BibTeX records: Yanjiang Yang

download as .bib file

@inproceedings{DBLP:conf/asiacrypt/LiuXYY23,
  author       = {Hongqing Liu and
                  Chaoping Xing and
                  Yanjiang Yang and
                  Chen Yuan},
  editor       = {Jian Guo and
                  Ron Steinfeld},
  title        = {Ramp Hyper-invertible Matrices and Their Applications to {MPC} Protocols},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Guangzhou, China, December 4-8, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14438},
  pages        = {204--236},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8721-4\_7},
  doi          = {10.1007/978-981-99-8721-4\_7},
  timestamp    = {Sun, 07 Jan 2024 14:24:23 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/LiuXYY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuXYY23,
  author       = {Hongqing Liu and
                  Chaoping Xing and
                  Yanjiang Yang and
                  Chen Yuan},
  title        = {Ramp hyper-invertible matrices and their applications to {MPC} protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1369},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1369},
  timestamp    = {Sat, 07 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuXYY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LuCLSSY21,
  author       = {Haibing Lu and
                  Xi Chen and
                  Qi Liu and
                  Michele Samorani and
                  Guojie Song and
                  Yanjiang Yang},
  title        = {Stochastic Workflow Authorizations With Queueing Constraints},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {4},
  pages        = {1605--1619},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2020.3026296},
  doi          = {10.1109/TDSC.2020.3026296},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LuCLSSY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijiem/ChenFCYHL19,
  author       = {Xi Chen and
                  Cheng Fang and
                  Jasmine Chang and
                  Yanjiang Yang and
                  Yuan Hong and
                  Haibing Lu},
  title        = {Chinese address standardisation via hybrid approach combining statistical
                  and rule-based methods},
  journal      = {Int. J. Internet Enterp. Manag.},
  volume       = {9},
  number       = {2},
  pages        = {179--193},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJIEM.2019.103235},
  doi          = {10.1504/IJIEM.2019.103235},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijiem/ChenFCYHL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/EspositoCFCYC19,
  author       = {Christian Esposito and
                  Aniello Castiglione and
                  Flavio Frattini and
                  Marcello Cinque and
                  Yanjiang Yang and
                  Kim{-}Kwang Raymond Choo},
  title        = {On Data Sovereignty in Cloud-Based Computation Offloading for Smart
                  Cities Applications},
  journal      = {{IEEE} Internet Things J.},
  volume       = {6},
  number       = {3},
  pages        = {4521--4535},
  year         = {2019},
  url          = {https://doi.org/10.1109/JIOT.2018.2886410},
  doi          = {10.1109/JIOT.2018.2886410},
  timestamp    = {Wed, 17 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/EspositoCFCYC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/CaoCMPYZ18,
  author       = {Jiannong Cao and
                  Aniello Castiglione and
                  Giovanni Motta and
                  Florin Pop and
                  Yanjiang Yang and
                  Wanlei Zhou},
  title        = {Human-Driven Edge Computing and Communication: Part 2},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {56},
  number       = {2},
  pages        = {134--135},
  year         = {2018},
  url          = {https://doi.org/10.1109/MCOM.2018.8291128},
  doi          = {10.1109/MCOM.2018.8291128},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/CaoCMPYZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WeiWYYPXW18,
  author       = {Zhuo Wei and
                  Yongdong Wu and
                  Yanjiang Yang and
                  Zheng Yan and
                  Qingqi Pei and
                  Yajuan Xie and
                  Jian Weng},
  title        = {AutoPrivacy: Automatic privacy protection and tagging suggestion for
                  mobile social photo},
  journal      = {Comput. Secur.},
  volume       = {76},
  pages        = {341--353},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2017.12.002},
  doi          = {10.1016/J.COSE.2017.12.002},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/WeiWYYPXW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/desec/LinWYWTS18,
  author       = {Hsiao{-}Ying Lin and
                  Zhuo Wei and
                  Yanjiang Yang and
                  Yadong Wei and
                  Kang Tang and
                  Qingdi Sha},
  title        = {AnchorCAN: Anchor-Based Secure {CAN} Communications System},
  booktitle    = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018,
                  Kaohsiung, Taiwan, December 10-13, 2018},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/DESEC.2018.8625173},
  doi          = {10.1109/DESEC.2018.8625173},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/desec/LinWYWTS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WeiYWWD17,
  author       = {Zhuo Wei and
                  Yanjiang Yang and
                  Yongdong Wu and
                  Jian Weng and
                  Robert H. Deng},
  title        = {HIBS-KSharing: Hierarchical Identity-Based Signature Key Sharing for
                  Automotive},
  journal      = {{IEEE} Access},
  volume       = {5},
  pages        = {16314--16323},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACCESS.2017.2737957},
  doi          = {10.1109/ACCESS.2017.2737957},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/WeiYWWD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/CaoCMPYZ17,
  author       = {Jiannong Cao and
                  Aniello Castiglione and
                  Giovanni Motta and
                  Florin Pop and
                  Yanjiang Yang and
                  Wanlei Zhou},
  title        = {Human-Driven Edge Computing and Communication: Part 1},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {55},
  number       = {11},
  pages        = {70--71},
  year         = {2017},
  url          = {https://doi.org/10.1109/MCOM.2017.8114551},
  doi          = {10.1109/MCOM.2017.8114551},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/CaoCMPYZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/XuMYZT17,
  author       = {Rui Xu and
                  Kirill Morozov and
                  Yanjiang Yang and
                  Jianying Zhou and
                  Tsuyoshi Takagi},
  title        = {Efficient outsourcing of secure k-nearest neighbour query over encrypted
                  database},
  journal      = {Comput. Secur.},
  volume       = {69},
  pages        = {65--83},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.cose.2016.11.012},
  doi          = {10.1016/J.COSE.2016.11.012},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/XuMYZT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/WangPYD17,
  author       = {Yujue Wang and
                  HweeHwa Pang and
                  Yanjiang Yang and
                  Xuhua Ding},
  title        = {Secure server-aided top-k monitoring},
  journal      = {Inf. Sci.},
  volume       = {420},
  pages        = {345--363},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ins.2017.08.068},
  doi          = {10.1016/J.INS.2017.08.068},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/WangPYD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/percom/YangWZLCC17,
  author       = {Yanjiang Yang and
                  Zhuo Wei and
                  Youcheng Zhang and
                  Haibing Lu and
                  Kim{-}Kwang Raymond Choo and
                  Haibin Cai},
  title        = {{V2X} security: {A} case study of anonymous authentication},
  journal      = {Pervasive Mob. Comput.},
  volume       = {41},
  pages        = {259--269},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.pmcj.2017.03.009},
  doi          = {10.1016/J.PMCJ.2017.03.009},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/percom/YangWZLCC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YangLWH17,
  author       = {Yanjiang Yang and
                  Joseph K. Liu and
                  Zhuo Wei and
                  Xinyi Huang},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Towards Revocable Fine-Grained Encryption of Cloud Data: Reducing
                  Trust upon Cloud},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {127--144},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_7},
  doi          = {10.1007/978-3-319-60055-0\_7},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YangLWH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/WeiYYWWD17,
  author       = {Zhuo Wei and
                  Yanjiang Yang and
                  Rehana Yasmin and
                  Yongdong Wu and
                  Jian Weng and
                  Robert H. Deng},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {IoVShield: An Efficient Vehicular Intrusion Detection System for Self-driving
                  (Short Paper)},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {638--647},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_39},
  doi          = {10.1007/978-3-319-72359-4\_39},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/WeiYYWWD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cloudcomp/RahmanGYC16,
  author       = {Nurul Hidayah Ab Rahman and
                  William Bradley Glisson and
                  Yanjiang Yang and
                  Kim{-}Kwang Raymond Choo},
  title        = {Forensic-by-Design Framework for Cyber-Physical Cloud Systems},
  journal      = {{IEEE} Cloud Comput.},
  volume       = {3},
  number       = {1},
  pages        = {50--59},
  year         = {2016},
  url          = {https://doi.org/10.1109/MCC.2016.5},
  doi          = {10.1109/MCC.2016.5},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cloudcomp/RahmanGYC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/percom/YangZLWZC16,
  author       = {Yanjiang Yang and
                  Haiyan Zhu and
                  Haibing Lu and
                  Jian Weng and
                  Youcheng Zhang and
                  Kim{-}Kwang Raymond Choo},
  title        = {Cloud based data sharing with fine-grained proxy re-encryption},
  journal      = {Pervasive Mob. Comput.},
  volume       = {28},
  pages        = {122--134},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.pmcj.2015.06.017},
  doi          = {10.1016/J.PMCJ.2015.06.017},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/percom/YangZLWZC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/XuMYZT16,
  author       = {Rui Xu and
                  Kirill Morozov and
                  Yanjiang Yang and
                  Jianying Zhou and
                  Tsuyoshi Takagi},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Privacy-Preserving k-Nearest Neighbour Query on Outsourced Database},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9722},
  pages        = {181--197},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40253-6\_11},
  doi          = {10.1007/978-3-319-40253-6\_11},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/XuMYZT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YangCWLC16,
  author       = {Yanjiang Yang and
                  Haibin Cai and
                  Zhuo Wei and
                  Haibing Lu and
                  Kim{-}Kwang Raymond Choo},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Towards Lightweight Anonymous Entity Authentication for IoT Applications},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9722},
  pages        = {265--280},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40253-6\_16},
  doi          = {10.1007/978-3-319-40253-6\_16},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YangCWLC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YangLLWZZ16,
  author       = {Yanjiang Yang and
                  Haibing Lu and
                  Joseph K. Liu and
                  Jian Weng and
                  Youcheng Zhang and
                  Jianying Zhou},
  editor       = {Xiaofeng Chen and
                  XiaoFeng Wang and
                  Xinyi Huang},
  title        = {Credential Wrapping: From Anonymous Password Authentication to Anonymous
                  Biometric Authentication},
  booktitle    = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016},
  pages        = {141--151},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2897845.2897854},
  doi          = {10.1145/2897845.2897854},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/YangLLWZZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/WeiYL16,
  author       = {Zhuo Wei and
                  Yanjiang Yang and
                  Tieyan Li},
  editor       = {Feng Bao and
                  Liqun Chen and
                  Robert H. Deng and
                  Guojun Wang},
  title        = {Authenticated {CAN} Communications Using Standardized Cryptographic
                  Techniques},
  booktitle    = {Information Security Practice and Experience - 12th International
                  Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10060},
  pages        = {330--343},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49151-6\_23},
  doi          = {10.1007/978-3-319-49151-6\_23},
  timestamp    = {Wed, 25 Sep 2019 18:12:57 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/WeiYL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/LuHYDB15,
  author       = {Haibing Lu and
                  Yuan Hong and
                  Yanjiang Yang and
                  Lian Duan and
                  Nazia Badar},
  title        = {Towards user-oriented {RBAC} model},
  journal      = {J. Comput. Secur.},
  volume       = {23},
  number       = {1},
  pages        = {107--129},
  year         = {2015},
  url          = {https://doi.org/10.3233/JCS-140519},
  doi          = {10.3233/JCS-140519},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/LuHYDB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/WengZDLYS15,
  author       = {Jian Weng and
                  Yunlei Zhao and
                  Robert H. Deng and
                  Shengli Liu and
                  Yanjiang Yang and
                  Kouichi Sakurai},
  title        = {A note on the security of {KHL} scheme},
  journal      = {Theor. Comput. Sci.},
  volume       = {602},
  pages        = {1--6},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.tcs.2015.07.051},
  doi          = {10.1016/J.TCS.2015.07.051},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/WengZDLYS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/YangLLCZ15,
  author       = {Yanjiang Yang and
                  Joseph K. Liu and
                  Kaitai Liang and
                  Kim{-}Kwang Raymond Choo and
                  Jianying Zhou},
  editor       = {G{\"{u}}nther Pernul and
                  Peter Y. A. Ryan and
                  Edgar R. Weippl},
  title        = {Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained
                  Encryption of Cloud Data},
  booktitle    = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research
                  in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9327},
  pages        = {146--166},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24177-7\_8},
  doi          = {10.1007/978-3-319-24177-7\_8},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/YangLLCZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lightsec/YangLCL15,
  author       = {Yanjiang Yang and
                  Jiqiang Lu and
                  Kim{-}Kwang Raymond Choo and
                  Joseph K. Liu},
  editor       = {Tim G{\"{u}}neysu and
                  Gregor Leander and
                  Amir Moradi},
  title        = {On Lightweight Security Enforcement in Cyber-Physical Systems},
  booktitle    = {Lightweight Cryptography for Security and Privacy - 4th International
                  Workshop, LightSec 2015, Bochum, Germany, September 10-11, 2015, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9542},
  pages        = {97--112},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-29078-2\_6},
  doi          = {10.1007/978-3-319-29078-2\_6},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/lightsec/YangLCL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/intrust/2014,
  editor       = {Moti Yung and
                  Liehuang Zhu and
                  Yanjiang Yang},
  title        = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing,
                  China, December 16-17, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9473},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27998-5},
  doi          = {10.1007/978-3-319-27998-5},
  isbn         = {978-3-319-27997-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tie/WanWYS14,
  author       = {Zhiguo Wan and
                  Guilin Wang and
                  Yanjiang Yang and
                  Shenxing Shi},
  title        = {{SKM:} Scalable Key Management for Advanced Metering Infrastructure
                  in Smart Grids},
  journal      = {{IEEE} Trans. Ind. Electron.},
  volume       = {61},
  number       = {12},
  pages        = {7055--7066},
  year         = {2014},
  url          = {https://doi.org/10.1109/TIE.2014.2331014},
  doi          = {10.1109/TIE.2014.2331014},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tie/WanWYS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/LuHYFD14,
  author       = {Haibing Lu and
                  Yuan Hong and
                  Yanjiang Yang and
                  Yi Fang and
                  Lian Duan},
  editor       = {Vijay Atluri and
                  G{\"{u}}nther Pernul},
  title        = {Dynamic Workflow Adjustment with Security Constraints},
  booktitle    = {Data and Applications Security and Privacy {XXVIII} - 28th Annual
                  {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria,
                  July 14-16, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8566},
  pages        = {211--226},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43936-4\_14},
  doi          = {10.1007/978-3-662-43936-4\_14},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/LuHYFD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/YangLWZS14,
  author       = {Yanjiang Yang and
                  Haibing Lu and
                  Jian Weng and
                  Youcheng Zhang and
                  Kouichi Sakurai},
  editor       = {Sherman S. M. Chow and
                  Joseph K. Liu and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Fine-Grained Conditional Proxy Re-Encryption and Application},
  booktitle    = {Provable Security - 8th International Conference, ProvSec 2014, Hong
                  Kong, China, October 9-10, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8782},
  pages        = {206--222},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12475-9\_15},
  doi          = {10.1007/978-3-319-12475-9\_15},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/YangLWZS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/LuHYDB13,
  author       = {Haibing Lu and
                  Yuan Hong and
                  Yanjiang Yang and
                  Lian Duan and
                  Nazia Badar},
  editor       = {Lingyu Wang and
                  Basit Shafiq},
  title        = {Towards User-Oriented {RBAC} Model},
  booktitle    = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7964},
  pages        = {81--96},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39256-6\_6},
  doi          = {10.1007/978-3-642-39256-6\_6},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/LuHYDB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/YangDLWZ13,
  author       = {Yanjiang Yang and
                  Xuhua Ding and
                  Haibing Lu and
                  Jian Weng and
                  Jianying Zhou},
  editor       = {Yvo Desmedt},
  title        = {Self-blindable Credential: Towards Anonymous Entity Authentication
                  Upon Resource Constrained Devices},
  booktitle    = {Information Security, 16th International Conference, {ISC} 2013, Dallas,
                  Texas, USA, November 13-15, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7807},
  pages        = {238--247},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-27659-5\_17},
  doi          = {10.1007/978-3-319-27659-5\_17},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/YangDLWZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/YangDLWZ13a,
  author       = {Yanjiang Yang and
                  Xuhua Ding and
                  Haibing Lu and
                  Zhiguo Wan and
                  Jianying Zhou},
  editor       = {Yvo Desmedt},
  title        = {Achieving Revocable Fine-Grained Cryptographic Access Control over
                  Cloud Data},
  booktitle    = {Information Security, 16th International Conference, {ISC} 2013, Dallas,
                  Texas, USA, November 13-15, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7807},
  pages        = {293--308},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-27659-5\_21},
  doi          = {10.1007/978-3-319-27659-5\_21},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/YangDLWZ13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/LaiDYW13,
  author       = {Junzuo Lai and
                  Robert H. Deng and
                  Yanjiang Yang and
                  Jian Weng},
  editor       = {Zhenfu Cao and
                  Fangguo Zhang},
  title        = {Adaptable Ciphertext-Policy Attribute-Based Encryption},
  booktitle    = {Pairing-Based Cryptography - Pairing 2013 - 6th International Conference,
                  Beijing, China, November 22-24, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8365},
  pages        = {199--214},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04873-4\_12},
  doi          = {10.1007/978-3-319-04873-4\_12},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pairing/LaiDYW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangDLW13,
  author       = {Yanjiang Yang and
                  Xuhua Ding and
                  Haibing Lu and
                  Jian Weng},
  title        = {Self-blindable Credential: Towards LightWeight Anonymous Entity Authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {207},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/207},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YangDLW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/YangLWDZ12,
  author       = {Yanjiang Yang and
                  Haibing Lu and
                  Jian Weng and
                  Xuhua Ding and
                  Jianying Zhou},
  editor       = {Tat Wing Chim and
                  Tsz Hon Yuen},
  title        = {A Generic Approach for Providing Revocation Support in Secret Handshake},
  booktitle    = {Information and Communications Security - 14th International Conference,
                  {ICICS} 2012, Hong Kong, China, October 29-31, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7618},
  pages        = {276--284},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34129-8\_24},
  doi          = {10.1007/978-3-642-34129-8\_24},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/YangLWDZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/WangWYY11,
  author       = {Xu An Wang and
                  Jian Weng and
                  Xiaoyuan Yang and
                  Yanjiang Yang},
  title        = {Cryptanalysis of an identity based broadcast encryption scheme without
                  random oracles},
  journal      = {Inf. Process. Lett.},
  volume       = {111},
  number       = {10},
  pages        = {461--464},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.ipl.2011.02.007},
  doi          = {10.1016/J.IPL.2011.02.007},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ipl/WangWYY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YangZDB11,
  author       = {Yanjiang Yang and
                  Jianying Zhou and
                  Robert H. Deng and
                  Feng Bao},
  title        = {Better security enforcement in trusted computing enabled heterogeneous
                  wireless sensor networks},
  journal      = {Secur. Commun. Networks},
  volume       = {4},
  number       = {1},
  pages        = {11--22},
  year         = {2011},
  url          = {https://doi.org/10.1002/sec.179},
  doi          = {10.1002/SEC.179},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YangZDB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DingYD11,
  author       = {Xuhua Ding and
                  Yanjiang Yang and
                  Robert H. Deng},
  title        = {Database Access Pattern Protection Without Full-Shuffles},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {6},
  number       = {1},
  pages        = {189--201},
  year         = {2011},
  url          = {https://doi.org/10.1109/TIFS.2010.2101062},
  doi          = {10.1109/TIFS.2010.2101062},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/DingYD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcloud/Yang11,
  author       = {Yanjiang Yang},
  editor       = {Ling Liu and
                  Manish Parashar},
  title        = {Towards Multi-user Private Keyword Search for Cloud Computing},
  booktitle    = {{IEEE} International Conference on Cloud Computing, {CLOUD} 2011,
                  Washington, DC, USA, 4-9 July, 2011},
  pages        = {758--759},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/CLOUD.2011.76},
  doi          = {10.1109/CLOUD.2011.76},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcloud/Yang11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcom/YangLW11,
  author       = {Yanjiang Yang and
                  Haibing Lu and
                  Jian Weng},
  editor       = {Costas Lambrinoudakis and
                  Panagiotis Rizomiliotis and
                  Tomasz Wiktor Wlodarczyk},
  title        = {Multi-User Private Keyword Search for Cloud Computing},
  booktitle    = {{IEEE} 3rd International Conference on Cloud Computing Technology
                  and Science, CloudCom 2011, Athens, Greece, November 29 - December
                  1, 2011},
  pages        = {264--271},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/CloudCom.2011.43},
  doi          = {10.1109/CLOUDCOM.2011.43},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cloudcom/YangLW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icppw/YangZ11,
  author       = {Yanjiang Yang and
                  Youcheng Zhang},
  editor       = {Jang{-}Ping Sheu and
                  Cho{-}Li Wang},
  title        = {A Generic Scheme for Secure Data Sharing in Cloud},
  booktitle    = {2011 International Conference on Parallel Processing Workshops, {ICPPW}
                  2011, Taipei, Taiwan, Sept. 13-16, 2011},
  pages        = {145--153},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ICPPW.2011.51},
  doi          = {10.1109/ICPPW.2011.51},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icppw/YangZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/WengCYDCB10,
  author       = {Jian Weng and
                  Min{-}Rong Chen and
                  Yanjiang Yang and
                  Robert H. Deng and
                  Kefei Chen and
                  Feng Bao},
  title        = {CCA-secure unidirectional proxy re-encryption in the adaptive corruption
                  model without random oracles},
  journal      = {Sci. China Inf. Sci.},
  volume       = {53},
  number       = {3},
  pages        = {593--606},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11432-010-0047-3},
  doi          = {10.1007/S11432-010-0047-3},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/WengCYDCB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/DingYDW10,
  author       = {Xuhua Ding and
                  Yanjiang Yang and
                  Robert H. Deng and
                  Shuhong Wang},
  title        = {A new hardware-assisted {PIR} with O(\emph{n}) shuffle cost},
  journal      = {Int. J. Inf. Sec.},
  volume       = {9},
  number       = {4},
  pages        = {237--252},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10207-010-0105-2},
  doi          = {10.1007/S10207-010-0105-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/DingYDW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/LiuBZYW10,
  author       = {Joseph K. Liu and
                  Joonsang Baek and
                  Jianying Zhou and
                  Yanjiang Yang and
                  Jun Wen Wong},
  title        = {Efficient online/offline identity-based signature for wireless sensor
                  network},
  journal      = {Int. J. Inf. Sec.},
  volume       = {9},
  number       = {4},
  pages        = {287--296},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10207-010-0109-y},
  doi          = {10.1007/S10207-010-0109-Y},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/LiuBZYW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YangLDB10,
  author       = {Yanjiang Yang and
                  Yingjiu Li and
                  Robert H. Deng and
                  Feng Bao},
  title        = {Shifting Inference Control to User Side: Architecture and Protocol},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {7},
  number       = {2},
  pages        = {189--202},
  year         = {2010},
  url          = {https://doi.org/10.1109/TDSC.2008.70},
  doi          = {10.1109/TDSC.2008.70},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/YangLDB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcit/YangB10,
  author       = {Yanjiang Yang and
                  Feng Bao},
  title        = {Enabling Use of Single Password over Multiple Servers in Two-Server
                  Model},
  booktitle    = {10th {IEEE} International Conference on Computer and Information Technology,
                  {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010},
  pages        = {846--850},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIT.2010.159},
  doi          = {10.1109/CIT.2010.159},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcit/YangB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/YangZWB10,
  author       = {Yanjiang Yang and
                  Jianying Zhou and
                  Jun Wen Wong and
                  Feng Bao},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Towards practical anonymous password authentication},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {59--68},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920271},
  doi          = {10.1145/1920261.1920271},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/YangZWB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/ChowWYD10,
  author       = {Sherman S. M. Chow and
                  Jian Weng and
                  Yanjiang Yang and
                  Robert H. Deng},
  editor       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {Efficient Unidirectional Proxy Re-Encryption},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference
                  on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6055},
  pages        = {316--332},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12678-9\_19},
  doi          = {10.1007/978-3-642-12678-9\_19},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/africacrypt/ChowWYD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/GuGYBM10,
  author       = {Liang Gu and
                  Yao Guo and
                  Yanjiang Yang and
                  Feng Bao and
                  Hong Mei},
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {Modeling TCG-Based Secure Systems with Colored Petri Nets},
  booktitle    = {Trusted Systems - Second International Conference, {INTRUST} 2010,
                  Beijing, China, December 13-15, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6802},
  pages        = {67--86},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-25283-9\_5},
  doi          = {10.1007/978-3-642-25283-9\_5},
  timestamp    = {Tue, 09 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/GuGYBM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/YangGB10,
  author       = {Yanjiang Yang and
                  Liang Gu and
                  Feng Bao},
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {Addressing Leakage of Re-encryption Key in Proxy Re-encryption Using
                  Trusted Computing},
  booktitle    = {Trusted Systems - Second International Conference, {INTRUST} 2010,
                  Beijing, China, December 13-15, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6802},
  pages        = {189--199},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-25283-9\_13},
  doi          = {10.1007/978-3-642-25283-9\_13},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/intrust/YangGB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/psd/LiangCLY10,
  author       = {Bing Liang and
                  Kevin Chiew and
                  Yingjiu Li and
                  Yanjiang Yang},
  editor       = {Josep Domingo{-}Ferrer and
                  Emmanouil Magkos},
  title        = {Privacy Disclosure Analysis and Control for 2D Contingency Tables
                  Containing Inaccurate Data},
  booktitle    = {Privacy in Statistical Databases - {UNESCO} Chair in Data Privacy,
                  International Conference, {PSD} 2010, Corfu, Greece, September 22-24,
                  2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6344},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15838-4\_1},
  doi          = {10.1007/978-3-642-15838-4\_1},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/psd/LiangCLY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuBZYW10,
  author       = {Joseph K. Liu and
                  Joonsang Baek and
                  Jianying Zhou and
                  Yanjiang Yang and
                  Jun Wen Wong},
  title        = {Efficient Online/Offline Identity-Based Signature for Wireless Sensor
                  Network},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {3},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/003},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuBZYW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WengCYDCB10,
  author       = {Jian Weng and
                  Min{-}Rong Chen and
                  Yanjiang Yang and
                  Robert H. Deng and
                  Kefei Chen and
                  Feng Bao},
  title        = {CCA-Secure Unidirectional Proxy Re-Encryption in the Adaptive Corruption
                  Model without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {265},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/265},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WengCYDCB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/YangBDD09,
  author       = {Yanjiang Yang and
                  Feng Bao and
                  Xuhua Ding and
                  Robert H. Deng},
  title        = {Multiuser private queries over encrypted databases},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {1},
  number       = {4},
  pages        = {309--319},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJACT.2009.028029},
  doi          = {10.1504/IJACT.2009.028029},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/YangBDD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YangDB09,
  author       = {Yanjiang Yang and
                  Robert H. Deng and
                  Feng Bao},
  title        = {Privacy-preserving rental services using one-show anonymous credentials},
  journal      = {Secur. Commun. Networks},
  volume       = {2},
  number       = {6},
  pages        = {531--545},
  year         = {2009},
  url          = {https://doi.org/10.1002/sec.97},
  doi          = {10.1002/SEC.97},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YangDB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tomccap/DengY09,
  author       = {Robert H. Deng and
                  Yanjiang Yang},
  title        = {A study of content authentication in proxy-enabled multimedia delivery
                  systems: Model, techniques, and applications},
  journal      = {{ACM} Trans. Multim. Comput. Commun. Appl.},
  volume       = {5},
  number       = {4},
  pages        = {28:1--28:20},
  year         = {2009},
  url          = {https://doi.org/10.1145/1596990.1596992},
  doi          = {10.1145/1596990.1596992},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tomccap/DengY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/YangZWB09,
