Остановите войну!
for scientists:
default search action
Yan Zhu 0010
- > Home > Persons > Yan Zhu 0010
Publications
- 2024
- [j42]Hai Lu, Yan Zhu, Cecilia E. Chen, Rongquan Feng, Lejun Zhang, Di Ma:
Efficient Key Generation on Lattice Cryptography for Privacy Protection in Mobile IoT Crowdsourcing. IEEE Internet Things J. 11(2): 1893-1909 (2024) - [j41]Guanglai Guo, Yan Zhu, Cecilia E. Chen, Lejun Zhang, Rongquan Feng, Di Ma:
Privacy-Preserving Queries Using Multisource Private Data Counting on Real Numbers in IoT. IEEE Internet Things J. 11(7): 11353-11367 (2024) - 2022
- [j33]Guanglai Guo, Yan Zhu, E. Chen, Guizhen Zhu, Di Ma, William Cheng-Chung Chu:
Continuous improvement of script-driven verifiable random functions for reducing computing power in blockchain consensus protocols. Peer-to-Peer Netw. Appl. 15(1): 304-323 (2022) - 2021
- [j29]Yan Zhu, Weijing Song, Di Wang, Di Ma, William Cheng-Chung Chu:
TA-SPESC: Toward Asset-Driven Smart Contract Language Supporting Ownership Transaction and Rule-Based Generation on Blockchain. IEEE Trans. Reliab. 70(3): 1255-1270 (2021) - 2020
- [j27]Guanglai Guo, Yan Zhu, Ruyun Yu, William Cheng-Chung Chu, Di Ma:
A Privacy-Preserving Framework With Self-Governance and Permission Delegation in Online Social Networks. IEEE Access 8: 157116-157129 (2020) - 2019
- [j23]Yan Zhu, Ruyun Yu, Di Ma, William Cheng-Chung Chu:
Cryptographic Attribute-Based Access Control (ABAC) for Secure Decision Making of Dynamic Policy With Multiauthority Attribute Tokens. IEEE Trans. Reliab. 68(4): 1330-1346 (2019) - 2018
- [c34]Yan Zhu, Ruyun Yu, Yao Qin, Di Ma, William Cheng-Chung Chu:
Provably Secure Cryptographic ABAC System to Enhance Reliability and Privacy Using Real-Time Token and Dynamic Policy. QRS 2018: 277-288 - 2015
- [j14]Babins Shrestha, Di Ma, Yan Zhu, Haoyu Li, Nitesh Saxena:
Tap-Wave-Rub: Lightweight Human Interaction Approach to Curb Emerging Smartphone Malware. IEEE Trans. Inf. Forensics Secur. 10(11): 2270-2283 (2015) - [c29]Yan Zhu, Xin Wang, Di Ma, Ruiqi Guo:
Identity-Set-based Broadcast Encryption supporting "Cut-or-Select" with Short Ciphertext. AsiaCCS 2015: 191-202 - [c25]Yan Zhu, Liguang Yang, Di Ma:
Secure Snaps: A New Forward Secrecy Cryptosystem for Self-Destructing Messages in Mobile Services. IEEE MS 2015: 142-149 - [i5]Yan Zhu, Xin Wang, Di Ma, Ruiqi Guo:
Identity-Set-based Broadcast Encryption supporting "Cut-or-Select" with Short Ciphertext. IACR Cryptol. ePrint Arch. 2015: 342 (2015) - 2014
- [j12]Shan-Biao Wang, Yan Zhu, Di Ma, Rong-Quan Feng:
Lattice-based key exchange on small integer solution problem. Sci. China Inf. Sci. 57(11): 1-12 (2014) - [j11]Yan Zhu, Di Ma, Changjun Hu, Gail-Joon Ahn, Hongxin Hu:
Secure and efficient random functions with variable-length output. J. Netw. Comput. Appl. 45: 121-133 (2014) - 2013
- [j10]Di Ma, Nitesh Saxena, Tuo Xiang, Yan Zhu:
Location-Aware and Safer Cards: Enhancing RFID Security and Privacy via Location Sensing. IEEE Trans. Dependable Secur. Comput. 10(2): 57-69 (2013) - [j9]Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Di Ma, Shan-Biao Wang:
Role-Based Cryptosystem: A New Cryptographic RBAC System Based on Role-Key Hierarchy. IEEE Trans. Inf. Forensics Secur. 8(12): 2138-2153 (2013) - [c22]Yan Zhu, Changjun Hu, Di Ma, Jin Li:
Cryptographic Spatio-temporal Predicates for Location-Based Services. 3PGCIC 2013: 84-91 - [c21]Yan Zhu, Di Ma, Changjun Hu, Dijiang Huang:
How to use attribute-based encryption to implement role-based access control in the cloud. SCC@ASIACCS 2013: 33-40 - [c20]Di Ma, Yan Zhu, Mengyang Yu:
End-to-end aggregate authentication of time-series data. AsiaPKC@AsiaCCS 2013: 51-56 - [c19]Yan Zhu, Di Ma, Dijiang Huang, Changjun Hu:
Enabling secure location-based services in mobile cloud computing. MCC@SIGCOMM 2013: 27-32 - [c18]Yan Zhu, Di Ma, Shan-Biao Wang, Rong-Quan Feng:
Efficient Identity-Based Encryption without Pairings and Key Escrow for Mobile Devices. WASA 2013: 42-53 - [c17]Haoyu Li, Di Ma, Nitesh Saxena, Babins Shrestha, Yan Zhu:
Tap-Wave-Rub: lightweight malware prevention for smartphones using intuitive human gestures. WISEC 2013: 25-30 - [i4]Haoyu Li, Di Ma, Nitesh Saxena, Babins Shrestha, Yan Zhu:
Tap-Wave-Rub: Lightweight Malware Prevention for Smartphones Using Intuitive Human Gestures. CoRR abs/1302.4010 (2013) - 2012
- [j6]Yan Zhu, Shan-Biao Wang, Hongxin Hu, Gail-Joon Ahn, Di Ma:
Secure Collaborative Integrity Verification for Hybrid Cloud Environments. Int. J. Cooperative Inf. Syst. 21(3): 165-198 (2012) - [c15]Yan Zhu, Shan-Biao Wang, Di Ma, Hongxin Hu, Gail-Joon Ahn:
Secure and efficient constructions of hash, MAC and PRF for mobile devices. GLOBECOM 2012: 949-954 - [c14]Yan Zhu, Di Ma, Shan-Biao Wang:
Secure Data Retrieval of Outsourced Data with Complex Query Support. ICDCS Workshops 2012: 481-490
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 01:54 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint