Yu Long

According to our database1, Yu Long authored at least 37 papers between 2005 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Fork-free hybrid consensus with flexible Proof-of-Activity.
Future Gener. Comput. Syst., 2019

A new VRSA-based pairing-free certificateless signature scheme for fog computing.
Concurr. Comput. Pract. Exp., 2019

A Secure and Practical Blockchain Scheme for IoT.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Making Monero Hard-to-Trace and More Efficient.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Towards a Multi-chain Future of Proof-of-Space.
Proceedings of the Security and Privacy in Communication Networks, 2019

TumbleBit++: A Comprehensive Privacy Protocol Providing Anonymity and Amount-Invisibility.
Proceedings of the Provable Security, 2019

A Practical Dynamic Enhanced BFT Protocol.
Proceedings of the Network and System Security - 13th International Conference, 2019

Gnocchi: Multiplexed Payment Channels for Cryptocurrencies.
Proceedings of the Network and System Security - 13th International Conference, 2019

2018
A new randomized message-locked encryption in the standard model.
Peer Peer Netw. Appl., 2018

Access control encryption with efficient verifiable sanitized decryption.
Inf. Sci., 2018

Goshawk: A Novel Efficient, Robust and Flexible Blockchain Protocol.
IACR Cryptol. ePrint Arch., 2018

Secure Scheme Against Compromised Hash in Proof-of-Work Blockchain.
Proceedings of the Network and System Security - 12th International Conference, 2018

Dynamic Practical Byzantine Fault Tolerance.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Z-Channel: Scalable and Efficient Scheme in Zerocash.
IACR Cryptol. ePrint Arch., 2017

Forking-Free Hybrid Consensus with Generalized Proof-of-Activity.
IACR Cryptol. ePrint Arch., 2017

An efficient pairing-free certificateless signature scheme for resource-limited systems.
Sci. China Inf. Sci., 2017

An Efficient and Provably Secure Pairing-Free Certificateless Signature Scheme Based on Variant of RSA.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

2016
Fuzzy certificateless signature.
Secur. Commun. Networks, 2016

Cryptanalysis of a certificateless aggregate signature scheme.
Secur. Commun. Networks, 2016

2015
A Modified Efficient Certificateless Signature Scheme without Bilinear Pairings.
Proceedings of the 2015 International Conference on Intelligent Networking and Collaborative Systems, 2015

2014
Attribute-based key-insulated signature and its applications.
Inf. Sci., 2014

On the Security of a Lattice-Based Multi-party Concurrent Signature Scheme.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014

2012
Identity-Based Key-Insulated Signcryption.
Informatica, 2012

Accountable authority key policy attribute-based encryption.
Sci. China Inf. Sci., 2012

2011
Restrictive partially blind signature for resource-constrained information systems.
Knowl. Inf. Syst., 2011

Key updating technique in identity-based encryption.
Inf. Sci., 2011

2010
An Adaptive Key Management Framework for the Wireless Mesh and Sensor Networks.
Wirel. Sens. Netw., 2010

Practical Certificateless Aggregate Signatures from Bilinear Maps.
J. Inf. Sci. Eng., 2010

Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism.
Inf. Sci., 2010

2009
Provably Secure Identity-based Threshold Key Escrow from Pairing.
Int. J. Netw. Secur., 2009

2007
Certificateless threshold cryptosystem secure against chosen-ciphertext attack.
Inf. Sci., 2007

ID-based threshold decryption secure against adaptive chosen-ciphertext attack.
Comput. Electr. Eng., 2007

Two Certificateless Aggregate Signatures From Bilinear Maps.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Efficient Partially Blind Signature from LFSR.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

2006
Adaptive Chosen Ciphertext Secure Threshold Key Escrow Scheme from Pairing.
Informatica, 2006

Construction of Dynamic Threshold Decryption Scheme from Pairing.
Int. J. Netw. Secur., 2006

2005
A dynamic threshold commercial key escrow scheme based on conic.
Appl. Math. Comput., 2005


  Loading...