


Остановите войну!
for scientists:


default search action
Jia Yu 0005
Person information

- affiliation: Qingdao University, Qingdao, China
- affiliation: Nanjing University of Information Science & Technology, Nanjing, China
Other persons with the same name
- Jia Yu — disambiguation page
- Jia Yu 0001
— Arizona State University, Tempe, AZ, USA
- Jia Yu 0002 — Northwestern Polytechnical University, Xi'an, China
- Jia Yu 0003 — Nanjing University of Information Science & Technology, Nanjing, China (and 2 more)
- Jia Yu 0004 — Nanyang Technological University, Singapore
- Jia Yu 0006
— Harbin Institute of Technology, Shenzhen, China
- Jia Yu 0007
— Shanghai Normal University, China (and 1 more)
- Jia Yu 0008 — University of California Riverside, CA, USA
- Jia Yu 0009 — University of Melbourne, VIC, Australia
- Jia Yu 0010 — Huazhong University of Science and Technology, Wuhan, China
- Jia Yu 0011
— Minzu University of China, Beijing, China
- Jia Yu 0012 — Hohai University, Nanjing, China
- Jia Yu 0013 — University of New South Wales, Sydney, Australia
- Jia Yu 0014 — Administrative College of JiangSu Province, Nanjing, China
- Jia Yu 0015 — University of California, Department of Mathematics, Berkeley, CA, USA
- Jia Yu 0016 — Ocean University of China, Qingdao, China
- Jia Yu 0017 — Seeburger China Inc., Shanghai, China
- Jia Yu 0018 — China Electronics Technology Cyber Security Co., Ltd.
- Jia Yu 0019 — University of Jinan, Jinan, China
- Jia Yu 0020 — Washington State University, USA (and 1 more)
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j81]Linhao Cong, Jia Yu, Xinrui Ge:
Privacy preserving subgraph isomorphism query for dynamic graph database. J. Netw. Comput. Appl. 211: 103562 (2023) - [j80]Hongjun Li
, Jia Yu
, Jianxi Fan
, Yihai Pi:
DSOS: A Distributed Secure Outsourcing System for Edge Computing Service in IoT. IEEE Trans. Syst. Man Cybern. Syst. 53(1): 238-250 (2023) - 2022
- [j79]Mengjie Lv, Jianxi Fan, Jingya Zhou, Jia Yu, Xiaohua Jia:
The Reliability of k-Ary n-Cube Based on Component Connectivity. Comput. J. 65(8): 2197-2208 (2022) - [j78]Haiyang Liu, Hanlin Zhang
, Li Guo, Jia Yu, Jie Lin:
Privacy-Preserving cloud-Aided broad learning system. Comput. Secur. 112: 102503 (2022) - [j77]Xin Sun, Chengliang Tian
, Changhui Hu, Weizhong Tian, Hanlin Zhang, Jia Yu:
Privacy-Preserving and verifiable SRC-based face recognition with cloud/edge server assistance. Comput. Secur. 118: 102740 (2022) - [j76]Li Guo, Jia Yu, Ming Yang
, Fanyu Kong:
Privacy-Preserving Convolution Neural Network Inference with Edge-assistance. Comput. Secur. 123: 102910 (2022) - [j75]Yaru Liu, Jia Yu
, Ming Yang
, Wenqiang Hou, Huaqun Wang:
Towards fully verifiable forward secure privacy preserving keyword search for IoT outsourced data. Future Gener. Comput. Syst. 128: 178-191 (2022) - [j74]Linhao Cong, Jia Yu
, Xinrui Ge:
Enabling efficient privacy-preserving subgraph isomorphic query over graphs. Future Gener. Comput. Syst. 132: 1-10 (2022) - [j73]Xiulan Li
, Jingguo Bi, Chengliang Tian
, Hanlin Zhang
, Jia Yu
, Yanbin Pan
:
An Improved Outsourcing Algorithm to Solve Quadratic Congruence Equations in Internet of Things. IEEE Internet Things J. 9(9): 6790-6802 (2022) - [j72]Hongjun Li
, Jia Yu
, Ming Yang, Fanyu Kong
:
