Yongli Tang

Orcid: 0000-0003-2783-7065

According to our database1, Yongli Tang authored at least 30 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
More efficient constant-round secure multi-party computation based on optimized Tiny-OT and half-gate.
J. Inf. Secur. Appl., December, 2023

A remote sensing encrypted data search method based on a novel double-chain.
Connect. Sci., December, 2023

Dynamic forward secure searchable encryption scheme with phrase search for smart healthcare.
J. Syst. Archit., November, 2023

Efficient lattice-based traceable ring signature scheme with its application in blockchain.
Inf. Sci., November, 2023

A Novel Edge Cache-Based Private Set Intersection Protocol via Lightweight Oblivious PRF.
Entropy, September, 2023

Lattice-Based Group Signatures With Time-Bound Keys via Redactable Signatures.
IEEE Trans. Inf. Forensics Secur., 2023

Attribute-Based Verifiable Conditional Proxy Re-Encryption Scheme.
Entropy, 2023

2022
An Android Malicious Application Detection Method with Decision Mechanism in the Operating Environment of Blockchain.
Secur. Commun. Networks, 2022

Blockchain-based verifiable and dynamic multi-keyword ranked searchable encryption scheme in cloud computing.
J. Inf. Secur. Appl., 2022

Cloud-edge collaboration based peer to peer services redirection strategy for passive optical network.
IET Commun., 2022

Multi-keywords fuzzy search encryption supporting dynamic update in an intelligent edge network.
Connect. Sci., 2022

Lattice-based public-key encryption with conjunctive keyword search in multi-user setting for IIoT.
Clust. Comput., 2022

2021
Identity-Based Linkable Ring Signature on NTRU Lattice.
Secur. Commun. Networks, 2021

Edge-Cloud-Assisted Multiuser Forward Secure Searchable Encryption (EMFSSE) Scheme in the P2P Networking Environment.
Mob. Inf. Syst., 2021

Chapter Four - Provably secure verifier-based password authenticated key exchange based on lattices.
Adv. Comput., 2021

2020
Secure and Efficient Image Compression-Encryption Scheme Using New Chaotic Structure and Compressive Sensing.
Secur. Commun. Networks, 2020

Offline/Online Outsourced Attribute-Based Encryption with Partial Policy Hidden for the Internet of Things.
J. Sensors, 2020

Outsourced ciphertext-policy attribute-based encryption with partial policy hidden.
Int. J. Distributed Sens. Networks, 2020

Traceable and Weighted Attribute-Based Encryption Scheme in the Cloud Environment.
IEEE Access, 2020

Blockchain-Based Searchable Encryption Scheme With Fair Payment.
IEEE Access, 2020

2019
White-Box Traceable Ciphertext-Policy Attribute-Based Encryption in Multi-Domain Environment.
IEEE Access, 2019

A Lightweight Two-Way Authentication Scheme Between Communication Nodes for Software Defined Optical Access Network.
IEEE Access, 2019

RLWE Commitment-Based Linkable Ring Signature Scheme and Its Application in Blockchain.
Proceedings of the Blockchain and Trustworthy Systems - First International Conference, 2019

2018
A Randomness Detection Method of ZigBee Protocol in a Wireless Sensor Network.
Sensors, 2018

Efficient batch identity-based fully homomorphic encryption scheme in the standard model.
IET Inf. Secur., 2018

Attribute-Based Encryption Scheme Supporting Tree-Access Structure on Ideal Lattices.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

A Novel Hierarchical Identity-Based Encryption Scheme from Lattices.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Adaptively Chosen Ciphertext Secure Lattice IBE Based Programmable Hash Function in the Standard Model.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

A Novel Hierarchical Identity-Based Fully Homomorphic Encryption Scheme from Lattices.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2014
Identifying top Chinese network buzzwords from social media big data set based on time-distribution features.
Proceedings of the 2014 IEEE International Conference on Big Data (IEEE BigData 2014), 2014


  Loading...