Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Yanjiang Yang
@inproceedings{DBLP:conf/asiacrypt/LiuXYY23, author = {Hongqing Liu and Chaoping Xing and Yanjiang Yang and Chen Yuan}, editor = {Jian Guo and Ron Steinfeld}, title = {Ramp Hyper-invertible Matrices and Their Applications to {MPC} Protocols}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14438}, pages = {204--236}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8721-4\_7}, doi = {10.1007/978-981-99-8721-4\_7}, timestamp = {Sun, 07 Jan 2024 14:24:23 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/LiuXYY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuXYY23, author = {Hongqing Liu and Chaoping Xing and Yanjiang Yang and Chen Yuan}, title = {Ramp hyper-invertible matrices and their applications to {MPC} protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1369}, year = {2023}, url = {https://eprint.iacr.org/2023/1369}, timestamp = {Sat, 07 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuXYY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LuCLSSY21, author = {Haibing Lu and Xi Chen and Qi Liu and Michele Samorani and Guojie Song and Yanjiang Yang}, title = {Stochastic Workflow Authorizations With Queueing Constraints}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {4}, pages = {1605--1619}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2020.3026296}, doi = {10.1109/TDSC.2020.3026296}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LuCLSSY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijiem/ChenFCYHL19, author = {Xi Chen and Cheng Fang and Jasmine Chang and Yanjiang Yang and Yuan Hong and Haibing Lu}, title = {Chinese address standardisation via hybrid approach combining statistical and rule-based methods}, journal = {Int. J. Internet Enterp. Manag.}, volume = {9}, number = {2}, pages = {179--193}, year = {2019}, url = {https://doi.org/10.1504/IJIEM.2019.103235}, doi = {10.1504/IJIEM.2019.103235}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijiem/ChenFCYHL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/EspositoCFCYC19, author = {Christian Esposito and Aniello Castiglione and Flavio Frattini and Marcello Cinque and Yanjiang Yang and Kim{-}Kwang Raymond Choo}, title = {On Data Sovereignty in Cloud-Based Computation Offloading for Smart Cities Applications}, journal = {{IEEE} Internet Things J.}, volume = {6}, number = {3}, pages = {4521--4535}, year = {2019}, url = {https://doi.org/10.1109/JIOT.2018.2886410}, doi = {10.1109/JIOT.2018.2886410}, timestamp = {Wed, 17 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/EspositoCFCYC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/CaoCMPYZ18, author = {Jiannong Cao and Aniello Castiglione and Giovanni Motta and Florin Pop and Yanjiang Yang and Wanlei Zhou}, title = {Human-Driven Edge Computing and Communication: Part 2}, journal = {{IEEE} Commun. Mag.}, volume = {56}, number = {2}, pages = {134--135}, year = {2018}, url = {https://doi.org/10.1109/MCOM.2018.8291128}, doi = {10.1109/MCOM.2018.8291128}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/CaoCMPYZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WeiWYYPXW18, author = {Zhuo Wei and Yongdong Wu and Yanjiang Yang and Zheng Yan and Qingqi Pei and Yajuan Xie and Jian Weng}, title = {AutoPrivacy: Automatic privacy protection and tagging suggestion for mobile social photo}, journal = {Comput. Secur.}, volume = {76}, pages = {341--353}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2017.12.002}, doi = {10.1016/J.COSE.2017.12.002}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/WeiWYYPXW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/LinWYWTS18, author = {Hsiao{-}Ying Lin and Zhuo Wei and Yanjiang Yang and Yadong Wei and Kang Tang and Qingdi Sha}, title = {AnchorCAN: Anchor-Based Secure {CAN} Communications System}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--7}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625173}, doi = {10.1109/DESEC.2018.8625173}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/desec/LinWYWTS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WeiYWWD17, author = {Zhuo Wei and Yanjiang Yang and Yongdong Wu and Jian Weng and Robert H. Deng}, title = {HIBS-KSharing: Hierarchical Identity-Based Signature Key Sharing for Automotive}, journal = {{IEEE} Access}, volume = {5}, pages = {16314--16323}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2017.2737957}, doi = {10.1109/ACCESS.2017.2737957}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/WeiYWWD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/CaoCMPYZ17, author = {Jiannong Cao and Aniello Castiglione and Giovanni Motta and Florin Pop and Yanjiang Yang and Wanlei Zhou}, title = {Human-Driven Edge Computing and Communication: Part 1}, journal = {{IEEE} Commun. Mag.}, volume = {55}, number = {11}, pages = {70--71}, year = {2017}, url = {https://doi.org/10.1109/MCOM.2017.8114551}, doi = {10.1109/MCOM.2017.8114551}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/CaoCMPYZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/XuMYZT17, author = {Rui Xu and Kirill Morozov and Yanjiang Yang and Jianying Zhou and Tsuyoshi Takagi}, title = {Efficient outsourcing of secure k-nearest neighbour query over encrypted database}, journal = {Comput. Secur.}, volume = {69}, pages = {65--83}, year = {2017}, url = {https://doi.org/10.1016/j.cose.2016.11.012}, doi = {10.1016/J.COSE.2016.11.012}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/XuMYZT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/WangPYD17, author = {Yujue Wang and HweeHwa Pang and Yanjiang Yang and Xuhua Ding}, title = {Secure server-aided top-k monitoring}, journal = {Inf. Sci.}, volume = {420}, pages = {345--363}, year = {2017}, url = {https://doi.org/10.1016/j.ins.2017.08.068}, doi = {10.1016/J.INS.2017.08.068}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/WangPYD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/percom/YangWZLCC17, author = {Yanjiang Yang and Zhuo Wei and Youcheng Zhang and Haibing Lu and Kim{-}Kwang Raymond Choo and Haibin Cai}, title = {{V2X} security: {A} case study of anonymous authentication}, journal = {Pervasive Mob. Comput.}, volume = {41}, pages = {259--269}, year = {2017}, url = {https://doi.org/10.1016/j.pmcj.2017.03.009}, doi = {10.1016/J.PMCJ.2017.03.009}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/percom/YangWZLCC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YangLWH17, author = {Yanjiang Yang and Joseph K. Liu and Zhuo Wei and Xinyi Huang}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Towards Revocable Fine-Grained Encryption of Cloud Data: Reducing Trust upon Cloud}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {127--144}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_7}, doi = {10.1007/978-3-319-60055-0\_7}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YangLWH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/WeiYYWWD17, author = {Zhuo Wei and Yanjiang Yang and Rehana Yasmin and Yongdong Wu and Jian Weng and Robert H. Deng}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {IoVShield: An Efficient Vehicular Intrusion Detection System for Self-driving (Short Paper)}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {638--647}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_39}, doi = {10.1007/978-3-319-72359-4\_39}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/WeiYYWWD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cloudcomp/RahmanGYC16, author = {Nurul Hidayah Ab Rahman and William Bradley Glisson and Yanjiang Yang and Kim{-}Kwang Raymond Choo}, title = {Forensic-by-Design Framework for Cyber-Physical Cloud Systems}, journal = {{IEEE} Cloud Comput.}, volume = {3}, number = {1}, pages = {50--59}, year = {2016}, url = {https://doi.org/10.1109/MCC.2016.5}, doi = {10.1109/MCC.2016.5}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cloudcomp/RahmanGYC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/percom/YangZLWZC16, author = {Yanjiang Yang and Haiyan Zhu and Haibing Lu and Jian Weng and Youcheng Zhang and Kim{-}Kwang Raymond Choo}, title = {Cloud based data sharing with fine-grained proxy re-encryption}, journal = {Pervasive Mob. Comput.}, volume = {28}, pages = {122--134}, year = {2016}, url = {https://doi.org/10.1016/j.pmcj.2015.06.017}, doi = {10.1016/J.PMCJ.2015.06.017}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/percom/YangZLWZC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/XuMYZT16, author = {Rui Xu and Kirill Morozov and Yanjiang Yang and Jianying Zhou and Tsuyoshi Takagi}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Privacy-Preserving k-Nearest Neighbour Query on Outsourced Database}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9722}, pages = {181--197}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40253-6\_11}, doi = {10.1007/978-3-319-40253-6\_11}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/XuMYZT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YangCWLC16, author = {Yanjiang Yang and Haibin Cai and Zhuo Wei and Haibing Lu and Kim{-}Kwang Raymond Choo}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Towards Lightweight Anonymous Entity Authentication for IoT Applications}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9722}, pages = {265--280}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40253-6\_16}, doi = {10.1007/978-3-319-40253-6\_16}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YangCWLC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YangLLWZZ16, author = {Yanjiang Yang and Haibing Lu and Joseph K. Liu and Jian Weng and Youcheng Zhang and Jianying Zhou}, editor = {Xiaofeng Chen and XiaoFeng Wang and Xinyi Huang}, title = {Credential Wrapping: From Anonymous Password Authentication to Anonymous Biometric Authentication}, booktitle = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016}, pages = {141--151}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2897845.2897854}, doi = {10.1145/2897845.2897854}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YangLLWZZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/WeiYL16, author = {Zhuo Wei and Yanjiang Yang and Tieyan Li}, editor = {Feng Bao and Liqun Chen and Robert H. Deng and Guojun Wang}, title = {Authenticated {CAN} Communications Using Standardized Cryptographic Techniques}, booktitle = {Information Security Practice and Experience - 12th International Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10060}, pages = {330--343}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49151-6\_23}, doi = {10.1007/978-3-319-49151-6\_23}, timestamp = {Wed, 25 Sep 2019 18:12:57 +0200}, biburl = {https://dblp.org/rec/conf/ispec/WeiYL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/LuHYDB15, author = {Haibing Lu and Yuan Hong and Yanjiang Yang and Lian Duan and Nazia Badar}, title = {Towards user-oriented {RBAC} model}, journal = {J. Comput. Secur.}, volume = {23}, number = {1}, pages = {107--129}, year = {2015}, url = {https://doi.org/10.3233/JCS-140519}, doi = {10.3233/JCS-140519}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/LuHYDB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/WengZDLYS15, author = {Jian Weng and Yunlei Zhao and Robert H. Deng and Shengli Liu and Yanjiang Yang and Kouichi Sakurai}, title = {A note on the security of {KHL} scheme}, journal = {Theor. Comput. Sci.}, volume = {602}, pages = {1--6}, year = {2015}, url = {https://doi.org/10.1016/j.tcs.2015.07.051}, doi = {10.1016/J.TCS.2015.07.051}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/WengZDLYS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/YangLLCZ15, author = {Yanjiang Yang and Joseph K. Liu and Kaitai Liang and Kim{-}Kwang Raymond Choo and Jianying Zhou}, editor = {G{\"{u}}nther Pernul and Peter Y. A. Ryan and Edgar R. Weippl}, title = {Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data}, booktitle = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9327}, pages = {146--166}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24177-7\_8}, doi = {10.1007/978-3-319-24177-7\_8}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/YangLLCZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lightsec/YangLCL15, author = {Yanjiang Yang and Jiqiang Lu and Kim{-}Kwang Raymond Choo and Joseph K. Liu}, editor = {Tim G{\"{u}}neysu and Gregor Leander and Amir Moradi}, title = {On Lightweight Security Enforcement in Cyber-Physical Systems}, booktitle = {Lightweight Cryptography for Security and Privacy - 4th International Workshop, LightSec 2015, Bochum, Germany, September 10-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9542}, pages = {97--112}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-29078-2\_6}, doi = {10.1007/978-3-319-29078-2\_6}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/lightsec/YangLCL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/intrust/2014, editor = {Moti Yung and Liehuang Zhu and Yanjiang Yang}, title = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9473}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27998-5}, doi = {10.1007/978-3-319-27998-5}, isbn = {978-3-319-27997-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tie/WanWYS14, author = {Zhiguo Wan and Guilin Wang and Yanjiang Yang and Shenxing Shi}, title = {{SKM:} Scalable Key Management for Advanced Metering Infrastructure in Smart Grids}, journal = {{IEEE} Trans. Ind. Electron.}, volume = {61}, number = {12}, pages = {7055--7066}, year = {2014}, url = {https://doi.org/10.1109/TIE.2014.2331014}, doi = {10.1109/TIE.2014.2331014}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tie/WanWYS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/LuHYFD14, author = {Haibing Lu and Yuan Hong and Yanjiang Yang and Yi Fang and Lian Duan}, editor = {Vijay Atluri and G{\"{u}}nther Pernul}, title = {Dynamic Workflow Adjustment with Security Constraints}, booktitle = {Data and Applications Security and Privacy {XXVIII} - 28th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8566}, pages = {211--226}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43936-4\_14}, doi = {10.1007/978-3-662-43936-4\_14}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/LuHYFD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/YangLWZS14, author = {Yanjiang Yang and Haibing Lu and Jian Weng and Youcheng Zhang and Kouichi Sakurai}, editor = {Sherman S. M. Chow and Joseph K. Liu and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, title = {Fine-Grained Conditional Proxy Re-Encryption and Application}, booktitle = {Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8782}, pages = {206--222}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12475-9\_15}, doi = {10.1007/978-3-319-12475-9\_15}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/provsec/YangLWZS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/LuHYDB13, author = {Haibing Lu and Yuan Hong and Yanjiang Yang and Lian Duan and Nazia Badar}, editor = {Lingyu Wang and Basit Shafiq}, title = {Towards User-Oriented {RBAC} Model}, booktitle = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP} {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7964}, pages = {81--96}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39256-6\_6}, doi = {10.1007/978-3-642-39256-6\_6}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/LuHYDB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/YangDLWZ13, author = {Yanjiang Yang and Xuhua Ding and Haibing Lu and Jian Weng and Jianying Zhou}, editor = {Yvo Desmedt}, title = {Self-blindable Credential: Towards Anonymous Entity Authentication Upon Resource Constrained Devices}, booktitle = {Information Security, 16th International Conference, {ISC} 2013, Dallas, Texas, USA, November 13-15, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7807}, pages = {238--247}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-27659-5\_17}, doi = {10.1007/978-3-319-27659-5\_17}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/YangDLWZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/YangDLWZ13a, author = {Yanjiang Yang and Xuhua Ding and Haibing Lu and Zhiguo Wan and Jianying Zhou}, editor = {Yvo Desmedt}, title = {Achieving Revocable Fine-Grained Cryptographic Access Control over Cloud Data}, booktitle = {Information Security, 16th International Conference, {ISC} 2013, Dallas, Texas, USA, November 13-15, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7807}, pages = {293--308}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-27659-5\_21}, doi = {10.1007/978-3-319-27659-5\_21}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/YangDLWZ13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pairing/LaiDYW13, author = {Junzuo Lai and Robert H. Deng and Yanjiang Yang and Jian Weng}, editor = {Zhenfu Cao and Fangguo Zhang}, title = {Adaptable Ciphertext-Policy Attribute-Based Encryption}, booktitle = {Pairing-Based Cryptography - Pairing 2013 - 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8365}, pages = {199--214}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04873-4\_12}, doi = {10.1007/978-3-319-04873-4\_12}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pairing/LaiDYW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YangDLW13, author = {Yanjiang Yang and Xuhua Ding and Haibing Lu and Jian Weng}, title = {Self-blindable Credential: Towards LightWeight Anonymous Entity Authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {207}, year = {2013}, url = {http://eprint.iacr.org/2013/207}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YangDLW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/YangLWDZ12, author = {Yanjiang Yang and Haibing Lu and Jian Weng and Xuhua Ding and Jianying Zhou}, editor = {Tat Wing Chim and Tsz Hon Yuen}, title = {A Generic Approach for Providing Revocation Support in Secret Handshake}, booktitle = {Information and Communications Security - 14th International Conference, {ICICS} 2012, Hong Kong, China, October 29-31, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7618}, pages = {276--284}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34129-8\_24}, doi = {10.1007/978-3-642-34129-8\_24}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/YangLWDZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/WangWYY11, author = {Xu An Wang and Jian Weng and Xiaoyuan Yang and Yanjiang Yang}, title = {Cryptanalysis of an identity based broadcast encryption scheme without random oracles}, journal = {Inf. Process. Lett.}, volume = {111}, number = {10}, pages = {461--464}, year = {2011}, url = {https://doi.org/10.1016/j.ipl.2011.02.007}, doi = {10.1016/J.IPL.2011.02.007}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ipl/WangWYY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YangZDB11, author = {Yanjiang Yang and Jianying Zhou and Robert H. Deng and Feng Bao}, title = {Better security enforcement in trusted computing enabled heterogeneous wireless sensor networks}, journal = {Secur. Commun. Networks}, volume = {4}, number = {1}, pages = {11--22}, year = {2011}, url = {https://doi.org/10.1002/sec.179}, doi = {10.1002/SEC.179}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YangZDB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DingYD11, author = {Xuhua Ding and Yanjiang Yang and Robert H. Deng}, title = {Database Access Pattern Protection Without Full-Shuffles}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {6}, number = {1}, pages = {189--201}, year = {2011}, url = {https://doi.org/10.1109/TIFS.2010.2101062}, doi = {10.1109/TIFS.2010.2101062}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/DingYD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcloud/Yang11, author = {Yanjiang Yang}, editor = {Ling Liu and Manish Parashar}, title = {Towards Multi-user Private Keyword Search for Cloud Computing}, booktitle = {{IEEE} International Conference on Cloud Computing, {CLOUD} 2011, Washington, DC, USA, 4-9 July, 2011}, pages = {758--759}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/CLOUD.2011.76}, doi = {10.1109/CLOUD.2011.76}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcloud/Yang11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudcom/YangLW11, author = {Yanjiang Yang and Haibing Lu and Jian Weng}, editor = {Costas Lambrinoudakis and Panagiotis Rizomiliotis and Tomasz Wiktor Wlodarczyk}, title = {Multi-User Private Keyword Search for Cloud Computing}, booktitle = {{IEEE} 3rd International Conference on Cloud Computing Technology and Science, CloudCom 2011, Athens, Greece, November 29 - December 1, 2011}, pages = {264--271}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/CloudCom.2011.43}, doi = {10.1109/CLOUDCOM.2011.43}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cloudcom/YangLW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icppw/YangZ11, author = {Yanjiang Yang and Youcheng Zhang}, editor = {Jang{-}Ping Sheu and Cho{-}Li Wang}, title = {A Generic Scheme for Secure Data Sharing in Cloud}, booktitle = {2011 International Conference on Parallel Processing Workshops, {ICPPW} 2011, Taipei, Taiwan, Sept. 13-16, 2011}, pages = {145--153}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ICPPW.2011.51}, doi = {10.1109/ICPPW.2011.51}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icppw/YangZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/WengCYDCB10, author = {Jian Weng and Min{-}Rong Chen and Yanjiang Yang and Robert H. Deng and Kefei Chen and Feng Bao}, title = {CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles}, journal = {Sci. China Inf. Sci.}, volume = {53}, number = {3}, pages = {593--606}, year = {2010}, url = {https://doi.org/10.1007/s11432-010-0047-3}, doi = {10.1007/S11432-010-0047-3}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/WengCYDCB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/DingYDW10, author = {Xuhua Ding and Yanjiang Yang and Robert H. Deng and Shuhong Wang}, title = {A new hardware-assisted {PIR} with O(\emph{n}) shuffle cost}, journal = {Int. J. Inf. Sec.}, volume = {9}, number = {4}, pages = {237--252}, year = {2010}, url = {https://doi.org/10.1007/s10207-010-0105-2}, doi = {10.1007/S10207-010-0105-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/DingYDW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/LiuBZYW10, author = {Joseph K. Liu and Joonsang Baek and Jianying Zhou and Yanjiang Yang and Jun Wen Wong}, title = {Efficient online/offline identity-based signature for wireless sensor network}, journal = {Int. J. Inf. Sec.