Secure Outsourcing of Large-Scale Convex Optimization Problem in Internet of Things. IEEE Internet Things J. 9(11): 8737-8748 (2022) - [j71]Hongjun Li
, Fanyu Kong
, Jia Yu
:
Secure Outsourcing for Normalized Cuts of Large-Scale Dense Graph in Internet of Things. IEEE Internet Things J. 9(14): 12711-12722 (2022) - [j70]Tian Li
, Huaqun Wang
, Debiao He
, Jia Yu
:
Blockchain-Based Privacy-Preserving and Rewarding Private Data Sharing for IoT. IEEE Internet Things J. 9(16): 15138-15149 (2022) - [j69]Wenjing Gao, Jia Yu
, Ming Yang, Huaqun Wang
:
Enabling Privacy-Preserving Parallel Outsourcing Matrix Inversion in IoT. IEEE Internet Things J. 9(17): 15915-15927 (2022) - [j68]Yuhang Shao, Chengliang Tian
, Lidong Han
, Hequn Xian, Jia Yu
:
Privacy-Preserving and Verifiable Cloud-Aided Disease Diagnosis and Prediction With Hyperplane Decision-Based Classifier. IEEE Internet Things J. 9(21): 21648-21661 (2022) - [j67]Hanlin Zhang
, Jia Yu
, Mohammad S. Obaidat
, Pandi Vijayakumar
, Linqiang Ge
, Jie Lin
, Jianxi Fan
, Rong Hao
:
Secure Edge-Aided Computations for Social Internet-of-Things Systems. IEEE Trans. Comput. Soc. Syst. 9(1): 76-87 (2022) - [j66]Xiang Gao
, Jia Yu
, Yan Chang, Huaqun Wang
, Jianxi Fan
:
Checking Only When It Is Necessary: Enabling Integrity Auditing Based on the Keyword With Sensitive Information Privacy for Encrypted Cloud Data. IEEE Trans. Dependable Secur. Comput. 19(6): 3774-3789 (2022) - [j65]Tian Li
, Huaqun Wang
, Debiao He
, Jia Yu
:
Synchronized Provable Data Possession Based on Blockchain for Digital Twin. IEEE Trans. Inf. Forensics Secur. 17: 472-485 (2022) - [j64]Yaru Liu
, Jia Yu
, Jianxi Fan
, Pandi Vijayakumar
, Victor Chang
:
Achieving Privacy-Preserving DSSE for Intelligent IoT Healthcare System. IEEE Trans. Ind. Informatics 18(3): 2010-2020 (2022) - [j63]Xinrui Ge
, Jia Yu
, Rong Hao
, Haibin Lv:
Verifiable Keyword Search Supporting Sensitive Information Hiding for the Cloud-Based Healthcare Sharing System. IEEE Trans. Ind. Informatics 18(8): 5573-5583 (2022) - [j62]Xinrui Ge
, Guofu Wei, Jia Yu
, Amit Kumar Singh
, Neal N. Xiong
:
An Intelligent Fuzzy Phrase Search Scheme Over Encrypted Network Data for IoT. IEEE Trans. Netw. Sci. Eng. 9(2): 377-388 (2022) - [j61]Hanlin Zhang
, Peng Gao, Jia Yu
, Jie Lin
, Neal N. Xiong
:
Machine Learning on Cloud With Blockchain: A Secure, Verifiable and Fair Approach to Outsource the Linear Regression. IEEE Trans. Netw. Sci. Eng. 9(6): 3956-3967 (2022) - [j60]Chengliang Tian
, Jia Yu
, Hanlin Zhang, Haiyang Xue, Cong Wang
, Kui Ren:
Novel Secure Outsourcing of Modular Inversion for Arbitrary and Variable Modulus. IEEE Trans. Serv. Comput. 15(1): 241-253 (2022) - [j59]Xinrui Ge
, Jia Yu
, Hanlin Zhang
, Jianli Bai, Jianxi Fan
, Neal N. Xiong
:
SPPS: A Search Pattern Privacy System for Approximate Shortest Distance Query of Encrypted Graphs in IIoT. IEEE Trans. Syst. Man Cybern. Syst. 52(1): 136-150 (2022) - [c14]Hongjun Li, Fanyu Kong, Jia Yu, Hanlin Zhang, Luhong Diao, Yunting Tao:
Privacy-Preserving and Verifiable Outsourcing Message Transmission and Authentication Protocol in IoT. TrustCom 2022: 556-564 - 2021
- [j58]Mengjie Lv, Baolei Cheng, Jianxi Fan, Xi Wang, Jingya Zhou, Jia Yu:
The Conditional Reliability Evaluation of Data Center Network BCDC. Comput. J. 64(9): 1451-1464 (2021) - [j57]Fangyuan Sun
, Jia Yu, Xinrui Ge
, Ming Yang
, Fanyu Kong:
Constrained top-k nearest fuzzy keyword queries on encrypted graph in road network. Comput. Secur. 111: 102456 (2021) - [j56]Peng Gao, Hanlin Zhang
, Jia Yu
, Jie Lin
, Xiaopeng Wang, Ming Yang, Fanyu Kong:
Secure Cloud-Aided Object Recognition on Hyperspectral Remote Sensing Images. IEEE Internet Things J. 8(5): 3287-3299 (2021) - [j55]Tian Li
, Huaqun Wang
, Debiao He
, Jia Yu
:
Permissioned Blockchain-Based Anonymous and Traceable Aggregate Signature Scheme for Industrial Internet of Things. IEEE Internet Things J. 8(10): 8387-8398 (2021) - [j54]Xinrui Ge
, Jia Yu
, Fei Chen
, Fanyu Kong, Huaqun Wang
:
Toward Verifiable Phrase Search Over Encrypted Cloud-Based IoT Data. IEEE Internet Things J. 8(16): 12902-12918 (2021) - [j53]Hanlin Zhang
, Le Tong, Jia Yu
, Jie Lin
:
Blockchain-Aided Privacy-Preserving Outsourcing Algorithms of Bilinear Pairings for Internet of Things Devices. IEEE Internet Things J. 8(20): 15596-15607 (2021) - [j52]Xiang Gao
, Jia Yu
, Wenting Shen, Yan Chang, Shibin Zhang, Ming Yang, Bin Wu:
Achieving low-entropy secure cloud data auditing with file and authenticator deduplication. Inf. Sci. 546: 177-191 (2021) - [j51]Yunhai Zheng, Chengliang Tian, Hanlin Zhang, Jia Yu, Fengjun Li
:
Lattice-based weak-key analysis on single-server outsourcing protocols of modular exponentiations and basic countermeasures. J. Comput. Syst. Sci. 121: 18-33 (2021) - [j50]Huaqun Wang
, Debiao He, Jia Yu, Neal N. Xiong, Bin Wu
:
RDIC: A blockchain-based remote data integrity checking scheme for IoT in 5G networks. J. Parallel Distributed Comput. 152: 1-10 (2021) - [j49]Yan Xu
, Long Ding, Jie Cui
, Hong Zhong
, Jia Yu
:
PP-CSA: A Privacy-Preserving Cloud Storage Auditing Scheme for Data Sharing. IEEE Syst. J. 15(3): 3730-3739 (2021) - [j48]Wenting Shen
, Jing Qin
, Jia Yu
, Rong Hao
, Jiankun Hu
, Jixin Ma
:
Data Integrity Auditing without Private Key Storage for Secure Cloud Storage. IEEE Trans. Cloud Comput. 9(4): 1408-1421 (2021) - [j47]Xueli Sun, Jianxi Fan, Baolei Cheng, Zhao Liu, Jia Yu:
Component conditional fault tolerance of hierarchical folded cubic networks. Theor. Comput. Sci. 883: 44-58 (2021) - [j46]Xinrui Ge
, Jia Yu
, Hanlin Zhang
, Chengyu Hu
, Zengpeng Li
, Zhan Qin, Rong Hao
:
Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification. IEEE Trans. Dependable Secur. Comput. 18(1): 490-504 (2021) - [j45]Jia Yu
, Rong Hao
:
Comments on "SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage". IEEE Trans. Serv. Comput. 14(6): 2090-2092 (2021) - [c13]Yunting Tao, Fanyu Kong, Jia Yu, Qiuliang Xu:
Modification and Performance Improvement of Paillier Homomorphic Cryptosystem. EUC 2021: 131-136 - [i3]Hanlin Zhang, Peng Gao, Jia Yu, Jie Lin, Neal N. Xiong:
Machine Learning on Cloud with Blockchain: A Secure, Verifiable and Fair Approach to Outsource the Linear Regression. CoRR abs/2101.02334 (2021) - [i2]Hanlin Zhang, Le Tong, Jia Yu, Jie Lin:
Blockchain Aided Privacy-Preserving Outsourcing Algorithms of Bilinear Pairings for Internet of Things Devices. CoRR abs/2101.02341 (2021) - [i1]Haiyang Liu, Hanlin Zhang, Li Guo, Jia Yu, Jie Lin:
Privacy-Preserving Cloud-Aided Broad Learning System. CoRR abs/2101.02826 (2021) - 2020
- [j44]Hanlin Zhang, Jia Yu
, Chengliang Tian
, Guobin Xu
, Peng Gao, Jie Lin
:
Practical and Secure Outsourcing Algorithms for Solving Quadratic Congruences in Internet of Things. IEEE Internet Things J. 7(4): 2968-2981 (2020) - [j43]Hanlin Zhang, Jia Yu
, Chengliang Tian
, Le Tong, Jie Lin
, Linqiang Ge
, Huaqun Wang
:
Efficient and Secure Outsourcing Scheme for RSA Decryption in Internet of Things. IEEE Internet Things J. 7(8): 6868-6881 (2020) - [j42]Hongjun Li
, Jia Yu
, Hanlin Zhang, Ming Yang, Huaqun Wang
:
Privacy-Preserving and Distributed Algorithms for Modular Exponentiation in IoT With Edge Computing Assistance. IEEE Internet Things J. 7(9): 8769-8779 (2020) - [j41]Qiang Zhou, Chengliang Tian
, Hanlin Zhang, Jia Yu
, Fengjun Li
:
How to securely outsource the extended euclidean algorithm for large-scale polynomials over finite fields. Inf. Sci. 512: 641-660 (2020) - [j40]Chengyu Hu, Yuqin Xu, Pengtao Liu, Jia Yu
, Shanqing Guo, Minghao Zhao
:
Enabling cloud storage auditing with key-exposure resilience under continual key-leakage. Inf. Sci. 520: 15-30 (2020) - [j39]Liang Zhang, Hanlin Zhang
, Jia Yu
, Hequn Xian
:
Blockchain-based two-party fair contract signing scheme. Inf. Sci. 535: 142-155 (2020) - [j38]Qianqian Su, Rong Hao, Shaoxia Duan, Fanyu Kong, Xiaodong Liu, Jia Yu:
Secure Computation Outsourcing for Inversion in Finite Field. J. Internet Serv. Inf. Secur. 10(2): 35-48 (2020) - [j37]Jianli Bai, Jia Yu
, Xiang Gao
:
Secure auditing and deduplication for encrypted cloud data supporting ownership modification. Soft Comput. 24(16): 12197-12214 (2020) - [j36]Mengjie Lv, Jianxi Fan, Guo Chen, Baolei Cheng, Jingya Zhou
, Jia Yu:
The reliability analysis of k-ary n-cube networks. Theor. Comput. Sci. 835: 1-14 (2020) - [j35]Yue Zhang
, Jia Yu
, Rong Hao
, Cong Wang
, Kui Ren:
Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data. IEEE Trans. Dependable Secur. Comput. 17(3): 608-619 (2020) - [j34]Pu Zhao
, Jia Yu
, Hanlin Zhang, Zhan Qin, Cong Wang
:
How to Securely Outsource Finding the Min-Cut of Undirected Edge-Weighted Graphs. IEEE Trans. Inf. Forensics Secur. 15: 315-328 (2020)
2010 – 2019
- 2019
- [j33]Shengxia Zhang, Chengliang Tian
, Hanlin Zhang, Jia Yu
, Fengjun Li
:
Practical and Secure Outsourcing Algorithms of Matrix Operations Based on a Novel Matrix Encryption Method. IEEE Access 7: 53823-53838 (2019) - [j32]Huaqun Wang
, Debiao He, Jia Yu:
Privacy-preserving incentive and rewarding scheme for crowd computing in social media. Inf. Sci. 470: 15-27 (2019) - [j31]Pu Zhao, Jia Yu, Hanlin Zhang:
Secure Outsourcing Algorithm for Signature Generation in Privacy-preserving Public Cloud Storage Auditing. J. Inf. Sci. Eng. 35(3): 635-650 (2019) - [j30]Huiying Hou, Jia Yu, Rong Hao:
Cloud storage auditing with deduplication supporting different security levels according to data popularity. J. Netw. Comput. Appl. 134: 26-39 (2019) - [j29]Wenting Shen, Jing Qin, Jia Yu
, Rong Hao, Jiankun Hu
:
Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage. IEEE Trans. Inf. Forensics Secur. 14(2): 331-346 (2019) - [j28]Huaqun Wang
, Debiao He
, Jia Yu
, Zhiwei Wang
:
Incentive and Unconditionally Anonymous Identity-Based Public Provable Data Possession. IEEE Trans. Serv. Comput. 12(5): 824-835 (2019) - [c12]Le Tong, Jia Yu, Hanlin Zhang:
Secure Outsourcing Algorithm for Bilinear Pairings without Pre-Computation. DSC 2019: 1-7 - 2018
