关注
Yanjiang Yang
Yanjiang Yang
Huawei Singapore Research Center
在 huawei.com 的电子邮件经过验证
标题
引用次数
引用次数
年份
Efficient unidirectional proxy re-encryption
SSM Chow, J Weng, Y Yang, RH Deng
Progress in Cryptology–AFRICACRYPT 2010: Third International Conference on …, 2010
4282010
Private query on encrypted data in multi-user settings
F Bao, RH Deng, X Ding, Y Yang
International Conference on Information Security Practice and Experience, 71-85, 2008
3252008
Forensic-by-design framework for cyber-physical cloud systems
NH Ab Rahman, WB Glisson, Y Yang, KKR Choo
IEEE Cloud Computing 3 (1), 50-59, 2016
2012016
Privacy and ownership preserving of outsourced medical data
E Bertino, BC Ooi, Y Yang, RH Deng
21st International Conference on Data Engineering (ICDE'05), 521-532, 2005
1942005
Efficient online/offline identity-based signature for wireless sensor network
JK Liu, J Baek, J Zhou, Y Yang, JW Wong
International Journal of Information Security 9, 287-296, 2010
1742010
Multi-user private keyword search for cloud computing
Y Yang, H Lu, J Weng
2011 IEEE third international conference on cloud computing technology and …, 2011
1452011
SKM: Scalable key management for advanced metering infrastructure in smart grids
Z Wan, G Wang, Y Yang, S Shi
IEEE Transactions on Industrial Electronics 61 (12), 7055-7066, 2014
1262014
Extended proxy-assisted approach: Achieving revocable fine-grained encryption of cloud data
Y Yang, JK Liu, K Liang, KKR Choo, J Zhou
Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015
1252015
Efficient conditional proxy re-encryption with chosen-ciphertext security
J Weng, Y Yang, Q Tang, RH Deng, F Bao
Information Security: 12th International Conference, ISC 2009, Pisa, Italy …, 2009
1232009
Cloud based data sharing with fine-grained proxy re-encryption
Y Yang, H Zhu, H Lu, J Weng, Y Zhang, KKR Choo
Pervasive and Mobile computing 28, 122-134, 2016
1182016
A practical password-based two-server authentication and key exchange system
Y Yang, RH Deng, F Bao
IEEE Transactions on Dependable and Secure Computing 3 (2), 105-114, 2006
1172006
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles
J Weng, M Chen, Y Yang, R Deng, K Chen, F Bao
Science China Information Sciences 53, 593-606, 2010
1082010
New efficient user identification and key distribution scheme providing enhanced security
Y Yang, S Wang, F Bao, J Wang, RH Deng
Computers & Security 23 (8), 697-704, 2004
1042004
Tailored reversible watermarking schemes for authentication of electronic clinical atlas
F Bao, RH Deng, BC Ooi, Y Yang
IEEE Transactions on information technology in biomedicine 9 (4), 554-563, 2005
962005
A smart-card-enabled privacy preserving e-prescription system
Y Yang, X Han, F Bao, RH Deng
IEEE Transactions on Information Technology in Biomedicine 8 (1), 47-58, 2004
802004
Towards lightweight anonymous entity authentication for IoT applications
Y Yang, H Cai, Z Wei, H Lu, KKR Choo
Information Security and Privacy: 21st Australasian Conference, ACISP 2016 …, 2016
612016
A generic scheme for secure data sharing in cloud
Y Yang, Y Zhang
2011 40th International Conference on Parallel Processing Workshops, 145-153, 2011
582011
Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity
BM Goi, RCW Phan, Y Yang, F Bao, RH Deng, MU Siddiqi
Applied Cryptography and Network Security: Second International Conference …, 2004
572004
V2X security: A case study of anonymous authentication
Y Yang, Z Wei, Y Zhang, H Lu, KKR Choo, H Cai
Pervasive and Mobile Computing 41, 259-269, 2017
552017
Multiuser private queries over encrypted databases
Y Yang, F Bao, X Ding, RH Deng
International Journal of Applied Cryptography 1 (4), 309-319, 2009
462009
系统目前无法执行此操作,请稍后再试。
文章 1–20