}, volume = {9}, number = {4}, pages = {287--296}, year = {2010}, url = {https://doi.org/10.1007/s10207-010-0109-y}, doi = {10.1007/S10207-010-0109-Y}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/LiuBZYW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YangLDB10, author = {Yanjiang Yang and Yingjiu Li and Robert H. Deng and Feng Bao}, title = {Shifting Inference Control to User Side: Architecture and Protocol}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {7}, number = {2}, pages = {189--202}, year = {2010}, url = {https://doi.org/10.1109/TDSC.2008.70}, doi = {10.1109/TDSC.2008.70}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/YangLDB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcit/YangB10, author = {Yanjiang Yang and Feng Bao}, title = {Enabling Use of Single Password over Multiple Servers in Two-Server Model}, booktitle = {10th {IEEE} International Conference on Computer and Information Technology, {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010}, pages = {846--850}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CIT.2010.159}, doi = {10.1109/CIT.2010.159}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcit/YangB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/YangZWB10, author = {Yanjiang Yang and Jianying Zhou and Jun Wen Wong and Feng Bao}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Towards practical anonymous password authentication}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {59--68}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920271}, doi = {10.1145/1920261.1920271}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/YangZWB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/ChowWYD10, author = {Sherman S. M. Chow and Jian Weng and Yanjiang Yang and Robert H. Deng}, editor = {Daniel J. Bernstein and Tanja Lange}, title = {Efficient Unidirectional Proxy Re-Encryption}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6055}, pages = {316--332}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12678-9\_19}, doi = {10.1007/978-3-642-12678-9\_19}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/africacrypt/ChowWYD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/GuGYBM10, author = {Liang Gu and Yao Guo and Yanjiang Yang and Feng Bao and Hong Mei}, editor = {Liqun Chen and Moti Yung}, title = {Modeling TCG-Based Secure Systems with Colored Petri Nets}, booktitle = {Trusted Systems - Second International Conference, {INTRUST} 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6802}, pages = {67--86}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-25283-9\_5}, doi = {10.1007/978-3-642-25283-9\_5}, timestamp = {Tue, 09 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/GuGYBM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/YangGB10, author = {Yanjiang Yang and Liang Gu and Feng Bao}, editor = {Liqun Chen and Moti Yung}, title = {Addressing Leakage of Re-encryption Key in Proxy Re-encryption Using Trusted Computing}, booktitle = {Trusted Systems - Second International Conference, {INTRUST} 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6802}, pages = {189--199}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-25283-9\_13}, doi = {10.1007/978-3-642-25283-9\_13}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/intrust/YangGB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/psd/LiangCLY10, author = {Bing Liang and Kevin Chiew and Yingjiu Li and Yanjiang Yang}, editor = {Josep Domingo{-}Ferrer and Emmanouil Magkos}, title = {Privacy Disclosure Analysis and Control for 2D Contingency Tables Containing Inaccurate Data}, booktitle = {Privacy in Statistical Databases - {UNESCO} Chair in Data Privacy, International Conference, {PSD} 2010, Corfu, Greece, September 22-24, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6344}, pages = {1--16}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15838-4\_1}, doi = {10.1007/978-3-642-15838-4\_1}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/psd/LiangCLY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuBZYW10, author = {Joseph K. Liu and Joonsang Baek and Jianying Zhou and Yanjiang Yang and Jun Wen Wong}, title = {Efficient Online/Offline Identity-Based Signature for Wireless Sensor Network}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {3}, year = {2010}, url = {http://eprint.iacr.org/2010/003}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuBZYW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WengCYDCB10, author = {Jian Weng and Min{-}Rong Chen and Yanjiang Yang and Robert H. Deng and Kefei Chen and Feng Bao}, title = {CCA-Secure Unidirectional Proxy Re-Encryption in the Adaptive Corruption Model without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {265}, year = {2010}, url = {http://eprint.iacr.org/2010/265}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WengCYDCB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/YangBDD09, author = {Yanjiang Yang and Feng Bao and Xuhua Ding and Robert H. Deng}, title = {Multiuser private queries over encrypted databases}, journal = {Int. J. Appl. Cryptogr.}, volume = {1}, number = {4}, pages = {309--319}, year = {2009}, url = {https://doi.org/10.1504/IJACT.2009.028029}, doi = {10.1504/IJACT.2009.028029}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/YangBDD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YangDB09, author = {Yanjiang Yang and Robert H. Deng and Feng Bao}, title = {Privacy-preserving rental services using one-show anonymous credentials}, journal = {Secur. Commun. Networks}, volume = {2}, number = {6}, pages = {531--545}, year = {2009}, url = {https://doi.org/10.1002/sec.97}, doi = {10.1002/SEC.97}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YangDB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tomccap/DengY09, author = {Robert H. Deng and Yanjiang Yang}, title = {A study of content authentication in proxy-enabled multimedia delivery systems: Model, techniques, and applications}, journal = {{ACM} Trans. Multim. Comput. Commun. Appl.