Yujue Wang

According to our database1, Yujue Wang authored at least 24 papers between 2011 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Privacy-Preserving Cloud-Based Road Condition Monitoring With Source Authentication in VANETs.
IEEE Trans. Information Forensics and Security, 2019

A Secure and Efficient Group Key Agreement Scheme for VANET.
Sensors, 2019

Securing messaging services through efficient signcryption with designated equality test.
Inf. Sci., 2019

2018
Ownership-hidden group-oriented proofs of storage from pre-homomorphic signatures.
Peer-to-Peer Networking and Applications, 2018

Verifiably encrypted cascade-instantiable blank signatures to secure progressive decision management.
Int. J. Inf. Sec., 2018

2017
Online/Offline Provable Data Possession.
IEEE Trans. Information Forensics and Security, 2017

Identity-Based Data Outsourcing With Comprehensive Auditing in Clouds.
IEEE Trans. Information Forensics and Security, 2017

Secure server-aided top-k monitoring.
Inf. Sci., 2017

CCA Secure encryption supporting authorized equality test on ciphertexts in standard model and its applications.
Inf. Sci., 2017

Probabilistic Public Key Encryption for Controlled Equijoin in Relational Databases.
Comput. J., 2017

2016
Security Implications of Transport Layer Protocols in Power Grid Synchrophasor Data Communication.
IEEE Trans. Smart Grid, 2016

Design of Tunnel Magnetoresistive-Based Circular MFL Sensor Array for the Detection of Flaws in Steel Wire Rope.
J. Sensors, 2016

Provably secure robust optimistic fair exchange of distributed signatures.
Future Generation Comp. Syst., 2016

Versatile lightweight key distribution for big data privacy in vehicular ad hoc networks.
Concurrency and Computation: Practice and Experience, 2016

Quantifying Uncertainties of Security and QoS for Design of Power Grid Communications Systems.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

2015
Practical (fully) distributed signatures provably secure in the standard model.
Theor. Comput. Sci., 2015

Further ideal multipartite access structures from integer polymatroids.
SCIENCE CHINA Information Sciences, 2015

Batch Blind Signatures on Elliptic Curves.
Proceedings of the Information Security Practice and Experience, 2015

Group-oriented Proofs of Storage.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Efficient Sub-/Inter-Group Key Distribution for ad hoc Networks.
Proceedings of the Network and System Security - 8th International Conference, 2014

Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage.
Proceedings of the Computer Security - ESORICS 2014, 2014

Practical Distributed Signatures in the Standard Model.
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014

2011
An Evidence-Based Trust Assessment Framework for Critical Infrastructure Decision Making.
Proceedings of the Critical Infrastructure Protection V, 2011

Feature extraction of vigilance level based on Heart Rate Variability of Electrocardiogram.
Proceedings of the 4th International Conference on Biomedical Engineering and Informatics, 2011


  Loading...