default search action
Yong Yu 0002
禹勇
Person information
- unicode name: 禹勇
- affiliation: Shaanxi Normal University, School of Computer Science, Xi'an, China
- affiliation (former): University of Electronic Science and Technology of China, School of Computer Science and Engineering, Chengdu, China
- affiliation (former): University of Wollongong, School of Computer Science and Software Engineering, NSW, Australia
- affiliation (PhD 2008): Xidian University, Xi'an, China
Other persons with the same name
- Yong Yu — disambiguation page
- Yong Yu 0001 — Shanghai Jiao Tong University, Department of Computer Science, Apex Data and Knowledge Management Lab, China
- Yong Yu 0003 — Kagoshima University, Department of Mechanical Engineering, Japan (and 2 more)
- Yong Yu 0004 — University of Houston, Department of Physics, TX, USA
- Yong Yu 0005 — Broadcom Corporation, Andover, MA, USA (and 1 more)
- Yong Yu 0006 — Ecole Normale Supérieure de Cachan, France (and 1 more)
- Yong Yu 0007 — Harbin Institute of Technology, School of Electrical Engineering and Automation, China
- Yong Yu 0008 — Hong Kong Polytechnic University, Business Division, Institute of Textiles and Clothing, Hong Kong
- Yong Yu 0009 — Yunnan University, School of Software, Kunming, China
- Yong Yu 0010 — Beihang University, School of Mechanical Engineering and Automation, Beijing, China
- Yong Yu 0011 — Chinese Academy of Sciences, Suzhou Institute of Biomedical Engineering and Technology, China
- Yong Yu 0012 — Chinese University of Hong Kong, Department of Mathematics, Hong Kong
- Yong Yu 0013 — Xi'an Research Institute of High-Tech, Department of Automation, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j118]Zongyang Zhang, Lingyue Zhang, Zhuo Wang, Yichen Li, Rongxing Lu, Yong Yu:
Chronos: An Efficient Asynchronous Byzantine Ordered Consensus. Comput. J. 67(3): 1153-1162 (2024) - [j117]Qiming Yu, Shilei Liao, Lianhai Wang, Yong Yu, Lingyue Zhang, Yanqi Zhao:
A regulated anonymous cryptocurrency with batch linkability. Comput. Stand. Interfaces 87: 103770 (2024) - [j116]Yichao Lu, Huilin Li, Le Gao, Jiaxin Yu, Yong Yu, Hexing Su:
Self-tallying e-voting with public traceability based on blockchain. Comput. Stand. Interfaces 88: 103795 (2024) - [j115]Jinhui Liu, Bo Tang, Guishan Dong, Yong Yu:
iPMRSS: An Improved privacy-preserving medical record searching scheme for intelligent diagnosis in IoMT. Expert Syst. Appl. 239: 122230 (2024) - [j114]Jinhui Liu, Shunyu Dong, Jiaming Wen, Bo Tang, Yong Yu:
TBSCrowd: A Blockchain-Assisted Privacy-Preserving Mobile Crowdsourcing Scheme From Threshold Blind Signatures. IEEE Internet Things J. 11(11): 19344-19354 (2024) - [j113]Hexing Su, Le Gao, Zhimin Wang, Yong Yu, Jin Hong, Yongqiao Gao:
A Hierarchical Full-Resolution Fusion Network and Topology-Aware Connectivity Booster for Retinal Vessel Segmentation. IEEE Trans. Instrum. Meas. 73: 1-16 (2024) - [j112]Baobao Chai, Jiguo Yu, Biwei Yan, Yong Yu, Shengling Wang:
BSCDA: Blockchain-Based Secure Cross-Domain Data Access Scheme for Internet of Things. IEEE Trans. Netw. Serv. Manag. 21(4): 4006-4023 (2024) - 2023
- [j111]Jinhui Liu, Tianyi Han, Maolin Tan, Bo Tang, Wei Hu, Yong Yu:
A Publicly Verifiable E-Voting System Based on Biometrics. Cryptogr. 7(4): 62 (2023) - [j110]Jinhui Liu, Jiaming Wen, Bowen Zhang, Shunyu Dong, Bo Tang, Yong Yu:
A post quantum secure multi-party collaborative signature with deterability in the Industrial Internet of Things. Future Gener. Comput. Syst. 141: 663-676 (2023) - [j109]Huilin Li, Yu Sun, Yong Yu, Dawei Li, Zhenyu Guan, Jianwei Liu:
Privacy-Preserving Cross-Silo Federated Learning Atop Blockchain for IoT. IEEE Internet Things J. 10(24): 21176-21186 (2023) - [j108]Qian Zhang, Yong Yu, Huilin Li, Jiguo Yu, Lei Wang:
Trustworthy sealed-bid auction with low communication cost atop blockchain. Inf. Sci. 631: 202-217 (2023) - [j107]Jinhui Li, Yanle Li, Hao Yuan, Zinan Cheng, Yong Yu, Shahid Ghafoor, Fangyi Li:
Multi-stage finite element modeling of the deformation behavior during ultrasonic-assisted incremental sheet forming. J. Comput. Sci. 72: 102077 (2023) - [j106]Yihao Guo, Minghui Xu, Dongxiao Yu, Yong Yu, Rajiv Ranjan, Xiuzhen Cheng:
Cross-Channel: Scalable Off-Chain Channels Supporting Fair and Atomic Cross-Chain Operations. IEEE Trans. Computers 72(11): 3231-3244 (2023) - [j105]Wei Liu, Zhiguo Wan, Jun Shao, Yong Yu:
HyperMaze: Towards Privacy-Preserving and Scalable Permissioned Blockchain. IEEE Trans. Dependable Secur. Comput. 20(1): 360-376 (2023) - [c40]Haibin Zhang, Sisi Duan, Chao Liu, Boxin Zhao, Xuanji Meng, Shengli Liu, Yong Yu, Fangguo Zhang, Liehuang Zhu:
Practical Asynchronous Distributed Key Generation: Improved Efficiency, Weaker Assumption, and Standard Model. DSN 2023: 568-581 - 2022
- [j104]Jinhui Liu, Yong Yu, Hongliang Bi, Yanqi Zhao, Shijia Wang, Huanguo Zhang:
Post quantum secure fair data trading with deterability based on machine learning. Sci. China Inf. Sci. 65(7): 1-2 (2022) - [j103]Min Xie, Yong Yu, Ruonan Chen, Huilin Li, Jianguo Wei, Qilong Sun:
Accountable outsourcing data storage atop blockchain. Comput. Stand. Interfaces 82: 103628 (2022) - [j102]Yiting Huang, Yong Yu, Huilin Li, Yannan Li, Aikui Tian:
Blockchain-based continuous data integrity checking protocol with zero-knowledge privacy protection. Digit. Commun. Networks 8(5): 604-613 (2022) - [j101]Junbin Shi, Qiming Yu, Yong Yu, Lianhai Wang, Wenzheng Zhang:
Privacy protection in social applications: A ciphertext policy attribute-based encryption with keyword search. Int. J. Intell. Syst. 37(12): 12152-12168 (2022) - [j100]Yanqi Zhao, Xiaoyi Yang, Yong Yu, Baodong Qin, Xiaojiang Du, Mohsen Guizani:
Blockchain-Based Auditable Privacy-Preserving Data Classification for Internet of Things. IEEE Internet Things J. 9(4): 2468-2484 (2022) - [j99]Junbin Shi, Yong Yu, Qiming Yu, Huilin Li, Lianhai Wang:
Toward Data Security in 6G Networks: A Public-Key Searchable Encryption Approach. IEEE Netw. 36(4): 166-173 (2022) - [j98]Xiaoyi Yang, Yanqi Zhao, Qian Chen, Yong Yu, Xiaojiang Du, Mohsen Guizani:
Accountable and Verifiable Secure Aggregation for Federated Learning in IoT Networks. IEEE Netw. 36(5): 173-179 (2022) - [j97]Jinhui Liu, Yong Yu, Houzhen Wang, Huanguo Zhang:
Lattice-Based Self-Enhancement Authorized Accessible Privacy Authentication for Cyber-Physical Systems. Secur. Commun. Networks 2022: 8995704:1-8995704:9 (2022) - [j96]Yannan Li, Willy Susilo, Guomin Yang, Yong Yu, Dongxi Liu, Xiaojiang Du, Mohsen Guizani:
A Blockchain-Based Self-Tallying Voting Protocol in Decentralized IoT. IEEE Trans. Dependable Secur. Comput. 19(1): 119-130 (2022) - [j95]Jianbing Ni, Kuan Zhang, Yong Yu, Tingting Yang:
Identity-Based Provable Data Possession From RSA Assumption for Secure Cloud Storage. IEEE Trans. Dependable Secur. Comput. 19(3): 1753-1769 (2022) - [j94]Lianhai Wang, Yannan Li, Qiming Yu, Yong Yu:
Outsourced Data Integrity Checking with Practical Key Update in Edge-Cloud Resilient Networks. IEEE Wirel. Commun. 29(3): 56-62 (2022) - [c39]Yao Wang, Tao Gu, Tom H. Luan, Yong Yu:
Your Breath Doesn't Lie: Multi-user Authentication by Sensing Respiration Using mmWave Radar. SECON 2022: 64-72 - [i9]Yihao Guo, Minghui Xu, Dongxiao Yu, Yong Yu, Rajiv Ranjan, Xiuzhen Cheng:
Cross-Channel: Scalable Off-Chain Channels Supporting Fair and Atomic Cross-Chain Operations. CoRR abs/2212.07265 (2022) - [i8]Haibin Zhang, Sisi Duan, Chao Liu, Boxin Zhao, Xuanji Meng, Shengli Liu, Yong Yu, Fangguo Zhang, Liehuang Zhu:
Practical Asynchronous Distributed Key Generation: Improved Efficiency, Weaker Assumption, and Standard Model. IACR Cryptol. ePrint Arch. 2022: 1678 (2022) - 2021
- [j93]Yunyi Fang, Yanqi Zhao, Yong Yu, Hui Zhu, Xiaojiang Du, Mohsen Guizani:
Blockchain-based privacy-preserving valet parking for self-driving vehicles. Trans. Emerg. Telecommun. Technol. 32(4) (2021) - [j92]Jinhui Liu, Yong Yu, Bo Yang, Jianwei Jia, Qiqi Lai:
Cryptanalysis of Cramer-Shoup Like Cryptosystems Based on Index Exchangeable Family. Int. J. Found. Comput. Sci. 32(1): 73-91 (2021) - [j91]Jinhui Liu, Yong Yu, Kai Li, Le Gao:
Post-Quantum Secure Ring Signatures for Security and Privacy in the Cybertwin-Driven 6G. IEEE Internet Things J. 8(22): 16290-16300 (2021) - [j90]Yu Zhan, Baocang Wang, Rongxing Lu, Yong Yu:
DRBFT: Delegated randomization Byzantine fault tolerance consensus protocol for blockchains. Inf. Sci. 559: 8-21 (2021) - [j89]Yan Li, Lingyan Li, Yanqi Zhao, Nadra Guizani, Yong Yu, Xiaojiang Du:
Toward Decentralized Fair Data Trading Based on Blockchain. IEEE Netw. 35(1): 304-310 (2021) - [j88]Yanqi Zhao, Yong Yu, Ruonan Chen, Yannan Li, Aikui Tian:
Toward Transparent and Accountable Privacy-Preserving Data Classification. IEEE Netw. 35(4): 184-189 (2021) - [j87]Yannan Li, Guomin Yang, Willy Susilo, Yong Yu, Man Ho Au, Dongxi Liu:
Traceable Monero: Anonymous Cryptocurrency with Enhanced Accountability. IEEE Trans. Dependable Secur. Comput. 18(2): 679-691 (2021) - [j86]Huilin Li, Yannan Li, Yong Yu, Baocang Wang, Kefei Chen:
A Blockchain-Based Traceable Self-Tallying E-Voting Protocol in AI Era. IEEE Trans. Netw. Sci. Eng. 8(2): 1019-1032 (2021) - [j85]Wu Chen, Yong Yu, Keke Gai, Jiamou Liu, Kim-Kwang Raymond Choo:
Time-Efficient Ensemble Learning with Sample Exchange for Edge Computing. ACM Trans. Internet Techn. 21(3): 76:1-76:17 (2021) - [j84]Yannan Li, Yong Yu, Willy Susilo, Zhiyong Hong, Mohsen Guizani:
Security and Privacy for Edge Intelligence in 5G and Beyond Networks: Challenges and Solutions. IEEE Wirel. Commun. 28(2): 63-69 (2021) - [j83]Qiliang Yang, Tao Wang, Wenbo Zhang, Bo Yang, Yong Yu, Haiyu Li, Jingyi Wang, Zirui Qiao:
PrivCrowd: A Secure Blockchain-Based Crowdsourcing Framework with Fine-Grained Worker Selection. Wirel. Commun. Mob. Comput. 2021: 3758782:1-3758782:17 (2021) - [c38]Yannan Li, Willy Susilo, Guomin Yang, Tran Viet Xuan Phuong, Yong Yu, Dongxi Liu:
Concise Mercurial Subvector Commitments: Definitions and Constructions. ACISP 2021: 353-371 - [c37]Yannan Li, Willy Susilo, Guomin Yang, Yong Yu, Tran Viet Xuan Phuong, Dongxi Liu:
Non-Equivocation in Blockchain: Double-Authentication-Preventing Signatures Gone Contractual. AsiaCCS 2021: 859-871 - 2020
- [j82]Ruonan Chen, Yannan Li, Yong Yu, Huilin Li, Xiaofeng Chen, Willy Susilo:
Blockchain-Based Dynamic Provable Data Possession for Smart Cities. IEEE Internet Things J. 7(5): 4143-4154 (2020) - [j81]Jinhui Liu, Lianhai Wang, Yong Yu:
Improved Security of a Pairing-Free Certificateless Aggregate Signature in Healthcare Wireless Medical Sensor Networks. IEEE Internet Things J. 7(6): 5256-5266 (2020) - [j80]Yannan Li, Yong Yu, Ruonan Chen, Xiaojiang Du, Mohsen Guizani:
IntegrityChain: Provable Data Possession for Decentralized Storage. IEEE J. Sel. Areas Commun. 38(6): 1205-1217 (2020) - [j79]Yong Yu, Junbin Shi, Huilin Li, Yannan Li, Xiaojiang Du, Mohsen Guizani:
Key-Policy Attribute-Based Encryption With Keyword Search in Virtualized Environments. IEEE J. Sel. Areas Commun. 38(6): 1242-1251 (2020) - [j78]Dong Zheng, Liang Xue, Chao Yu, Yannan Li, Yong Yu:
Toward Assured Data Deletion in Cloud Storage. IEEE Netw. 34(3): 101-107 (2020) - [j77]Gang Han, Yannan Li, Yong Yu, Kim-Kwang Raymond Choo, Nadra Guizani:
Blockchain-Based Self-Tallying Voting System with Software Updates in Decentralized IoT. IEEE Netw. 34(4): 166-172 (2020) - [j76]Yannan Li, Yong Yu, Chunwei Lou, Nadra Guizani, Lianhai Wang:
Decentralized Public Key Infrastructures atop Blockchain. IEEE Netw. 34(6): 133-139 (2020) - [j75]Jianbing Ni, Kuan Zhang, Yong Yu, Xiaodong Lin, Xuemin Sherman Shen:
Providing Task Allocation and Secure Deduplication for Mobile Crowdsensing via Fog Computing. IEEE Trans. Dependable Secur. Comput. 17(3): 581-594 (2020) - [j74]Yong Yu, Yannan Li, Bo Yang, Willy Susilo, Guomin Yang, Jian Bai:
Attribute-Based Cloud Data Integrity Auditing for Secure Outsourced Storage. IEEE Trans. Emerg. Top. Comput. 8(2): 377-390 (2020) - [j73]Yong Yu, Yanqi Zhao, Yannan Li, Xiaojiang Du, Lianhai Wang, Mohsen Guizani:
Blockchain-Based Anonymous Authentication With Selective Revocation for Smart Industrial Applications. IEEE Trans. Ind. Informatics 16(5): 3290-3300 (2020) - [j72]Xiaodong Lin, Mohsen Guizani, Xiaojiang Du, Cheng-Kang Chu, Yong Yu:
Advances of Security and Privacy Techniques in Emerging Wireless Networks. IEEE Wirel. Commun. 27(3): 8-9 (2020)
2010 – 2019
- 2019
- [j71]Yi Zhao, Yong Yu, Bo Yang:
Leakage Resilient CCA Security in Stronger Model: Branch Hidden ABO-LTFs and Their Applications. Comput. J. 62(4): 631-640 (2019) - [j70]Lingyue Zhang, Huilin Li, Yannan Li, Yong Yu, Man Ho Au, Baocang Wang:
An efficient linkable group signature for payer tracing in anonymous cryptocurrencies. Future Gener. Comput. Syst. 101: 29-38 (2019) - [j69]Yong Yu, Guomin Yang, Huaxiong Wang:
Preface: Special Issue Cryptography and Provable Security. Int. J. Found. Comput. Sci. 30(4): 489-492 (2019) - [j68]Yao Wang, Wandong Cai, Tao Gu, Wei Shao, Yannan Li, Yong Yu:
Secure Your Voice: An Oral Airflow-Based Continuous Liveness Detection for Voice Assistants. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 3(4): 157:1-157:28 (2019) - [j67]Yong Yu, Yujie Ding, Yanqi Zhao, Yannan Li, Yi Zhao, Xiaojiang Du, Mohsen Guizani:
LRCoin: Leakage-Resilient Cryptocurrency Based on Bitcoin for Data Trading in IoT. IEEE Internet Things J. 6(3): 4702-4710 (2019) - [j66]Yanqi Zhao, Yong Yu, Yannan Li, Gang Han, Xiaojiang Du:
Machine learning based privacy-preserving fair data trading in big data market. Inf. Sci. 478: 449-460 (2019) - [j65]Liang Xue, Yong Yu, Yannan Li, Man Ho Au, Xiaojiang Du, Bo Yang:
Efficient attribute-based encryption with attribute revocation for assured data deletion. Inf. Sci. 479: 640-650 (2019) - [j64]Yanqi Zhao, Yiming Liu, Aikui Tian, Yong Yu, Xiaojiang Du:
Blockchain based privacy-preserving software updates with proof-of-delivery for Internet of Things. J. Parallel Distributed Comput. 132: 141-149 (2019) - [j63]Yong Yu, Yi Mu:
Advances of Provable Security Techniques. J. Univers. Comput. Sci. 25(3): 154-157 (2019) - [j62]Yong Yu, Huilin Li, Ruonan Chen, Yanqi Zhao, Haomiao Yang, Xiaojiang Du:
Enabling Secure Intelligent Network with Cloud-Assisted Privacy-Preserving Machine Learning. IEEE Netw. 33(3): 82-87 (2019) - [j61]Yong Yu, Ruonan Chen, Huilin Li, Yannan Li, Aikui Tian:
Toward Data Security in Edge Intelligent IIoT. IEEE Netw. 33(5): 20-26 (2019) - [j60]Yannan Li, Willy Susilo, Guomin Yang, Yong Yu, Xiaojiang Du, Dongxi Liu, Nadra Guizani:
Toward Privacy and Regulation in Blockchain-Based Cryptocurrencies. IEEE Netw. 33(5): 111-117 (2019) - [j59]Tao Wang, Bo Yang, Guoyong Qiu, Lina Zhang, Yong Yu, Yanwei Zhou, Juncai Guo:
An Approach Enabling Various Queries on Encrypted Industrial Data Stream. Secur. Commun. Networks 2019: 6293970:1-6293970:12 (2019) - [j58]Tao Wang, Bo Yang, Hongyu Liu, Yong Yu, Guoyong Qiu, Zhe Xia:
An alternative approach to public cloud data auditing supporting data dynamics. Soft Comput. 23(13): 4939-4953 (2019) - [j57]Yannan Li, Yong Yu, Geyong Min, Willy Susilo, Jianbing Ni, Kim-Kwang Raymond Choo:
Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems. IEEE Trans. Dependable Secur. Comput. 16(1): 72-83 (2019) - [c36]Yong Yu, Jia Deng, Yanni Tang, Jiamou Liu, Wu Chen:
Decentralized Ensemble Learning Based on Sample Exchange among Multiple Agents. BSCI 2019: 57-66 - [c35]Yangguang Tian, Yingjiu Li, Binanda Sengupta, Nan Li, Yong Yu:
Anonymous Asynchronous Payment Channel from k-Time Accountable Assertion. CANS 2019: 512-524 - [c34]Qiliang Yang, Yanwei Zhou, Yong Yu:
Leakage-Resilient Certificateless Signcryption Scheme. GLOBECOM Workshops 2019: 1-6 - [c33]Wei Liu, Shuyue Hu, Jiamou Liu, Wu Chen, Siyuan Chen, Yong Yu:
Efficient and Robust Emergence of Conventions through Learning and Staying. ICA 2019: 14-19 - [c32]Jinhui Liu, Yong Yu:
Lattice Based Verifiably Encrypted Double Authentication Preventing Signatures. NSS 2019: 581-595 - [c31]Bin Yu, Jinhui Liu, Ming Lei, Yong Yu, Hao Chen:
Parallel Runtime Verification Approach for Alternate Execution of Multiple Threads. SOFL+MSVL 2019: 99-109 - [i7]Lingyue Zhang, Huilin Li, Yannan Li, Yanqi Zhao, Yong Yu:
An Efficient Linkable Group Signature for Payer Tracing in Anonymous Cryptocurrencies. CoRR abs/1902.03420 (2019) - [i6]Yannan Li, Willy Susilo, Guomin Yang, Yong Yu, Dongxi Liu, Mohsen Guizani:
A Blockchain-based Self-tallying Voting Scheme in Decentralized IoT. CoRR abs/1902.03710 (2019) - [i5]Yanqi Zhao, Yiming Liu, Yong Yu, Yannan Li:
Blockchain based Privacy-Preserving Software Updates with Proof-of-Delivery for Internet of Things. CoRR abs/1902.03712 (2019) - 2018
- [j56]Yanqi Zhao, Yannan Li, Qilin Mu, Bo Yang, Yong Yu:
Secure Pub-Sub: Blockchain-Based Fair Payment With Reputation for Reliable Cyber Physical Systems. IEEE Access 6: 12295-12303 (2018) - [j55]Qiqi Lai, Bo Yang, Yong Yu, Yuan Chen, Jian Bai:
Novel Smooth Hash Proof Systems Based on Lattices. Comput. J. 61(4): 561-574 (2018) - [j54]Jinhui Liu, Yong Yu, Bo Yang, Jianwei Jia, Shijia Wang, Houzhen Wang:
Structural Key Recovery of Simple Matrix Encryption Scheme Family. Comput. J. 61(12): 1880-1896 (2018) - [j53]Chiara Galdi, Michele Nappi, Jean-Luc Dugelay, Yong Yu:
Exploring New Authentication Protocols for Sensitive Data Protection on Smartphones. IEEE Commun. Mag. 56(1): 136-142 (2018) - [j52]Yong Yu, Yannan Li, Xiaojiang Du, Ruonan Chen, Bo Yang:
Content Protection in Named Data Networking: Challenges and Potential Solutions. IEEE Commun. Mag. 56(11): 82-87 (2018) - [j51]Yannan Li, Yong Yu, Bo Yang, Geyong Min, Huai Wu:
Privacy preserving cloud data auditing with efficient key update. Future Gener. Comput. Syst. 78: 789-798 (2018) - [j50]Yong Wang, Xiaoling Tao, Jianbing Ni, Yong Yu:
Data integrity checking with reliable data transfer for secure cloud storage. Int. J. Web Grid Serv. 14(1): 106-121 (2018) - [j49]Qiqi Lai, Bo Yang, Yong Yu, Zhe Xia, Yanwei Zhou, Yuan Chen:
Updatable Identity-Based Hash Proof System Based on Lattices and Its Application to Leakage-Resilient Public-Key Encryption Schemes. J. Comput. Sci. Technol. 33(6): 1243-1260 (2018) - [j48]Yong Yu, Liang Xue, Yannan Li, Xiaojiang Du, Mohsen Guizani, Bo Yang:
Assured Data Deletion With Fine-Grained Access Control for Fog-Based Industrial Applications. IEEE Trans. Ind. Informatics 14(10): 4538-4547 (2018) - [j47]Jianbing Ni, Kuan Zhang, Yong Yu, Xiaodong Lin, Xuemin Shen:
Privacy-Preserving Smart Parking Navigation Supporting Efficient Driving Guidance Retrieval. IEEE Trans. Veh. Technol. 67(7): 6504-6517 (2018) - [j46]Yong Yu, Yannan Li, Junfeng Tian, Jianwei Liu:
Blockchain-Based Solutions to Security and Privacy Issues in the Internet of Things. IEEE Wirel. Commun. 25(6): 12-18 (2018) - [c30]Qiqi Lai, Bo Yang, Yong Yu, Yuan Chen, Liju Dong:
Anonymous Identity-Based Hash Proof System from Lattices in the Standard Model. ACISP 2018: 539-557 - [c29]Jinhui Liu, Yong Yu, Yannan Li, Yanqi Zhao, Xiaojiang Du:
An Efficient Anonymous Authentication Scheme Based on Double Authentication Preventing Signature for Mobile Healthcare Crowd Sensing. Inscrypt 2018: 626-636 - [c28]Yuyang Zhang, Ping Dong, Yong Yu, Xiaojiang Du, Hongbin Luo, Tao Zheng, Mohsen Guizani:
A Bignum Network Coding Scheme for Multipath Transmission in Vehicular Networks. GLOBECOM 2018: 206-212 - [c27]Yangguang Tian, Yingjiu Li, Yinghui Zhang, Nan Li, Guomin Yang, Yong Yu:
DSH: Deniable Secret Handshake Framework. ISPEC 2018: 341-353 - [c26]Jinhui Liu, Yong Yu, Yanqi Zhao, Jianwei Jia, Shijia Wang:
An Efficient Privacy Preserving Batch Authentication Scheme with Deterable Function for VANETs. NSS 2018: 288-303 - [i4]Yong Yu, Liang Xue, Yannan Li, Xiaojiang Du, Mohsen Guizani, Bo Yang:
Assured Data Deletion with Fine-grained Access Control for Fog-based Industrial Applications. CoRR abs/1804.02834 (2018) - [i3]Yong Yu, Yujie Ding, Yanqi Zhao, Yannan Li, Xiaojiang Du, Mohsen Guizani:
LRCoin: Leakage-resilient Cryptocurrency Based on Bitcoin for Data Trading in IoT. CoRR abs/1810.11175 (2018) - [i2]Yong Yu, Yannan Li, Xiaojiang Du, Ruonan Chen, Bo Yang:
Content Protection in Named Data Networking: Challenges and Potential Solutions. CoRR abs/1810.11179 (2018) - 2017
- [j45]Jianhong Zhang, Hongxin Meng, Yong Yu:
Achieving public verifiability and data dynamics for cloud data in the standard model. Clust. Comput. 20(3): 2641-2653 (2017) - [j44]Yong Yu, Atsuko Miyaji, Man Ho Au, Willy Susilo:
Cloud computing security and privacy: Standards and regulations. Comput. Stand. Interfaces 54: 1-2 (2017) - [j43]Hongyu Liu, Yi Mu, Jining Zhao, Chunxiang Xu, Huaqun Wang, Leiting Chen, Yong Yu:
Identity-based provable data possession revisited: Security analysis and generic construction. Comput. Stand. Interfaces 54: 10-19 (2017) - [j42]Yangguang Tian, Guomin Yang, Yi Mu, Shiwei Zhang, Kaitai Liang, Yong Yu:
One-Round Attribute-Based Key Exchange in the Multi-Party Setting. Int. J. Found. Comput. Sci. 28(6): 725-742 (2017) - [j41]Li Zang, Yong Yu, Liang Xue, Yannan Li, Yujie Ding, Xiaoling Tao:
Improved dynamic remote data auditing protocol for smart city security. Pers. Ubiquitous Comput. 21(5): 911-921 (2017) - [j40]Weiwei Liu, Yi Mu, Guomin Yang, Yong Yu:
Efficient E-coupon systems with strong user privacy. Telecommun. Syst. 64(4): 695-708 (2017) - [j39]Yong Yu, Man Ho Au, Giuseppe Ateniese, Xinyi Huang, Willy Susilo, Yuanshun Dai, Geyong Min:
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage. IEEE Trans. Inf. Forensics Secur. 12(4): 767-778 (2017) - [j38]Willy Susilo, Peng Jiang, Fuchun Guo, Guomin Yang, Yong Yu, Yi Mu:
EACSIP: Extendable Access Control System With Integrity Protection for Enhancing Collaboration in the Cloud. IEEE Trans. Inf. Forensics Secur. 12(12): 3110-3122 (2017) - [c25]