Остановите войну!
for scientists:
default search action
Yanjiang Yang
- > Home > Persons > Yanjiang Yang
Publications
- 2017
- [j24]Zhuo Wei, Yanjiang Yang, Yongdong Wu, Jian Weng, Robert H. Deng:
HIBS-KSharing: Hierarchical Identity-Based Signature Key Sharing for Automotive. IEEE Access 5: 16314-16323 (2017) - [c49]Zhuo Wei, Yanjiang Yang, Rehana Yasmin, Yongdong Wu, Jian Weng, Robert H. Deng:
IoVShield: An Efficient Vehicular Intrusion Detection System for Self-driving (Short Paper). ISPEC 2017: 638-647 - 2015
- [j16]Jian Weng, Yunlei Zhao, Robert H. Deng, Shengli Liu, Yanjiang Yang, Kouichi Sakurai:
A note on the security of KHL scheme. Theor. Comput. Sci. 602: 1-6 (2015) - 2013
- [c37]Junzuo Lai, Robert H. Deng, Yanjiang Yang, Jian Weng:
Adaptable Ciphertext-Policy Attribute-Based Encryption. Pairing 2013: 199-214 - 2011
- [j13]Yanjiang Yang, Jianying Zhou, Robert H. Deng, Feng Bao:
Better security enforcement in trusted computing enabled heterogeneous wireless sensor networks. Secur. Commun. Networks 4(1): 11-22 (2011) - [j12]Xuhua Ding, Yanjiang Yang, Robert H. Deng:
Database Access Pattern Protection Without Full-Shuffles. IEEE Trans. Inf. Forensics Secur. 6(1): 189-201 (2011) - 2010
- [j11]Jian Weng, Min-Rong Chen, Yanjiang Yang, Robert H. Deng, Kefei Chen, Feng Bao:
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles. Sci. China Inf. Sci. 53(3): 593-606 (2010) - [j10]Xuhua Ding, Yanjiang Yang, Robert H. Deng, Shuhong Wang:
A new hardware-assisted PIR with O(n) shuffle cost. Int. J. Inf. Sec. 9(4): 237-252 (2010) - [j8]Yanjiang Yang, Yingjiu Li, Robert H. Deng, Feng Bao:
Shifting Inference Control to User Side: Architecture and Protocol. IEEE Trans. Dependable Secur. Comput. 7(2): 189-202 (2010) - [c30]Sherman S. M. Chow, Jian Weng, Yanjiang Yang, Robert H. Deng:
Efficient Unidirectional Proxy Re-Encryption. AFRICACRYPT 2010: 316-332 - [i2]Jian Weng, Min-Rong Chen, Yanjiang Yang, Robert H. Deng, Kefei Chen, Feng Bao:
CCA-Secure Unidirectional Proxy Re-Encryption in the Adaptive Corruption Model without Random Oracles. IACR Cryptol. ePrint Arch. 2010: 265 (2010) - 2009
- [j7]Yanjiang Yang, Feng Bao, Xuhua Ding, Robert H. Deng:
Multiuser private queries over encrypted databases. Int. J. Appl. Cryptogr. 1(4): 309-319 (2009) - [j6]Yanjiang Yang, Robert H. Deng, Feng Bao:
Privacy-preserving rental services using one-show anonymous credentials. Secur. Commun. Networks 2(6): 531-545 (2009) - [j5]Robert H. Deng, Yanjiang Yang:
A study of content authentication in proxy-enabled multimedia delivery systems: Model, techniques, and applications. ACM Trans. Multim. Comput. Commun. Appl. 5(4): 28:1-28:20 (2009) - [c23]Yanjiang Yang, Jianying Zhou, Robert H. Deng, Feng Bao:
Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks. ICICS 2009: 135-149 - [c22]Yanjiang Yang, Robert H. Deng, Jianying Zhou, Ying Qiu:
Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing. ISPEC 2009: 384-395 - [c21]Jian Weng, Yanjiang Yang, Qiang Tang, Robert H. Deng, Feng Bao:
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security. ISC 2009: 151-166 - [c18]Yanjiang Yang, Jianying Zhou, Robert H. Deng, Feng Bao:
Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks. SecureComm 2009: 285-295 - [i1]Sherman S. M. Chow, Jian Weng, Yanjiang Yang, Robert H. Deng:
Efficient Unidirectional Proxy Re-Encryption. IACR Cryptol. ePrint Arch. 2009: 189 (2009) - 2008
- [c17]Yanjiang Yang, Feng Bao, Robert H. Deng:
Efficient Client-to-Client Password Authenticated Key Exchange. EUC (2) 2008: 202-207 - [c16]Feng Bao, Robert H. Deng, Xuhua Ding, Yanjiang Yang:
Private Query on Encrypted Data in Multi-user Settings. ISPEC 2008: 71-85 - [c15]Yanjiang Yang, Xuhua Ding, Robert H. Deng, Feng Bao:
An Efficient PIR Construction Using Trusted Hardware. ISC 2008: 64-79 - 2007
- [c14]Yanjiang Yang, Yingjiu Li, Robert H. Deng:
New Paradigm of Inference Control with Trusted Computing. DBSec 2007: 243-258 - [c13]Yanjiang Yang, Robert H. Deng, Feng Bao:
Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers. ISPEC 2007: 177-192 - [c12]Robert H. Deng, Yanjiang Yang:
Achieving End-to-End Authentication in Intermediary-Enabled Multimedia Delivery Systems. ISPEC 2007: 284-300 - 2006
- [j4]Yanjiang Yang, Robert H. Deng, Feng Bao:
A Practical Password-Based Two-Server Authentication and Key Exchange System. IEEE Trans. Dependable Secur. Comput. 3(2): 105-114 (2006) - [c11]Yanjiang Yang, Robert H. Deng, Feng Bao:
Fortifying password authentication in integrated healthcare delivery systems. AsiaCCS 2006: 255-265 - [c10]Yanjiang Yang, Robert H. Deng, Feng Bao:
Practical private data matching deterrent to spoofing attacks. CIKM 2006: 852-853 - 2005
- [j3]Feng Bao, Robert H. Deng, Beng Chin Ooi, Yanjiang Yang:
Tailored reversible watermarking schemes for authentication of electronic clinical atlas. IEEE Trans. Inf. Technol. Biomed. 9(4): 554-563 (2005) - [c9]Yanjiang Yang, Feng Bao, Robert H. Deng:
Security Analysis and Fix of an Anonymous Credential System. ACISP 2005: 537-547 - [c8]Elisa Bertino, Beng Chin Ooi, Yanjiang Yang, Robert H. Deng:
Privacy and Ownership Preserving of Outsourced Medical Data. ICDE 2005: 521-532 - [c6]Yanjiang Yang, Feng Bao, Robert H. Deng:
A New Architecture for User Authentication and Key Exchange Using Password for Federated Enterprises. SEC 2005: 95-112 - 2004
- [j2]Yanjiang Yang, Shuhong Wang, Feng Bao, Jie Wang, Robert H. Deng:
New efficient user identification and key distribution scheme providing enhanced security. Comput. Secur. 23(8): 697-704 (2004) - [j1]Yanjiang Yang, Xiaoxi Han, Feng Bao, Robert H. Deng:
A smart-card-enabled privacy preserving E-prescription system. IEEE Trans. Inf. Technol. Biomed. 8(1): 47-58 (2004) - [c5]Bok-Min Goi, Raphael Chung-Wei Phan, Yanjiang Yang, Feng Bao, Robert H. Deng, M. U. Siddiqi:
Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity. ACNS 2004: 369-382 - 2003
- [c3]Yanjiang Yang, Zhenlan Wang, Feng Bao, Robert H. Deng:
Secure the image-based simulated telesurgery system. ISCAS (2) 2003: 596-599 - [c2]Yanjiang Yang, Feng Bao, Robert H. Deng:
Flexible authentication of images. VCIP 2003: 1905-1911 - 2002
- [c1]Yanjiang Yang, Feng Bao, Robert H. Deng:
Security Analysis and Improvement of the Global Key Recovery System. ACISP 2002: 17-24
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 01:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint