloud computing.
Trans. Emerg. Telecommun. Technol., 2022

Data security storage mechanism based on blockchain industrial Internet of Things.
Comput. Ind. Eng., 2022

2021
Integrity Verification Mechanism of Sensor Data Based on Bilinear Map Accumulator.
ACM Trans. Internet Techn., 2021

Privacy-Preserving Smart Road-Pricing System with Trustworthiness Evaluation in VANETs.
Sensors, 2021

Threshold Key Management Scheme for Blockchain-Based Intelligent Transportation Systems.
Secur. Commun. Networks, 2021

Blockchain-based trust establishment mechanism in the internet of multimedia things.
Multim. Tools Appl., 2021

An Integrated Artificial Neural Network-based Precipitation Revision Model.
KSII Trans. Internet Inf. Syst., 2021

Lightning location method based on improved fuzzy C-means clustering algorithm.
Int. J. Sens. Networks, 2021

Multiple cloud storage mechanism based on blockchain in smart homes.
Future Gener. Comput. Syst., 2021

Front-end Control Mechanism of Electronic Records.
Comput. Syst. Sci. Eng., 2021

Key Exposure Resistant Group Key Agreement Protocol.
Proceedings of the Provable and Practical Security, 2021

A Provable Data Possession Protocol in Cloud Storage Systems with Fault Tolerance.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

2020
Secure and Intelligent Energy Data Management Scheme for Smart IoT Devices.
Wirel. Commun. Mob. Comput., 2020

Data Query Mechanism Based on Hash Computing Power of Blockchain in Internet of Things.
Sensors, 2020

Comparative analysis on detection performance with ground-based microwave radiometer and radiosonde.
Int. J. Embed. Syst., 2020

Multi-source Meteorological Observation Data Quality Control Algorithm Based on Data Mining.
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020

2019
Data Storage Mechanism Based on Blockchain with Privacy Protection in Wireless Body Area Network.
Sensors, 2019

A CCA-secure multi-conditional proxy broadcast re-encryption scheme for cloud storage system.
J. Inf. Secur. Appl., 2019

Local outlier detection based on information entropy weighting.
Int. J. Sens. Networks, 2019

A new method of text information hiding based on open channel.
Int. J. High Perform. Comput. Netw., 2019

An efficient method for meteorological nephogram recognition in cloud environment.
EURASIP J. Wirel. Commun. Netw., 2019

A hierarchical clustering based method to evaluate reuse of rare earth tailings under cloud computing environment.
Clust. Comput., 2019

A Nephogram Recognition Algorithm Based on Cloud Computing Platform.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019

NMF-Based Privacy-Preserving Collaborative Filtering on Cloud Computing.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019

2018
A Novel Security Scheme Based on Instant Encrypted Transmission for Internet of Things.
Secur. Commun. Networks, 2018

Implicit authentication protocol and self-healing key management for WBANs.
Multim. Tools Appl., 2018

Incentive Mechanism of Data Storage Based on Blockchain for Wireless Sensor Networks.
Mob. Inf. Syst., 2018

Digital Continuity Guarantee of Electronic Record Based on Data Usability in Big Data Environment.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Preservation Mechanism of Electronic Record Based on Erasure Code and Multi Copies in Cloud Storage.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Digital Continuity Guarantee Based on Data Consistency in Cloud Storage.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Consistency Guarantee Method of Electronic Record Based on Blockchain in Cloud Storage.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2016
Efficient data integrity auditing for storage security in mobile health cloud.
Peer-to-Peer Netw. Appl., 2016

A Key-Policy Attribute-Based Proxy Re-Encryption Without Random Oracles.
Comput. J., 2016

A RFID Based Localization Algorithm for Wireless Sensor Networks.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

2015
一种基于区域划分的DTN路由算法 (DTN Routing Algorithm Based on Region Segmentation).
计算机科学, 2015

Reliable access control for multi-authority in cloud storage.
Proceedings of the International Carnahan Conference on Security Technology, 2015

Outsourced data tagging via authority and delegable auditing for cloud storage.
Proceedings of the International Carnahan Conference on Security Technology, 2015

Privacy-preserving proof of storage in large group.
Proceedings of the International Carnahan Conference on Security Technology, 2015

Data protection based on multifunction digital watermark in wireless sensor network.
Proceedings of the International Carnahan Conference on Security Technology, 2015

A Mobile-Sink Based Energy Efficiency Clustering Routing Algorithm for WSNs in Coal Mine.
Proceedings of the Third International Conference on Advanced Cloud and Big Data, 2015

2014
A Novel Hash-Based RFID Grouping Authentication Protocol on Tag Groups and Multiple Readers.
Proceedings of the Intelligent Systems and Applications, 2014

A Comparative Survey on RFID Grouping Authentication Protocols.
Proceedings of the Intelligent Systems and Applications, 2014

Attributed Based Provable Data Possession in Public Cloud Storage.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Oriented Group Provable Data Possession in Public Cloud.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Security Analysis of Delegable and Proxy Provable Data Possession in Public Cloud Storage.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Analysis of Delegable and Proxy Provable Data Possession for Cloud Storage.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Leakage Resilient Provable Data Possession in Public Cloud Storage.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

2013
Fuzzy conditional proxy re-encryption.
Sci. China Inf. Sci., 2013

Efficient Key Management Scheme for SCADA System.
Proceedings of the Advanced Technologies, Embedded and Multimedia for Human-centric Computing, 2013

2010
Decryptable Public Key Encryption with Keyword Search Schemes.
J. Digit. Content Technol. its Appl., 2010

Chosen Public Key and Ciphertext Secure Proxy Re-encryption Schemes.
J. Digit. Content Technol. its Appl., 2010

An efficient unlinkable secret handshake protocol without ROM.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

Improved unidirectional chosen-ciphertext secure proxy re-encryption.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

2008
Formal Proof of Relative Strengths of Security between ECK2007 Model and other Proof Models for Key Agreement Protocols.
IACR Cryptol. ePrint Arch., 2008

Chosen-Ciphertext Secure Fuzzy Identity-Based Key Encapsulation without ROM.
IACR Cryptol. ePrint Arch., 2008

Chosen-Ciphertext Secure Multi-Authority Fuzzy Identity-Based Key Encapsulation without ROM.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2007
Identity-Based Key Issuing Protocol for Ad Hoc Networks.
Proceedings of the Computational Intelligence and Security, International Conference, 2007


  Loading...