- [j27]Hanlin Zhang, Jia Yu
, Chengliang Tian, Pu Zhao, Guobin Xu, Jie Lin:
Cloud Storage for Electronic Health Records Based on Secret Sharing With Verifiable Reconstruction Outsourcing. IEEE Access 6: 40713-40722 (2018) - [j26]Xinrui Ge
, Jia Yu
, Chengyu Hu
, Hanlin Zhang, Rong Hao:
Enabling Efficient Verifiable Fuzzy Keyword Search Over Encrypted Data in Cloud Computing. IEEE Access 6: 45725-45739 (2018) - [j25]Huiying Hou, Jia Yu, Hanlin Zhang, Yan Xu, Rong Hao:
Enabling secure auditing and deduplicating data without owner-relationship exposure in cloud storage. Clust. Comput. 21(4): 1849-1863 (2018) - [j24]Huiying Hou, Jia Yu, Rong Hao:
Provable Multiple-Replica Dynamic Data Possession for Big Data Storage in Cloud Computing. Int. J. Netw. Secur. 20(3): 575-584 (2018) - 2017
- [j23]Xiuxiu Jiang, Jia Yu, Jingbo Yan, Rong Hao:
Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data. Inf. Sci. 403: 22-41 (2017) - [j22]Wenting Shen, Jia Yu, Hui Xia, Hanlin Zhang, Xiuqing Lu, Rong Hao:
Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium. J. Netw. Comput. Appl. 82: 56-64 (2017) - [j21]Qianqian Su, Jia Yu, Chengliang Tian, Hanlin Zhang, Rong Hao:
How to securely outsource the inversion modulo a large composite number. J. Syst. Softw. 129: 26-34 (2017) - [j20]Jia Yu
, Huaqun Wang
:
Strong Key-Exposure Resilient Auditing for Secure Cloud Storage. IEEE Trans. Inf. Forensics Secur. 12(8): 1931-1940 (2017) - 2016
- [j19]Wenting Shen, Jia Yu, Rong Hao, Xu An Wang
:
A public cloud storage auditing scheme for resource-constrained clients. Int. J. High Perform. Syst. Archit. 6(3): 121-130 (2016) - [j18]Hui Xia, Ruihua Zhang, Jia Yu, Zhenkuan Pan:
Energy-Efficient Routing Algorithm Based on Unequal Clustering and Connected Graph in Wireless Sensor Networks. Int. J. Wirel. Inf. Networks 23(2): 141-150 (2016) - [j17]Jia Yu, Rong Hao, Huawei Zhao, Minglei Shu, Jianxi Fan:
IRIBE: Intrusion-resilient identity-based encryption. Inf. Sci. 329: 90-104 (2016) - [j16]Wenting Shen, Jia Yu, Guangyang Yang, Yue Zhang, Zhangjie Fu, Rong Hao:
Access-Authorizing and Privacy-Preserving Auditing with Group Dynamic for Shared Cloud Data. KSII Trans. Internet Inf. Syst. 10(7): 3319-3338 (2016) - [j15]Hui Xia, Jia Yu, Chengliang Tian, Zhenkuan Pan, Edwin Hsing-Mean Sha:
Light-weight trust-enhanced on-demand multi-path routing in mobile ad hoc networks. J. Netw. Comput. Appl. 62: 112-127 (2016) - [j14]Guangyang Yang, Jia Yu, Wenting Shen, Qianqian Su, Zhangjie Fu, Rong Hao:
Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability. J. Syst. Softw. 113: 130-139 (2016) - [j13]Jia Yu, Kui Ren
, Cong Wang
:
Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates. IEEE Trans. Inf. Forensics Secur. 11(6): 1362-1375 (2016) - [j12]Hui Xia, Jia Yu, Zhenkuan Pan, Xiangguo Cheng, Edwin Hsing-Mean Sha:
Applying trust enhancements to reactive routing protocols in mobile ad hoc networks. Wirel. Networks 22(7): 2239-2257 (2016) - [j11]Jia Yu, Hui Xia, Huawei Zhao, Rong Hao, Zhangjie Fu, Xiangguo Cheng:
Forward-Secure Identity-Based Signature Scheme in Untrusted Update Environments. Wirel. Pers. Commun. 86(3): 1467-1491 (2016) - [c11]Wenting Shen, Jia Yu, Hui Xia, Rong Hao:
A Note on "IPad: ID-Based Public Auditing for the Outsourced Data in the Standard Model". ICCCS (1) 2016: 335-342 - 2015
- [j10]Jia Yu, Kui Ren
, Cong Wang
, Vijay Varadharajan
:
Enabling Cloud Storage Auditing With Key-Exposure Resistance. IEEE Trans. Inf. Forensics Secur. 10(6): 1167-1179 (2015) - [c10]Wenting Shen, Jia Yu, Rong Hao, Xu An Wang
:
A Public Cloud Storage Auditing Scheme with Lightweight Authenticator Generation. 3PGCIC 2015: 36-39 - [c9]Chaowen Guan, Kui Ren
, Fangguo Zhang, Florian Kerschbaum, Jia Yu:
Symmetric-Key Based Proofs of Retrievability Supporting Public Verification. ESORICS (1) 2015: 203-223 - 2014
- [j9]Huiyan Zhao, Jia Yu, Shaoxia Duan, Xiangguo Cheng, Rong Hao:
Key-insulated aggregate signature. Frontiers Comput. Sci. 8(5): 837-846 (2014) - [c8]Hui Xia, Jia Yu, Zhiyong Zhang, Xiangguo Cheng, Zhenkuan Pan:
Trust-Enhanced Multicast Routing Protocol Based on Node's Behavior Assessment for MANETs. TrustCom 2014: 473-480 - 2013
- [j8]Jia Yu, Rong Hao, Xiangguo Cheng:
Security analysis and improvement of two verifiable multi-secret sharing schemes. Int. J. Secur. Networks 8(4): 200-206 (2013) - [j7]Xiangguo Cheng, Shaojie Zhou, Lifeng Guo, Jia Yu, Huiran Ma:
An ID-Based Short Group Signature Scheme. J. Softw. 8(3): 554-559 (2013) - 2012
- [j6]Xiangguo Cheng, Shaojie Zhou, Jia Yu, Xin Li, Huiran Ma:
A Practical ID-Based Group Signature Scheme. J. Comput. 7(11): 2650-2654 (2012) - 2011
- [j5]Jianxi Fan, Xiaohua Jia
, Xin Liu, Shukui Zhang, Jia Yu:
Efficient unicast in bijective connection networks with the restricted faulty node set. Inf. Sci. 181(11): 2303-2315 (2011) - [j4]Xi Wang, Jianxi Fan, Xiaohua Jia
, Shukui Zhang, Jia Yu:
Embedding meshes into twisted-cubes. Inf. Sci. 181(14): 3085-3099 (2011) - [j3]Xiangguo Cheng, Chen Yang, Jia Yu:
A New Approach to Group Signature Schemes. J. Comput. 6(4): 812-817 (2011) - [j2]Xiangguo Cheng, Lifeng Guo, Chen Yang, Jia Yu:
ID-Based Sequential Aggregate Signatures. J. Softw. 6(12): 2495-2499 (2011) - [j1]Jianxi Fan, Xiaohua Jia
, Baolei Cheng, Jia Yu:
An efficient fault-tolerant routing algorithm in bijective connection networks with restricted faulty edges. Theor. Comput. Sci. 412(29): 3440-3450 (2011)
2000 – 2009
- 2007
- [c7]Guowen Li, Jia Yu, Rupeng Li, Daxing Li:
Two Threshold Multisignature Schemes from Bilinear Pairings. MUE 2007: 1041-1045 - [c6]Rupeng Li, Jia Yu, Guowen Li, Daxing Li:
A New Identity-Based Blind Signature Scheme with Batch Verifications. MUE 2007: 1051-1056 - [c5]Rupeng Li, Xianghua Du, Guowen Li, Jia Yu, Daxing Li:
Key-Insulated Group Signature Scheme with Selective Revocation. MUE 2007: 1057-1063 - [c4]Rupeng Li, Jia Yu, Jin Wang, Guowen Li, Daxing Li:
Key-Insulated Group Signature Scheme with Verifier-Local Revocation. SNPD (3) 2007: 273-278 - [c3]Guowen Li, Jia Yu, Rupeng Li, Daxing Li:
An Approach to Convert Any Threshold Signature into a Threshold Group Signature. SNPD (2) 2007: 723-726 - [c2]Jin Wang, Xi Bai, Jia Yu, Daxing Li:
Protecting Against Key Escrow and Key Exposure in Identity-Based Cryptosystem. TAMC 2007: 148-158 - 2006
- [c1]Jin Wang, Jia Yu, Daxing Li, Xi Bai, Zhongtian Jia:
Combining User Authentication with Role-Based Authorazition Based on Identity-Based Signature. CIS 2006: 847-857
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-05-22 01:41 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint