Остановите войну!
for scientists:
default search action
Jia Yu 0003
Person information
- affiliation: Nanjing University of Information Science & Technology, Nanjing, China
- affiliation: Qingdao University, Qingdao, China
- affiliation: Shandong University, Jinan, China
Other persons with the same name
- Jia Yu — disambiguation page
- Jia Yu 0001 — Arizona State University, Tempe, AZ, USA
- Jia Yu 0002 — Northwestern Polytechnical University, Xi'an, China
- Jia Yu 0004 — Nanyang Technological University, Singapore
- Jia Yu 0005 — Qingdao University, Qingdao, China (and 1 more)
- Jia Yu 0006 — Harbin Institute of Technology, Shenzhen, China
- Jia Yu 0007 — Shanghai Normal University, China (and 1 more)
- Jia Yu 0008 — University of California Riverside, CA, USA
- Jia Yu 0009 — University of Melbourne, VIC, Australia
- Jia Yu 0010 — Huazhong University of Science and Technology, Wuhan, China
- Jia Yu 0011 — Minzu University of China, Beijing, China
- Jia Yu 0012 — Hohai University, Nanjing, China
- Jia Yu 0013 — University of New South Wales, Sydney, Australia
- Jia Yu 0014 — Administrative College of JiangSu Province, Nanjing, China
- Jia Yu 0015 — University of California, Department of Mathematics, Berkeley, CA, USA
- Jia Yu 0016 — Ocean University of China, Qingdao, China
- Jia Yu 0017 — Seeburger China Inc., Shanghai, China
- Jia Yu 0018 — China Electronics Technology Cyber Security Co., Ltd.
- Jia Yu 0019 — University of Jinan, Jinan, China
- Jia Yu 0020 — Washington State University, USA (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Xuan Zhao, Jia Yu, Xinrui Ge, Rong Hao:
Towards efficient Secure Boolean Range Query over encrypted spatial data. Comput. Secur. 136: 103544 (2024)
2010 – 2019
- 2018
- [j15]Jia Yu, Rong Hao, Hui Xia, Hanlin Zhang, Xiangguo Cheng, Fanyu Kong:
Intrusion-resilient identity-based signatures: Concrete scheme in the standard model and generic construction. Inf. Sci. 442-443: 158-172 (2018) - 2017
- [j14]Wenting Shen, Guangyang Yang, Jia Yu, Hanlin Zhang, Fanyu Kong, Rong Hao:
Remote data possession checking with privacy-preserving authenticators for cloud storage. Future Gener. Comput. Syst. 76: 136-145 (2017) - [j13]Xiuxiu Jiang, Xinrui Ge, Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao:
An Efficient Symmetric Searchable Encryption Scheme for Cloud Storage. J. Internet Serv. Inf. Secur. 7(2): 1-18 (2017) - [c16]Fanyu Kong, Dashui Zhou, Yali Jiang, Jianwei Shang, Jia Yu:
Fault Attack on an Improved CRT-RSA Algorithm with the Modulus Chaining Method. CSE/EUC (1) 2017: 866-869 - 2015
- [c15]Xiuxiu Jiang, Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao:
A Novel Privacy Preserving Keyword Search Scheme over Encrypted Cloud Data. 3PGCIC 2015: 836-839 - [c14]Fanyu Kong, Jie Wang, Jia Yu, Xu An Wang:
Analysis and Improvement of a Verifiable Phrase Search over Encrypted Data in a Single Phrase. 3PGCIC 2015: 840-843 - 2014
- [j12]Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Guowen Li:
One forward-secure signature scheme using bilinear maps and its applications. Inf. Sci. 279: 60-76 (2014) - 2012
- [j11]Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Jianxi Fan:
Erratum to the paper: Forward-Secure Identity-Based Public-Key Encryption without Random Oracles. Fundam. Informaticae 114(1): 103 (2012) - [j10]Jia Yu, Fanyu Kong, Huawei Zhao, Xiangguo Cheng, Rong Hao, Xiang-Fa Guo:
Non-Interactive Forward-Secure Threshold Signature without Random Oracles. J. Inf. Sci. Eng. 28(3): 571-586 (2012) - [j9]Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Jianxi Fan:
Intrusion-resilient identity-based signature: Security definition and construction. J. Syst. Softw. 85(2): 382-391 (2012) - 2011
- [j8]Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Jianxi Fan:
Forward-Secure Identity-Based Public-Key Encryption without Random Oracles. Fundam. Informaticae 111(2): 241-256 (2011) - [j7]Jia Yu, Rong Hao, Fanyu Kong, Xiangguo Cheng, Jianxi Fan, Yangkui Chen:
Forward-secure identity-based signature: Security notions and construction. Inf. Sci. 181(3): 648-660 (2011) - [j6]Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Jianxi Fan:
New Forward-Secure Signature Scheme with Untrusted Update. J. Inf. Sci. Eng. 27(4): 1435-1448 (2011) - [c13]Fanyu Kong, Jia Yu, Lei Wu:
Security Analysis of an RSA Key Generation Algorithm with a Large Private Key. ISC 2011: 95-101 - [c12]Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao:
Two Protocols for Member Revocation in Secret Sharing Schemes. PAISI 2011: 64-70 - 2010
- [j5]Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Yangkui Chen, Xuliang Li, Guowen Li:
Forward-Secure Multisignature, Threshold Signature and Blind Signature Schemes. J. Networks 5(6): 634-641 (2010)
2000 – 2009
- 2009
- [j4]Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao:
A Forward Secure Threshold Signature Scheme Based on the Structure of Binary Tree. J. Softw. 4(1): 73-80 (2009) - [c11]Fanyu Kong, Jia Yu:
Number-Theoretic Attack on Lyuu-Wu's Multi-proxy Multi-signature Scheme. IAS 2009: 666-668 - 2008
- [j3]Jia Yu, Fanyu Kong, Rong Hao, Dexiang Zhang, Guowen Li:
How to Construct Forward Secure Single-Server, Multi-Server and Threshold-Server Assisted Signature Schemes Using Bellare-Miner Scheme. J. Commun. 3(7): 28-35 (2008) - [j2]Jia Yu, Fanyu Kong, Rong Hao, Xuliang Li, Guowen Li:
Publicly Verifiable Secret Sharing Member-join Protocol For Threshold Signatures. J. Commun. 3(7): 36-43 (2008) - [c10]Jia Yu, Fanyu Kong, Rong Hao, Dexiang Zhang:
Construction of Server-assisted Forward Secure Signature Using Bellare-Miner Scheme. ISECS 2008: 558-561 - [c9]Jia Yu, Fanyu Kong, Rong Hao, Xuliang Li:
How to Publicly Verifiably Expand a Member without Changing Old Shares in a Secret Sharing Scheme. ISI Workshops 2008: 138-148 - [c8]Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Guowen Li:
Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps. ProvSec 2008: 83-97 - [c7]Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Guowen Li:
Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005. ProvSec 2008: 176-184 - [c6]Jia Yu, Fanyu Kong, Rong Hao, Zhen Cheng:
A Publicly Verifiable Dynamic Sharing Protocol for Data Secure Storage. WAIM 2008: 471-472 - 2007
- [c5]Fanyu Kong, Jia Yu, Baodong Qin, Daxing Li:
Cryptanalysis of Server-Aided RSA Key Generation Protocols at MADNES 2005. ATC 2007: 52-60 - [c4]Jia Yu, Fanyu Kong, Rong Hao:
Publicly Verifiable Secret Sharing with Enrollment Ability. SNPD (3) 2007: 194-199 - [c3]Fanyu Kong, Jia Yu, Baodong Qin, Ming Li, Daxing Li:
Security Analysis and Improvement of a ($t, n$) Threshold Proxy Signature Scheme. SNPD (3) 2007: 923-926 - [c2]Fanyu Kong, Jia Yu, Zhun Cai, Daxing Li:
New Left-to-Right Radix- r Signed-Digit Recoding Algorithm for Pairing-Based Cryptosystems. TAMC 2007: 189-198 - 2006
- [j1]Fanyu Kong, Zhun Cai, Jia Yu, Daxing Li:
Improved generalized Atkin algorithm for computing square roots in finite fields. Inf. Process. Lett. 98(1): 1-5 (2006) - [c1]Jia Yu, Fanyu Kong, Rong Hao:
Forward Secure Threshold Signature Scheme from Bilinear Pairings. CIS 2006: 587-597
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-02 23:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint