Yujue Wang

According to our database1, Yujue Wang authored at least 35 papers between 2011 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Secure Metering Data Aggregation With Batch Verification in Industrial Smart Grid.
IEEE Trans. Ind. Informatics, 2020

Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud.
IEEE Trans. Inf. Forensics Secur., 2020

Secure server-aided data sharing clique with attestation.
Inf. Sci., 2020

2019
Privacy-Preserving Cloud-Based Road Condition Monitoring With Source Authentication in VANETs.
IEEE Trans. Inf. Forensics Secur., 2019

A Secure and Efficient Group Key Agreement Scheme for VANET.
Sensors, 2019

Securing messaging services through efficient signcryption with designated equality test.
Inf. Sci., 2019

MagneticSpy: Exploiting Magnetometer in Mobile Devices for Website and Application Fingerprinting.
CoRR, 2019

MagneticSpy: Exploiting Magnetometer in Mobile Devices for Website and Application Fingerprinting.
Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society, 2019

Research on Space Information Network Protocol.
Proceedings of the Space Information Networks - 4th International Conference, 2019

Vibrational Covert Channels using Low-Frequency Acoustic Signals.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019

A Privacy-Preserving TPA-aided Remote Data Integrity Auditing Scheme in Clouds.
Proceedings of the Data Science, 2019

Wireless Communication Signal Strength Prediction Method Based on the K-nearest Neighbor Algorithm.
Proceedings of the Data Science, 2019

eRoc: A Distributed Blockchain System with Fast Consensus.
Proceedings of the 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2019

Histogram Publishing Algorithm Based on Sampling Sorting and Greedy Clustering.
Proceedings of the Blockchain and Trustworthy Systems - First International Conference, 2019

2018
Ownership-hidden group-oriented proofs of storage from pre-homomorphic signatures.
Peer Peer Netw. Appl., 2018

Verifiably encrypted cascade-instantiable blank signatures to secure progressive decision management.
Int. J. Inf. Sec., 2018

2017
Online/Offline Provable Data Possession.
IEEE Trans. Inf. Forensics Secur., 2017

Identity-Based Data Outsourcing With Comprehensive Auditing in Clouds.
IEEE Trans. Inf. Forensics Secur., 2017

Secure server-aided top-k monitoring.
Inf. Sci., 2017

CCA Secure encryption supporting authorized equality test on ciphertexts in standard model and its applications.
Inf. Sci., 2017

Probabilistic Public Key Encryption for Controlled Equijoin in Relational Databases.
Comput. J., 2017

2016
Security Implications of Transport Layer Protocols in Power Grid Synchrophasor Data Communication.
IEEE Trans. Smart Grid, 2016

Design of Tunnel Magnetoresistive-Based Circular MFL Sensor Array for the Detection of Flaws in Steel Wire Rope.
J. Sensors, 2016

Provably secure robust optimistic fair exchange of distributed signatures.
Future Gener. Comput. Syst., 2016

Versatile lightweight key distribution for big data privacy in vehicular ad hoc networks.
Concurr. Comput. Pract. Exp., 2016

Quantifying Uncertainties of Security and QoS for Design of Power Grid Communications Systems.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

2015
Practical (fully) distributed signatures provably secure in the standard model.
Theor. Comput. Sci., 2015

Further ideal multipartite access structures from integer polymatroids.
Sci. China Inf. Sci., 2015

Batch Blind Signatures on Elliptic Curves.
Proceedings of the Information Security Practice and Experience, 2015

Group-oriented Proofs of Storage.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Efficient Sub-/Inter-Group Key Distribution for ad hoc Networks.
Proceedings of the Network and System Security - 8th International Conference, 2014

Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage.
Proceedings of the Computer Security - ESORICS 2014, 2014

Practical Distributed Signatures in the Standard Model.
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014

2011
An Evidence-Based Trust Assessment Framework for Critical Infrastructure Decision Making.
Proceedings of the Critical Infrastructure Protection V, 2011

Feature extraction of vigilance level based on Heart Rate Variability of Electrocardiogram.
Proceedings of the 4th International Conference on Biomedical Engineering and Informatics, 2011


  Loading...