  author       = {Yanjiang Yang and
                  Jianying Zhou and
                  Jian Weng and
                  Feng Bao},
  title        = {A New Approach for Anonymous Password Authentication},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {199--208},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.26},
  doi          = {10.1109/ACSAC.2009.26},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/YangZWB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/YangWZQ09,
  author       = {Yanjiang Yang and
                  Jian Weng and
                  Jianying Zhou and
                  Ying Qiu},
  editor       = {Feng Bao and
                  Moti Yung and
                  Dongdai Lin and
                  Jiwu Jing},
  title        = {Optionally Identifiable Private Handshakes},
  booktitle    = {Information Security and Cryptology - 5th International Conference,
                  Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6151},
  pages        = {164--178},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-16342-5\_13},
  doi          = {10.1007/978-3-642-16342-5\_13},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/YangWZQ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/QiuBWY09,
  author       = {Ying Qiu and
                  Feng Bao and
                  Yongdong Wu and
                  Yanjiang Yang},
  title        = {A Lightweight Fast Handover Authentication Scheme in Mobile Networks},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2009, Dresden, Germany, 14-18 June 2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICC.2009.5198620},
  doi          = {10.1109/ICC.2009.5198620},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/QiuBWY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/YangZDB09,
  author       = {Yanjiang Yang and
                  Jianying Zhou and
                  Robert H. Deng and
                  Feng Bao},
  editor       = {Sihan Qing and
                  Chris J. Mitchell and
                  Guilin Wang},
  title        = {Computationally Secure Hierarchical Self-healing Key Distribution
                  for Heterogeneous Wireless Sensor Networks},
  booktitle    = {Information and Communications Security, 11th International Conference,
                  {ICICS} 2009, Beijing, China, December 14-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5927},
  pages        = {135--149},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-11145-7\_12},
  doi          = {10.1007/978-3-642-11145-7\_12},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/YangZDB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/YangDZQ09,
  author       = {Yanjiang Yang and
                  Robert H. Deng and
                  Jianying Zhou and
                  Ying Qiu},
  editor       = {Feng Bao and
                  Hui Li and
                  Guilin Wang},
  title        = {Achieving Better Privacy Protection in Wireless Sensor Networks Using
                  Trusted Computing},
  booktitle    = {Information Security Practice and Experience, 5th International Conference,
                  {ISPEC} 2009, Xi'an, China, April 13-15, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5451},
  pages        = {384--395},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00843-6\_33},
  doi          = {10.1007/978-3-642-00843-6\_33},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/YangDZQ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/WengYTDB09,
  author       = {Jian Weng and
                  Yanjiang Yang and
                  Qiang Tang and
                  Robert H. Deng and
                  Feng Bao},
  editor       = {Pierangela Samarati and
                  Moti Yung and
                  Fabio Martinelli and
                  Claudio A. Ardagna},
  title        = {Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security},
  booktitle    = {Information Security, 12th International Conference, {ISC} 2009, Pisa,
                  Italy, September 7-9, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5735},
  pages        = {151--166},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04474-8\_13},
  doi          = {10.1007/978-3-642-04474-8\_13},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/WengYTDB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/YangBW09,
  author       = {Yanjiang Yang and
                  Feng Bao and
                  Jian Weng},
  title        = {Private handshakes with optional accountability},
  booktitle    = {The 34th Annual {IEEE} Conference on Local Computer Networks, {LCN}
                  2009, 20-23 October 2009, Zurich, Switzerland, Proceedings},
  pages        = {245--248},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/LCN.2009.5355079},
  doi          = {10.1109/LCN.2009.5355079},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lcn/YangBW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/YangLWZB09,
  author       = {Yanjiang Yang and
                  Yingjiu Li and
                  Jian Weng and
                  Jianying Zhou and
                  Feng Bao},
  editor       = {Josef Pieprzyk and
                  Fangguo Zhang},
  title        = {Self-enforcing Private Inference Control},
  booktitle    = {Provable Security, Third International Conference, ProvSec 2009, Guangzhou,
                  China, November 11-13, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5848},
  pages        = {260--274},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04642-1\_21},
  doi          = {10.1007/978-3-642-04642-1\_21},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/YangLWZB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/YangZDB09,
  author       = {Yanjiang Yang and
                  Jianying Zhou and
                  Robert H. Deng and
                  Feng Bao},
  editor       = {Yan Chen and
                  Tassos Dimitriou and
                  Jianying Zhou},
  title        = {Hierarchical Self-healing Key Distribution for Heterogeneous Wireless
                  Sensor Networks},
  booktitle    = {Security and Privacy in Communication Networks - 5th International
                  {ICST} Conference, SecureComm 2009, Athens, Greece, September 14-18,
                  2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {19},
  pages        = {285--295},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-05284-2\_16},
  doi          = {10.1007/978-3-642-05284-2\_16},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/YangZDB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChowWYD09,
  author       = {Sherman S. M. Chow and
                  Jian Weng and
                  Yanjiang Yang and
                  Robert H. Deng},
  title        = {Efficient Unidirectional Proxy Re-Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {189},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/189},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChowWYD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euc/YangBD08,
  author       = {Yanjiang Yang and
                  Feng Bao and
                  Robert H. Deng},
  editor       = {Cheng{-}Zhong Xu and
                  Minyi Guo},
  title        = {Efficient Client-to-Client Password Authenticated Key Exchange},