}, volume = {5}, number = {4}, pages = {28:1--28:20}, year = {2009}, url = {https://doi.org/10.1145/1596990.1596992}, doi = {10.1145/1596990.1596992}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tomccap/DengY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/YangZWB09, author = {Yanjiang Yang and Jianying Zhou and Jian Weng and Feng Bao}, title = {A New Approach for Anonymous Password Authentication}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {199--208}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.26}, doi = {10.1109/ACSAC.2009.26}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/YangZWB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/YangWZQ09, author = {Yanjiang Yang and Jian Weng and Jianying Zhou and Ying Qiu}, editor = {Feng Bao and Moti Yung and Dongdai Lin and Jiwu Jing}, title = {Optionally Identifiable Private Handshakes}, booktitle = {Information Security and Cryptology - 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6151}, pages = {164--178}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-16342-5\_13}, doi = {10.1007/978-3-642-16342-5\_13}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/YangWZQ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/QiuBWY09, author = {Ying Qiu and Feng Bao and Yongdong Wu and Yanjiang Yang}, title = {A Lightweight Fast Handover Authentication Scheme in Mobile Networks}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2009, Dresden, Germany, 14-18 June 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICC.2009.5198620}, doi = {10.1109/ICC.2009.5198620}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/QiuBWY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/YangZDB09, author = {Yanjiang Yang and Jianying Zhou and Robert H. Deng and Feng Bao}, editor = {Sihan Qing and Chris J. Mitchell and Guilin Wang}, title = {Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks}, booktitle = {Information and Communications Security, 11th International Conference, {ICICS} 2009, Beijing, China, December 14-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5927}, pages = {135--149}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-11145-7\_12}, doi = {10.1007/978-3-642-11145-7\_12}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/YangZDB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/YangDZQ09, author = {Yanjiang Yang and Robert H. Deng and Jianying Zhou and Ying Qiu}, editor = {Feng Bao and Hui Li and Guilin Wang}, title = {Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing}, booktitle = {Information Security Practice and Experience, 5th International Conference, {ISPEC} 2009, Xi'an, China, April 13-15, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5451}, pages = {384--395}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00843-6\_33}, doi = {10.1007/978-3-642-00843-6\_33}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/YangDZQ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/WengYTDB09, author = {Jian Weng and Yanjiang Yang and Qiang Tang and Robert H. Deng and Feng Bao}, editor = {Pierangela Samarati and Moti Yung and Fabio Martinelli and Claudio A. Ardagna}, title = {Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security}, booktitle = {Information Security, 12th International Conference, {ISC} 2009, Pisa, Italy, September 7-9, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5735}, pages = {151--166}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04474-8\_13}, doi = {10.1007/978-3-642-04474-8\_13}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/WengYTDB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/YangBW09, author = {Yanjiang Yang and Feng Bao and Jian Weng}, title = {Private handshakes with optional accountability}, booktitle = {The 34th Annual {IEEE} Conference on Local Computer Networks, {LCN} 2009, 20-23 October 2009, Zurich, Switzerland, Proceedings}, pages = {245--248}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/LCN.2009.5355079}, doi = {10.1109/LCN.2009.5355079}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lcn/YangBW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/YangLWZB09, author = {Yanjiang Yang and Yingjiu Li and Jian Weng and Jianying Zhou and Feng Bao}, editor = {Josef Pieprzyk and Fangguo Zhang}, title = {Self-enforcing Private Inference Control}, booktitle = {Provable Security, Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5848}, pages = {260--274}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04642-1\_21}, doi = {10.1007/978-3-642-04642-1\_21}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/provsec/YangLWZB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/YangZDB09, author = {Yanjiang Yang and Jianying Zhou and Robert H. Deng and Feng Bao}, editor = {Yan Chen and Tassos Dimitriou and Jianying Zhou}, title = {Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks}, booktitle = {Security and Privacy in Communication Networks - 5th International {ICST} Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {19}, pages = {285--295}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-05284-2\_16}, doi = {10.1007/978-3-642-05284-2\_16}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/YangZDB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChowWYD09, author = {Sherman S. M. Chow and Jian Weng and Yanjiang Yang and Robert H. Deng}, title = {Efficient Unidirectional Proxy Re-Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {189}, year = {2009}, url = {http://eprint.iacr.org/2009/189}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChowWYD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euc/YangBD08, author = {Yanjiang Yang and Feng Bao and Robert H. Deng}, editor = {Cheng{-}Zhong Xu and Minyi Guo}, title = {Efficient Client-to-Client Password Authenticated Key Exchange}, booktitle = {2008 {IEEE/IPIP} International Conference on Embedded and Ubiquitous Computing {(EUC} 2008), Shanghai, China, December 17-20, 2008, Volume {II:} Workshops}, pages = {202--207}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/EUC.2008.32}, doi = {10.1109/EUC.2008.32}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/euc/YangBD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/BaoDDY08, author = {Feng Bao and Robert H. Deng and Xuhua Ding and Yanjiang Yang}, editor = {Liqun Chen and Yi Mu and Willy Susilo}, title = {Private Query on Encrypted Data in Multi-user Settings}, booktitle = {Information Security Practice and Experience, 4th International Conference, {ISPEC} 2008, Sydney, Australia, April 21-23, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4991}, pages = {71--85}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79104-1\_6}, doi = {10.1007/978-3-540-79104-1\_6}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/BaoDDY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/YangDDB08, author = {Yanjiang Yang and Xuhua Ding and Robert H. Deng and Feng Bao}, editor = {Tzong{-}Chen Wu and Chin{-}Laung Lei and Vincent Rijmen and Der{-}Tsai Lee}, title = {An Efficient {PIR} Construction Using Trusted Hardware}, booktitle = {Information Security, 11th International Conference, {ISC} 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5222}, pages = {64--79}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85886-7\_5}, doi = {10.1007/978-3-540-85886-7\_5}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/YangDDB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/YangLD07, author = {Yanjiang Yang and Yingjiu Li and Robert H. Deng}, editor = {Steve Barker and Gail{-}Joon Ahn}, title = {New Paradigm of Inference Control with Trusted Computing}, booktitle = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4602}, pages = {243--258}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73538-0\_18}, doi = {10.1007/978-3-540-73538-0\_18}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/YangLD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/YangDB07, author = {Yanjiang Yang and Robert H. Deng and Feng Bao}, editor = {Ed Dawson and Duncan S. Wong}, title = {Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers}, booktitle = {Information Security Practice and Experience, Third International Conference, {ISPEC} 2007, Hong Kong, China, May 7-9, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4464}, pages = {177--192}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72163-5\_15}, doi = {10.1007/978-3-540-72163-5\_15}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/YangDB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/DengY07, author = {Robert H. Deng and Yanjiang Yang}, editor = {Ed Dawson and Duncan S. Wong}, title = {Achieving End-to-End Authentication in Intermediary-Enabled Multimedia Delivery Systems}, booktitle = {Information Security Practice and Experience, Third International Conference, {ISPEC} 2007, Hong Kong, China, May 7-9, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4464}, pages = {284--300}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72163-5\_22}, doi = {10.1007/978-3-540-72163-5\_22}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/DengY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YangDB06, author = {Yanjiang Yang and Robert H. Deng and Feng Bao}, title = {A Practical Password-Based Two-Server Authentication and Key Exchange System}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {2}, pages = {105--114}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.16}, doi = {10.1109/TDSC.2006.16}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/YangDB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YangDB06, author = {Yanjiang Yang and Robert H. Deng and Feng Bao}, editor = {Ferng{-}Ching Lin and Der{-}Tsai Lee and Bao{-}Shuh Paul Lin and Shiuhpyng Shieh and Sushil Jajodia}, title = {Fortifying password authentication in integrated healthcare delivery systems}, booktitle = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24, 2006}, pages = {255--265}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1128817.1128855}, doi = {10.1145/1128817.1128855}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YangDB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cikm/YangDB06, author = {Yanjiang Yang and Robert H. Deng and Feng Bao}, editor = {Philip S. Yu and Vassilis J. Tsotras and Edward A. Fox and Bing Liu}, title = {Practical private data matching deterrent to spoofing attacks}, booktitle = {Proceedings of the 2006 {ACM} {CIKM} International Conference on Information and Knowledge Management, Arlington, Virginia, USA, November 6-11, 2006}, pages = {852--853}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1183614.1183763}, doi = {10.1145/1183614.1183763}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cikm/YangDB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/titb/BaoDOY05, author = {Feng Bao and Robert H. Deng and Beng Chin Ooi and Yanjiang Yang}, title = {Tailored reversible watermarking schemes for authentication of electronic clinical atlas}, journal = {{IEEE} Trans. Inf. Technol. Biomed.}, volume = {9}, number = {4}, pages = {554--563}, year = {2005}, url = {https://doi.org/10.1109/TITB.2005.855556}, doi = {10.1109/TITB.2005.855556}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/titb/BaoDOY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YangBD05, author = {Yanjiang Yang and Feng Bao and Robert H. Deng}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Security Analysis and Fix of an Anonymous Credential System}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {537--547}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_45}, doi = {10.1007/11506157\_45}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/YangBD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/BertinoOYD05, author = {Elisa Bertino and Beng Chin Ooi and Yanjiang Yang and Robert H. Deng}, editor = {Karl Aberer and Michael J. Franklin and Shojiro Nishio}, title = {Privacy and Ownership Preserving of Outsourced Medical Data}, booktitle = {Proceedings of the 21st International Conference on Data Engineering, {ICDE} 2005, 5-8 April 2005, Tokyo, Japan}, pages = {521--532}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ICDE.2005.111}, doi = {10.1109/ICDE.2005.111}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icde/BertinoOYD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/YangO05, author = {Yanjiang Yang and Beng Chin Ooi}, editor = {Jianying Zhou and Javier L{\'{o}}pez and Robert H. Deng and Feng Bao}, title = {A Privacy Preserving Rental System}, booktitle = {Information Security, 8th International Conference, {ISC} 2005, Singapore, September 20-23, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3650}, pages = {59--73}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11556992\_5}, doi = {10.1007/11556992\_5}, timestamp = {Thu, 29 Aug 2019 08:10:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/YangO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/YangBD05, author = {Yanjiang Yang and Feng Bao and Robert H. Deng}, editor = {Ry{\^{o}}ichi Sasaki and Sihan Qing and Eiji Okamoto and Hiroshi Yoshiura}, title = {A New Architecture for User Authentication and Key Exchange Using Password for Federated Enterprises}, booktitle = {Security and Privacy in the Age of Ubiquitous Computing, {IFIP} {TC11} 20th International Conference on Information Security {(SEC} 2005), May 30 - June 1, 2005, Chiba, Japan}, series = {{IFIP}}, volume = {181}, pages = {95--112}, publisher = {Springer}, year = {2005}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sec/YangBD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YangWBWD04, author = {Yanjiang Yang and Shuhong Wang and Feng Bao and Jie Wang and Robert H. Deng}, title = {New efficient user identification and key distribution scheme providing enhanced security}, journal = {Comput. Secur.}, volume = {23}, number = {8}, pages = {697--704}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.08.005}, doi = {10.1016/J.COSE.2004.08.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/YangWBWD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/titb/YangHBD04, author = {Yanjiang Yang and Xiaoxi Han and Feng Bao and Robert H. Deng}, title = {A smart-card-enabled privacy preserving E-prescription system}, journal = {{IEEE} Trans. Inf. Technol. Biomed.}, volume = {8}, number = {1}, pages = {47--58}, year = {2004}, url = {https://doi.org/10.1109/TITB.2004.824731}, doi = {10.1109/TITB.2004.824731}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/titb/YangHBD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/GoiPYBDS04, author = {Bok{-}Min Goi and Raphael Chung{-}Wei Phan and Yanjiang Yang and Feng Bao and Robert H. Deng and M. U. Siddiqi}, editor = {Markus Jakobsson and Moti Yung and Jianying Zhou}, title = {Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity}, booktitle = {Applied Cryptography and Network Security, Second International Conference, {ACNS} 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3089}, pages = {369--382}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24852-1\_27}, doi = {10.1007/978-3-540-24852-1\_27}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/GoiPYBDS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/YangB03, author = {Yanjiang Yang and Feng Bao}, title = {An invertible watermarking scheme for authentication of Electronic Clinical Brain Atlas}, booktitle = {2003 {IEEE} International Conference on Acoustics, Speech, and Signal Processing, {ICASSP} '03, Hong Kong, April 6-10, 2003}, pages = {533--536}, publisher = {{IEEE}}, year = {2003}, url = {https://doi.org/10.1109/ICASSP.2003.1199529}, doi = {10.1109/ICASSP.2003.1199529}, timestamp = {Mon, 22 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icassp/YangB03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/YangWBD03, author = {Yanjiang Yang and Zhenlan Wang and Feng Bao and Robert H. Deng}, title = {Secure the image-based simulated telesurgery system}, booktitle = {Proceedings of the 2003 International Symposium on Circuits and Systems, {ISCAS} 2003, Bangkok, Thailand, May 25-28, 2003}, pages = {596--599}, publisher = {{IEEE}}, year = {2003}, url = {https://doi.org/10.1109/ISCAS.2003.1206044}, doi = {10.1109/ISCAS.2003.1206044}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/iscas/YangWBD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vcip/YangBD03, author = {Yanjiang Yang and Feng Bao and Robert H. Deng}, editor = {Touradj Ebrahimi and Thomas Sikora}, title = {Flexible authentication of images}, booktitle = {Visual Communications and Image Processing 2003, Lugano, Switzerland, July 8, 2003}, series = {Proceedings of {SPIE}}, volume = {5150}, pages = {1905--1911}, publisher = {{SPIE}}, year = {2003}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vcip/YangBD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YangBD02, author = {Yanjiang Yang and Feng Bao and Robert H. Deng}, editor = {Lynn Margaret Batten and Jennifer Seberry}, title = {Security Analysis and Improvement of the Global Key Recovery System}, booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP} 2002, Melbourne, Australia, July 3-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2384}, pages = {17--24}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45450-0\_2}, doi = {10.1007/3-540-45450-0\_2}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YangBD02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.