Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Zuoxia Yu
@inproceedings{DBLP:conf/crypto/YangYAS22, author = {Rupeng Yang and Zuoxia Yu and Man Ho Au and Willy Susilo}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Public-Key Watermarking Schemes for Pseudorandom Functions}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13508}, pages = {637--667}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15979-4\_22}, doi = {10.1007/978-3-031-15979-4\_22}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/YangYAS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YangYAS22, author = {Rupeng Yang and Zuoxia Yu and Man Ho Au and Willy Susilo}, title = {Public-Key Watermarking Schemes for Pseudorandom Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {768}, year = {2022}, url = {https://eprint.iacr.org/2022/768}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YangYAS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/YangAYX20, author = {Rupeng Yang and Man Ho Au and Zuoxia Yu and Qiuliang Xu}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Collusion Resistant Watermarkable PRFs from Standard Assumptions}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12170}, pages = {590--620}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56784-2\_20}, doi = {10.1007/978-3-030-56784-2\_20}, timestamp = {Wed, 12 Aug 2020 14:16:56 +0200}, biburl = {https://dblp.org/rec/conf/crypto/YangAYX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YangAYX20, author = {Rupeng Yang and Man Ho Au and Zuoxia Yu and Qiuliang Xu}, title = {Collusion Resistant Watermarkable PRFs from Standard Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {695}, year = {2020}, url = {https://eprint.iacr.org/2020/695}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YangAYX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YangAXY19, author = {Rupeng Yang and Man Ho Au and Qiuliang Xu and Zuoxia Yu}, title = {Decentralized blacklistable anonymous credentials with reputation}, journal = {Comput. Secur.}, volume = {85}, pages = {353--371}, year = {2019}, url = {https://doi.org/10.1016/j.cose.2019.05.009}, doi = {10.1016/J.COSE.2019.05.009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/YangAXY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/YangALXY19, author = {Rupeng Yang and Man Ho Au and Junzuo Lai and Qiuliang Xu and Zuoxia Yu}, editor = {Steven D. Galbraith and Shiho Moriai}, title = {Collusion Resistant Watermarking Schemes for Cryptographic Functionalities}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11921}, pages = {371--398}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34578-5\_14}, doi = {10.1007/978-3-030-34578-5\_14}, timestamp = {Tue, 26 Nov 2019 14:11:51 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/YangALXY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/YangAZXYW19, author = {Rupeng Yang and Man Ho Au and Zhenfei Zhang and Qiuliang Xu and Zuoxia Yu and William Whyte}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11692}, pages = {147--175}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26948-7\_6}, doi = {10.1007/978-3-030-26948-7\_6}, timestamp = {Fri, 09 Aug 2019 14:20:22 +0200}, biburl = {https://dblp.org/rec/conf/crypto/YangAZXYW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/YuAYYXL19, author = {Zuoxia Yu and Man Ho Au and Jiangshan Yu and Rupeng Yang and Qiuliang Xu and Wang Fat Lau}, editor = {Ian Goldberg and Tyler Moore}, title = {New Empirical Traceability Analysis of CryptoNote-Style Blockchains}, booktitle = {Financial Cryptography and Data Security - 23rd International Conference, {FC} 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11598}, pages = {133--149}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32101-7\_9}, doi = {10.1007/978-3-030-32101-7\_9}, timestamp = {Wed, 12 Aug 2020 17:59:02 +0200}, biburl = {https://dblp.org/rec/conf/fc/YuAYYXL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/18/YuAY19, author = {Zuoxia Yu and Man Ho Au and Rupeng Yang}, editor = {Kuan{-}Ching Li and Xiaofeng Chen and Willy Susilo}, title = {Accountable Anonymous Credentials}, booktitle = {Advances in Cyber Security: Principles, Techniques, and Applications}, pages = {49--68}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-13-1483-4\_3}, doi = {10.1007/978-981-13-1483-4\_3}, timestamp = {Thu, 14 Oct 2021 08:45:55 +0200}, biburl = {https://dblp.org/rec/books/sp/18/YuAY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YangAZXYW19, author = {Rupeng Yang and Man Ho Au and Zhenfei Zhang and Qiuliang Xu and Zuoxia Yu and William Whyte}, title = {Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {747}, year = {2019}, url = {https://eprint.iacr.org/2019/747}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YangAZXYW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/YuAXYH18, author = {Zuoxia Yu and Man Ho Au and Qiuliang Xu and Rupeng Yang and Jinguang Han}, title = {Towards leakage-resilient fine-grained access control in fog computing}, journal = {Future Gener. Comput. Syst.}, volume = {78}, pages = {763--777}, year = {2018}, url = {https://doi.org/10.1016/j.future.2017.01.025}, doi = {10.1016/J.FUTURE.2017.01.025}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/YuAXYH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/YangXAYWZ18, author = {Rupeng Yang and Qiuliang Xu and Man Ho Au and Zuoxia Yu and Hao Wang and Lu Zhou}, title = {Position based cryptography with location privacy: {A} step for Fog Computing}, journal = {Future Gener. Comput. Syst.}, volume = {78}, pages = {799--806}, year = {2018}, url = {https://doi.org/10.1016/j.future.2017.05.035}, doi = {10.1016/J.FUTURE.2017.05.035}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/YangXAYWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YuAYLX18, author = {Zuoxia Yu and Man Ho Au and Rupeng Yang and Junzuo Lai and Qiuliang Xu}, editor = {Willy Susilo and Guomin Yang}, title = {Lattice-Based Universal Accumulator with Nonmembership Arguments}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {502--519}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_29}, doi = {10.1007/978-3-319-93638-3\_29}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YuAYLX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YangAXY18, author = {Rupeng Yang and Man Ho Au and Qiuliang Xu and Zuoxia Yu}, editor = {Willy Susilo and Guomin Yang}, title = {Decentralized Blacklistable Anonymous Credentials with Reputation}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {720--738}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_41}, doi = {10.1007/978-3-319-93638-3\_41}, timestamp = {Mon, 02 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YangAXY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YuAYLX18, author = {Zuoxia Yu and Man Ho Au and Rupeng Yang and Junzuo Lai and Qiuliang Xu}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Achieving Flexibility for {ABE} with Outsourcing via Proxy Re-Encryption}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {659--672}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196557}, doi = {10.1145/3196494.3196557}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YuAYLX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/MengWWLYLZC18, author = {Weizhi Meng and Jianfeng Wang and Xianmin Wang and Joseph K. Liu and Zuoxia Yu and Jin Li and Yongjun Zhao and Sherman S. M. Chow}, editor = {Man Ho Au and Siu{-}Ming Yiu and Jin Li and Xiapu Luo and Cong Wang and Aniello Castiglione and Kamil Kluczniak}, title = {Position Paper on Blockchain Technology: Smart Contract and Applications}, booktitle = {Network and System Security - 12th International Conference, {NSS} 2018, Hong Kong, China, August 27-29, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11058}, pages = {474--483}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-02744-5\_35}, doi = {10.1007/978-3-030-02744-5\_35}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/MengWWLYLZC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/YangALXY18, author = {Rupeng Yang and Man Ho Au and Junzuo Lai and Qiuliang Xu and Zuoxia Yu}, editor = {Dario Catalano and Roberto De Prisco}, title = {Unforgeable Watermarking Schemes with Public Extraction}, booktitle = {Security and Cryptography for Networks - 11th International Conference, {SCN} 2018, Amalfi, Italy, September 5-7, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11035}, pages = {63--80}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98113-0\_4}, doi = {10.1007/978-3-319-98113-0\_4}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/scn/YangALXY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YangAXY17, author = {Rupeng Yang and Man Ho Au and Qiuliang Xu and Zuoxia Yu}, title = {Decentralized Blacklistable Anonymous Credentials with Reputation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {389}, year = {2017}, url = {http://eprint.iacr.org/2017/389}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YangAXY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YangALXY17, author = {Rupeng Yang and Man Ho Au and Junzuo Lai and Qiuliang Xu and Zuoxia Yu}, title = {Lattice-Based Techniques for Accountable Anonymity: Composition of Abstract Stern's Protocols and Weak {PRF} with Efficient Protocols from {LWR}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {781}, year = {2017}, url = {http://eprint.iacr.org/2017/781}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YangALXY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YangALXY17a, author = {Rupeng Yang and Man Ho Au and Junzuo Lai and Qiuliang Xu and Zuoxia Yu}, title = {Collusion Resistant Watermarking Schemes for Cryptographic Functionalities}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1201}, year = {2017}, url = {http://eprint.iacr.org/2017/1201}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YangALXY17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HuYLYZX16, author = {Chengyu Hu and Rupeng Yang and Pengtao Liu and Zuoxia Yu and Yongbin Zhou and Qiuliang Xu}, title = {Public-key encryption with keyword search secure against continual memory attacks}, journal = {Secur. Commun. Networks}, volume = {9}, number = {11}, pages = {1613--1629}, year = {2016}, url = {https://doi.org/10.1002/sec.1451}, doi = {10.1002/SEC.1451}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HuYLYZX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YuAXYH16, author = {Zuoxia Yu and Man Ho Au and Qiuliang Xu and Rupeng Yang and Jinguang Han}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Leakage-Resilient Functional Encryption via Pair Encodings}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9722}, pages = {443--460}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40253-6\_27}, doi = {10.1007/978-3-319-40253-6\_27}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YuAXYH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/HuYYXZY15, author = {Chengyu Hu and Zuoxia Yu and Rupeng Yang and Qiuliang Xu and Yongbin Zhou and Qixia Yuan}, title = {Weak leakage resilient extractable hash proof system and construction for weak leakage resilient CCA-secure public-key encryption}, journal = {Int. J. Embed. Syst.}, volume = {7}, number = {3/4}, pages = {216--229}, year = {2015}, url = {https://doi.org/10.1504/IJES.2015.072367}, doi = {10.1504/IJES.2015.072367}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijes/HuYYXZY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/YangXZZHY15, author = {Rupeng Yang and Qiuliang Xu and Yongbin Zhou and Rui Zhang and Chengyu Hu and Zuoxia Yu}, editor = {G{\"{u}}nther Pernul and Peter Y. A. Ryan and Edgar R. Weippl}, title = {Updatable Hash Proof System and Its Applications}, booktitle = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9326}, pages = {266--285}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24174-6\_14}, doi = {10.1007/978-3-319-24174-6\_14}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/YangXZZHY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YuXZHYF14, author = {Zuoxia Yu and Qiuliang Xu and Yongbin Zhou and Chengyu Hu and Rupeng Yang and Guangjun Fan}, title = {Weak-Key Leakage Resilient Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {159}, year = {2014}, url = {http://eprint.iacr.org/2014/159}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YuXZHYF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.