  booktitle    = {2008 {IEEE/IPIP} International Conference on Embedded and Ubiquitous
                  Computing {(EUC} 2008), Shanghai, China, December 17-20, 2008, Volume
                  {II:} Workshops},
  pages        = {202--207},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/EUC.2008.32},
  doi          = {10.1109/EUC.2008.32},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/euc/YangBD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/BaoDDY08,
  author       = {Feng Bao and
                  Robert H. Deng and
                  Xuhua Ding and
                  Yanjiang Yang},
  editor       = {Liqun Chen and
                  Yi Mu and
                  Willy Susilo},
  title        = {Private Query on Encrypted Data in Multi-user Settings},
  booktitle    = {Information Security Practice and Experience, 4th International Conference,
                  {ISPEC} 2008, Sydney, Australia, April 21-23, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4991},
  pages        = {71--85},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79104-1\_6},
  doi          = {10.1007/978-3-540-79104-1\_6},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/BaoDDY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/YangDDB08,
  author       = {Yanjiang Yang and
                  Xuhua Ding and
                  Robert H. Deng and
                  Feng Bao},
  editor       = {Tzong{-}Chen Wu and
                  Chin{-}Laung Lei and
                  Vincent Rijmen and
                  Der{-}Tsai Lee},
  title        = {An Efficient {PIR} Construction Using Trusted Hardware},
  booktitle    = {Information Security, 11th International Conference, {ISC} 2008, Taipei,
                  Taiwan, September 15-18, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5222},
  pages        = {64--79},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85886-7\_5},
  doi          = {10.1007/978-3-540-85886-7\_5},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/YangDDB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/YangLD07,
  author       = {Yanjiang Yang and
                  Yingjiu Li and
                  Robert H. Deng},
  editor       = {Steve Barker and
                  Gail{-}Joon Ahn},
  title        = {New Paradigm of Inference Control with Trusted Computing},
  booktitle    = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working
                  Conference on Data and Applications Security, Redondo Beach, CA, USA,
                  July 8-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4602},
  pages        = {243--258},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73538-0\_18},
  doi          = {10.1007/978-3-540-73538-0\_18},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/YangLD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/YangDB07,
  author       = {Yanjiang Yang and
                  Robert H. Deng and
                  Feng Bao},
  editor       = {Ed Dawson and
                  Duncan S. Wong},
  title        = {Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers},
  booktitle    = {Information Security Practice and Experience, Third International
                  Conference, {ISPEC} 2007, Hong Kong, China, May 7-9, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4464},
  pages        = {177--192},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72163-5\_15},
  doi          = {10.1007/978-3-540-72163-5\_15},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/YangDB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/DengY07,
  author       = {Robert H. Deng and
                  Yanjiang Yang},
  editor       = {Ed Dawson and
                  Duncan S. Wong},
  title        = {Achieving End-to-End Authentication in Intermediary-Enabled Multimedia
                  Delivery Systems},
  booktitle    = {Information Security Practice and Experience, Third International
                  Conference, {ISPEC} 2007, Hong Kong, China, May 7-9, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4464},
  pages        = {284--300},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72163-5\_22},
  doi          = {10.1007/978-3-540-72163-5\_22},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/DengY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YangDB06,
  author       = {Yanjiang Yang and
                  Robert H. Deng and
                  Feng Bao},
  title        = {A Practical Password-Based Two-Server Authentication and Key Exchange
                  System},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {3},
  number       = {2},
  pages        = {105--114},
  year         = {2006},
  url          = {https://doi.org/10.1109/TDSC.2006.16},
  doi          = {10.1109/TDSC.2006.16},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/YangDB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YangDB06,
  author       = {Yanjiang Yang and
                  Robert H. Deng and
                  Feng Bao},
  editor       = {Ferng{-}Ching Lin and
                  Der{-}Tsai Lee and
                  Bao{-}Shuh Paul Lin and
                  Shiuhpyng Shieh and
                  Sushil Jajodia},
  title        = {Fortifying password authentication in integrated healthcare delivery
                  systems},
  booktitle    = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24,
                  2006},
  pages        = {255--265},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1128817.1128855},
  doi          = {10.1145/1128817.1128855},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/YangDB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cikm/YangDB06,
  author       = {Yanjiang Yang and
                  Robert H. Deng and
                  Feng Bao},
  editor       = {Philip S. Yu and
                  Vassilis J. Tsotras and
                  Edward A. Fox and
                  Bing Liu},
  title        = {Practical private data matching deterrent to spoofing attacks},
  booktitle    = {Proceedings of the 2006 {ACM} {CIKM} International Conference on Information
                  and Knowledge Management, Arlington, Virginia, USA, November 6-11,
                  2006},
  pages        = {852--853},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1183614.1183763},
  doi          = {10.1145/1183614.1183763},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cikm/YangDB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/titb/BaoDOY05,
  author       = {Feng Bao and
                  Robert H. Deng and
                  Beng Chin Ooi and
                  Yanjiang Yang},
  title        = {Tailored reversible watermarking schemes for authentication of electronic
                  clinical atlas},
  journal      = {{IEEE} Trans. Inf. Technol. Biomed.},
  volume       = {9},
  number       = {4},
  pages        = {554--563},
  year         = {2005},
  url          = {https://doi.org/10.1109/TITB.2005.855556},
  doi          = {10.1109/TITB.2005.855556},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/titb/BaoDOY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YangBD05,
  author       = {Yanjiang Yang and
                  Feng Bao and
                  Robert H. Deng},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Security Analysis and Fix of an Anonymous Credential System},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {537--547},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_45},
  doi          = {10.1007/11506157\_45},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/YangBD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icde/BertinoOYD05,
  author       = {Elisa Bertino and
                  Beng Chin Ooi and
                  Yanjiang Yang and
                  Robert H. Deng},
  editor       = {Karl Aberer and
                  Michael J. Franklin and
                  Shojiro Nishio},
  title        = {Privacy and Ownership Preserving of Outsourced Medical Data},
  booktitle    = {Proceedings of the 21st International Conference on Data Engineering,
                  {ICDE} 2005, 5-8 April 2005, Tokyo, Japan},
  pages        = {521--532},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICDE.2005.111},
  doi          = {10.1109/ICDE.2005.111},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icde/BertinoOYD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/YangO05,
  author       = {Yanjiang Yang and
                  Beng Chin Ooi},
  editor       = {Jianying Zhou and
                  Javier L{\'{o}}pez and
                  Robert H. Deng and
                  Feng Bao},
  title        = {A Privacy Preserving Rental System},
  booktitle    = {Information Security, 8th International Conference, {ISC} 2005, Singapore,
                  September 20-23, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3650},
  pages        = {59--73},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11556992\_5},
  doi          = {10.1007/11556992\_5},
  timestamp    = {Thu, 29 Aug 2019 08:10:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/YangO05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/YangBD05,
  author       = {Yanjiang Yang and
                  Feng Bao and
                  Robert H. Deng},
  editor       = {Ry{\^{o}}ichi Sasaki and
                  Sihan Qing and
                  Eiji Okamoto and
                  Hiroshi Yoshiura},
  title        = {A New Architecture for User Authentication and Key Exchange Using
                  Password for Federated Enterprises},
  booktitle    = {Security and Privacy in the Age of Ubiquitous Computing, {IFIP} {TC11}
                  20th International Conference on Information Security {(SEC} 2005),
                  May 30 - June 1, 2005, Chiba, Japan},
  series       = {{IFIP}},
  volume       = {181},
  pages        = {95--112},
  publisher    = {Springer},
  year         = {2005},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/YangBD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YangWBWD04,
  author       = {Yanjiang Yang and
                  Shuhong Wang and
                  Feng Bao and
                  Jie Wang and
                  Robert H. Deng},
  title        = {New efficient user identification and key distribution scheme providing
                  enhanced security},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {8},
  pages        = {697--704},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.08.005},
  doi          = {10.1016/J.COSE.2004.08.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YangWBWD04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/titb/YangHBD04,
  author       = {Yanjiang Yang and
                  Xiaoxi Han and
                  Feng Bao and
                  Robert H. Deng},
  title        = {A smart-card-enabled privacy preserving E-prescription system},
  journal      = {{IEEE} Trans. Inf. Technol. Biomed.},
  volume       = {8},
  number       = {1},
  pages        = {47--58},
  year         = {2004},
  url          = {https://doi.org/10.1109/TITB.2004.824731},
  doi          = {10.1109/TITB.2004.824731},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/titb/YangHBD04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/GoiPYBDS04,
  author       = {Bok{-}Min Goi and
                  Raphael Chung{-}Wei Phan and
                  Yanjiang Yang and
                  Feng Bao and
                  Robert H. Deng and
                  M. U. Siddiqi},
  editor       = {Markus Jakobsson and
                  Moti Yung and
                  Jianying Zhou},
  title        = {Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols
                  and an Improvement for True Anonymity},
  booktitle    = {Applied Cryptography and Network Security, Second International Conference,
                  {ACNS} 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3089},
  pages        = {369--382},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24852-1\_27},
  doi          = {10.1007/978-3-540-24852-1\_27},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/GoiPYBDS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/YangB03,
  author       = {Yanjiang Yang and
                  Feng Bao},
  title        = {An invertible watermarking scheme for authentication of Electronic
                  Clinical Brain Atlas},
  booktitle    = {2003 {IEEE} International Conference on Acoustics, Speech, and Signal
                  Processing, {ICASSP} '03, Hong Kong, April 6-10, 2003},
  pages        = {533--536},
  publisher    = {{IEEE}},
  year         = {2003},
  url          = {https://doi.org/10.1109/ICASSP.2003.1199529},
  doi          = {10.1109/ICASSP.2003.1199529},
  timestamp    = {Mon, 22 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icassp/YangB03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/YangWBD03,
  author       = {Yanjiang Yang and
                  Zhenlan Wang and
                  Feng Bao and
                  Robert H. Deng},
  title        = {Secure the image-based simulated telesurgery system},
  booktitle    = {Proceedings of the 2003 International Symposium on Circuits and Systems,
                  {ISCAS} 2003, Bangkok, Thailand, May 25-28, 2003},
  pages        = {596--599},
  publisher    = {{IEEE}},
  year         = {2003},
  url          = {https://doi.org/10.1109/ISCAS.2003.1206044},
  doi          = {10.1109/ISCAS.2003.1206044},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/iscas/YangWBD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vcip/YangBD03,
  author       = {Yanjiang Yang and
                  Feng Bao and
                  Robert H. Deng},
  editor       = {Touradj Ebrahimi and
                  Thomas Sikora},
  title        = {Flexible authentication of images},
  booktitle    = {Visual Communications and Image Processing 2003, Lugano, Switzerland,
                  July 8, 2003},
  series       = {Proceedings of {SPIE}},
  volume       = {5150},
  pages        = {1905--1911},
  publisher    = {{SPIE}},
  year         = {2003},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vcip/YangBD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YangBD02,
  author       = {Yanjiang Yang and
                  Feng Bao and
                  Robert H. Deng},
  editor       = {Lynn Margaret Batten and
                  Jennifer Seberry},
  title        = {Security Analysis and Improvement of the Global Key Recovery System},
  booktitle    = {Information Security and Privacy, 7th Australian Conference, {ACISP}
                  2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2384},
  pages        = {17--24},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45450-0\_2},
  doi          = {10.1007/3-540-45450-0\_2},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YangBD02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics