default search action
Yanjiang Yang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c52]Hongqing Liu, Chaoping Xing, Yanjiang Yang, Chen Yuan:
Ramp Hyper-invertible Matrices and Their Applications to MPC Protocols. ASIACRYPT (1) 2023: 204-236 - [i5]Hongqing Liu, Chaoping Xing, Yanjiang Yang, Chen Yuan:
Ramp hyper-invertible matrices and their applications to MPC protocols. IACR Cryptol. ePrint Arch. 2023: 1369 (2023) - 2021
- [j29]Haibing Lu, Xi Chen, Qi Liu, Michele Samorani, Guojie Song, Yanjiang Yang:
Stochastic Workflow Authorizations With Queueing Constraints. IEEE Trans. Dependable Secur. Comput. 18(4): 1605-1619 (2021)
2010 – 2019
- 2019
- [j28]Xi Chen, Cheng Fang, Jasmine Chang, Yanjiang Yang, Yuan Hong, Haibing Lu:
Chinese address standardisation via hybrid approach combining statistical and rule-based methods. Int. J. Internet Enterp. Manag. 9(2): 179-193 (2019) - [j27]Christian Esposito, Aniello Castiglione, Flavio Frattini, Marcello Cinque, Yanjiang Yang, Kim-Kwang Raymond Choo:
On Data Sovereignty in Cloud-Based Computation Offloading for Smart Cities Applications. IEEE Internet Things J. 6(3): 4521-4535 (2019) - 2018
- [j26]Jiannong Cao, Aniello Castiglione, Giovanni Motta, Florin Pop, Yanjiang Yang, Wanlei Zhou:
Human-Driven Edge Computing and Communication: Part 2. IEEE Commun. Mag. 56(2): 134-135 (2018) - [j25]Zhuo Wei, Yongdong Wu, Yanjiang Yang, Zheng Yan, Qingqi Pei, Yajuan Xie, Jian Weng:
AutoPrivacy: Automatic privacy protection and tagging suggestion for mobile social photo. Comput. Secur. 76: 341-353 (2018) - [c51]Hsiao-Ying Lin, Zhuo Wei, Yanjiang Yang, Yadong Wei, Kang Tang, Qingdi Sha:
AnchorCAN: Anchor-Based Secure CAN Communications System. DSC 2018: 1-7 - 2017
- [j24]Zhuo Wei, Yanjiang Yang, Yongdong Wu, Jian Weng, Robert H. Deng:
HIBS-KSharing: Hierarchical Identity-Based Signature Key Sharing for Automotive. IEEE Access 5: 16314-16323 (2017) - [j23]Jiannong Cao, Aniello Castiglione, Giovanni Motta, Florin Pop, Yanjiang Yang, Wanlei Zhou:
Human-Driven Edge Computing and Communication: Part 1. IEEE Commun. Mag. 55(11): 70-71 (2017) - [j22]Rui Xu, Kirill Morozov, Yanjiang Yang, Jianying Zhou, Tsuyoshi Takagi:
Efficient outsourcing of secure k-nearest neighbour query over encrypted database. Comput. Secur. 69: 65-83 (2017) - [j21]Yujue Wang, HweeHwa Pang, Yanjiang Yang, Xuhua Ding:
Secure server-aided top-k monitoring. Inf. Sci. 420: 345-363 (2017) - [j20]Yanjiang Yang, Zhuo Wei, Youcheng Zhang, Haibing Lu, Kim-Kwang Raymond Choo, Haibin Cai:
V2X security: A case study of anonymous authentication. Pervasive Mob. Comput. 41: 259-269 (2017) - [c50]Yanjiang Yang, Joseph K. Liu, Zhuo Wei, Xinyi Huang:
Towards Revocable Fine-Grained Encryption of Cloud Data: Reducing Trust upon Cloud. ACISP (1) 2017: 127-144 - [c49]Zhuo Wei, Yanjiang Yang, Rehana Yasmin, Yongdong Wu, Jian Weng, Robert H. Deng:
IoVShield: An Efficient Vehicular Intrusion Detection System for Self-driving (Short Paper). ISPEC 2017: 638-647 - 2016
- [j19]Nurul Hidayah Ab Rahman, William Bradley Glisson, Yanjiang Yang, Kim-Kwang Raymond Choo:
Forensic-by-Design Framework for Cyber-Physical Cloud Systems. IEEE Cloud Comput. 3(1): 50-59 (2016) - [j18]Yanjiang Yang, Haiyan Zhu, Haibing Lu, Jian Weng, Youcheng Zhang, Kim-Kwang Raymond Choo:
Cloud based data sharing with fine-grained proxy re-encryption. Pervasive Mob. Comput. 28: 122-134 (2016) - [c48]Rui Xu, Kirill Morozov, Yanjiang Yang, Jianying Zhou, Tsuyoshi Takagi:
Privacy-Preserving k-Nearest Neighbour Query on Outsourced Database. ACISP (1) 2016: 181-197 - [c47]Yanjiang Yang, Haibin Cai, Zhuo Wei, Haibing Lu, Kim-Kwang Raymond Choo:
Towards Lightweight Anonymous Entity Authentication for IoT Applications. ACISP (1) 2016: 265-280 - [c46]Yanjiang Yang, Haibing Lu, Joseph K. Liu, Jian Weng, Youcheng Zhang, Jianying Zhou:
Credential Wrapping: From Anonymous Password Authentication to Anonymous Biometric Authentication. AsiaCCS 2016: 141-151 - [c45]Zhuo Wei, Yanjiang Yang, Tieyan Li:
Authenticated CAN Communications Using Standardized Cryptographic Techniques. ISPEC 2016: 330-343 - 2015
- [j17]Haibing Lu, Yuan Hong, Yanjiang Yang, Lian Duan, Nazia Badar:
Towards user-oriented RBAC model. J. Comput. Secur. 23(1): 107-129 (2015) - [j16]Jian Weng, Yunlei Zhao, Robert H. Deng, Shengli Liu, Yanjiang Yang, Kouichi Sakurai:
A note on the security of KHL scheme. Theor. Comput. Sci. 602: 1-6 (2015) - [c44]Yanjiang Yang, Joseph K. Liu, Kaitai Liang, Kim-Kwang Raymond Choo, Jianying Zhou:
Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data. ESORICS (2) 2015: 146-166 - [c43]Yanjiang Yang, Jiqiang Lu, Kim-Kwang Raymond Choo, Joseph K. Liu:
On Lightweight Security Enforcement in Cyber-Physical Systems. LightSec 2015: 97-112 - [e1]Moti Yung, Liehuang Zhu, Yanjiang Yang:
Trusted Systems - 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers. Lecture Notes in Computer Science 9473, Springer 2015, ISBN 978-3-319-27997-8 [contents] - 2014
- [j15]Zhiguo Wan, Guilin Wang, Yanjiang Yang, Shenxing Shi:
SKM: Scalable Key Management for Advanced Metering Infrastructure in Smart Grids. IEEE Trans. Ind. Electron. 61(12): 7055-7066 (2014) - [c42]Haibing Lu, Yuan Hong, Yanjiang Yang, Yi Fang, Lian Duan:
Dynamic Workflow Adjustment with Security Constraints. DBSec 2014: 211-226 - [c41]Yanjiang Yang, Haibing Lu, Jian Weng, Youcheng Zhang, Kouichi Sakurai:
Fine-Grained Conditional Proxy Re-Encryption and Application. ProvSec 2014: 206-222 - 2013
- [c40]Haibing Lu, Yuan Hong, Yanjiang Yang, Lian Duan, Nazia Badar:
Towards User-Oriented RBAC Model. DBSec 2013: 81-96 - [c39]Yanjiang Yang, Xuhua Ding, Haibing Lu, Jian Weng, Jianying Zhou:
Self-blindable Credential: Towards Anonymous Entity Authentication Upon Resource Constrained Devices. ISC 2013: 238-247 - [c38]Yanjiang Yang, Xuhua Ding, Haibing Lu, Zhiguo Wan, Jianying Zhou:
Achieving Revocable Fine-Grained Cryptographic Access Control over Cloud Data. ISC 2013: 293-308 - [c37]Junzuo Lai, Robert H. Deng, Yanjiang Yang, Jian Weng:
Adaptable Ciphertext-Policy Attribute-Based Encryption. Pairing 2013: 199-214 - [i4]Yanjiang Yang, Xuhua Ding, Haibing Lu, Jian Weng:
Self-blindable Credential: Towards LightWeight Anonymous Entity Authentication. IACR Cryptol. ePrint Arch. 2013: 207 (2013) - 2012
- [c36]Yanjiang Yang, Haibing Lu, Jian Weng, Xuhua Ding, Jianying Zhou:
A Generic Approach for Providing Revocation Support in Secret Handshake. ICICS 2012: 276-284 - 2011
- [j14]Xu An Wang, Jian Weng, Xiaoyuan Yang, Yanjiang Yang:
Cryptanalysis of an identity based broadcast encryption scheme without random oracles. Inf. Process. Lett. 111(10): 461-464 (2011) - [j13]Yanjiang Yang, Jianying Zhou, Robert H. Deng, Feng Bao:
Better security enforcement in trusted computing enabled heterogeneous wireless sensor networks. Secur. Commun. Networks 4(1): 11-22 (2011) - [j12]Xuhua Ding, Yanjiang Yang, Robert H. Deng:
Database Access Pattern Protection Without Full-Shuffles. IEEE Trans. Inf. Forensics Secur. 6(1): 189-201 (2011) - [c35]Yanjiang Yang:
Towards Multi-user Private Keyword Search for Cloud Computing. IEEE CLOUD 2011: 758-759 - [c34]Yanjiang Yang, Haibing Lu, Jian Weng:
Multi-User Private Keyword Search for Cloud Computing. CloudCom 2011: 264-271 - [c33]Yanjiang Yang, Youcheng Zhang:
A Generic Scheme for Secure Data Sharing in Cloud. ICPP Workshops 2011: 145-153 - 2010
- [j11]Jian Weng, Min-Rong Chen, Yanjiang Yang, Robert H. Deng, Kefei Chen, Feng Bao:
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles. Sci. China Inf. Sci. 53(3): 593-606 (2010) - [j10]Xuhua Ding, Yanjiang Yang, Robert H. Deng, Shuhong Wang:
A new hardware-assisted PIR with O(n) shuffle cost. Int. J. Inf. Sec. 9(4): 237-252 (2010) - [j9]Joseph K. Liu, Joonsang Baek, Jianying Zhou, Yanjiang Yang, Jun Wen Wong:
Efficient online/offline identity-based signature for wireless sensor network. Int. J. Inf. Sec. 9(4): 287-296 (2010) - [j8]Yanjiang Yang, Yingjiu Li, Robert H. Deng, Feng Bao:
Shifting Inference Control to User Side: Architecture and Protocol. IEEE Trans. Dependable Secur. Comput. 7(2): 189-202 (2010) - [c32]Yanjiang Yang, Feng Bao:
Enabling Use of Single Password over Multiple Servers in Two-Server Model. CIT 2010: 846-850 - [c31]Yanjiang Yang, Jianying Zhou, Jun Wen Wong, Feng Bao:
Towards practical anonymous password authentication. ACSAC 2010: 59-68 - [c30]Sherman S. M. Chow, Jian Weng, Yanjiang Yang, Robert H. Deng:
Efficient Unidirectional Proxy Re-Encryption. AFRICACRYPT 2010: 316-332 - [c29]Liang Gu, Yao Guo, Yanjiang Yang, Feng Bao, Hong Mei:
Modeling TCG-Based Secure Systems with Colored Petri Nets. INTRUST 2010: 67-86 - [c28]Yanjiang Yang, Liang Gu, Feng Bao:
Addressing Leakage of Re-encryption Key in Proxy Re-encryption Using Trusted Computing. INTRUST 2010: 189-199 - [c27]Bing Liang, Kevin Chiew, Yingjiu Li, Yanjiang Yang:
Privacy Disclosure Analysis and Control for 2D Contingency Tables Containing Inaccurate Data. Privacy in Statistical Databases 2010: 1-16 - [i3]Joseph K. Liu, Joonsang Baek, Jianying Zhou, Yanjiang Yang, Jun Wen Wong:
Efficient Online/Offline Identity-Based Signature for Wireless Sensor Network. IACR Cryptol. ePrint Arch. 2010: 3 (2010) - [i2]Jian Weng, Min-Rong Chen, Yanjiang Yang, Robert H. Deng, Kefei Chen, Feng Bao:
CCA-Secure Unidirectional Proxy Re-Encryption in the Adaptive Corruption Model without Random Oracles. IACR Cryptol. ePrint Arch. 2010: 265 (2010)
2000 – 2009
- 2009
- [j7]Yanjiang Yang, Feng Bao, Xuhua Ding, Robert H. Deng:
Multiuser private queries over encrypted databases. Int. J. Appl. Cryptogr. 1(4): 309-319 (2009) - [j6]Yanjiang Yang, Robert H. Deng, Feng Bao:
Privacy-preserving rental services using one-show anonymous credentials. Secur. Commun. Networks 2(6): 531-545 (2009) - [j5]Robert H. Deng, Yanjiang Yang:
A study of content authentication in proxy-enabled multimedia delivery systems: Model, techniques, and applications. ACM Trans. Multim. Comput. Commun. Appl. 5(4): 28:1-28:20 (2009) - [c26]Yanjiang Yang, Jianying Zhou, Jian Weng, Feng Bao:
A New Approach for Anonymous Password Authentication. ACSAC 2009: 199-208 - [c25]Yanjiang Yang, Jian Weng, Jianying Zhou, Ying Qiu:
Optionally Identifiable Private Handshakes. Inscrypt 2009: 164-178 - [c24]Ying Qiu, Feng Bao, Yongdong Wu, Yanjiang Yang:
A Lightweight Fast Handover Authentication Scheme in Mobile Networks. ICC 2009: 1-5 - [c23]Yanjiang Yang, Jianying Zhou, Robert H. Deng, Feng Bao:
Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks. ICICS 2009: 135-149 - [c22]Yanjiang Yang, Robert H. Deng, Jianying Zhou, Ying Qiu:
Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing. ISPEC 2009: 384-395 - [c21]Jian Weng, Yanjiang Yang, Qiang Tang, Robert H. Deng, Feng Bao:
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security. ISC 2009: 151-166 - [c20]Yanjiang Yang, Feng Bao, Jian Weng:
Private handshakes with optional accountability. LCN 2009: 245-248 - [c19]Yanjiang Yang, Yingjiu Li, Jian Weng, Jianying Zhou, Feng Bao:
Self-enforcing Private Inference Control. ProvSec 2009: 260-274 - [c18]Yanjiang Yang, Jianying Zhou, Robert H. Deng, Feng Bao:
Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks. SecureComm 2009: 285-295 - [i1]Sherman S. M. Chow, Jian Weng, Yanjiang Yang, Robert H. Deng:
Efficient Unidirectional Proxy Re-Encryption. IACR Cryptol. ePrint Arch. 2009: 189 (2009) - 2008
- [c17]Yanjiang Yang, Feng Bao, Robert H. Deng:
Efficient Client-to-Client Password Authenticated Key Exchange. EUC (2) 2008: 202-207 - [c16]Feng Bao, Robert H. Deng, Xuhua Ding, Yanjiang Yang:
Private Query on Encrypted Data in Multi-user Settings. ISPEC 2008: 71-85 - [c15]Yanjiang Yang, Xuhua Ding, Robert H. Deng, Feng Bao:
An Efficient PIR Construction Using Trusted Hardware. ISC 2008: 64-79 - 2007
- [c14]Yanjiang Yang, Yingjiu Li, Robert H. Deng:
New Paradigm of Inference Control with Trusted Computing. DBSec 2007: 243-258 - [c13]Yanjiang Yang, Robert H. Deng, Feng Bao:
Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers. ISPEC 2007: 177-192 - [c12]Robert H. Deng, Yanjiang Yang:
Achieving End-to-End Authentication in Intermediary-Enabled Multimedia Delivery Systems. ISPEC 2007: 284-300 - 2006
- [j4]Yanjiang Yang, Robert H. Deng, Feng Bao:
A Practical Password-Based Two-Server Authentication and Key Exchange System. IEEE Trans. Dependable Secur. Comput. 3(2): 105-114 (2006) - [c11]Yanjiang Yang, Robert H. Deng, Feng Bao:
Fortifying password authentication in integrated healthcare delivery systems. AsiaCCS 2006: 255-265 - [c10]Yanjiang Yang, Robert H. Deng, Feng Bao:
Practical private data matching deterrent to spoofing attacks. CIKM 2006: 852-853 - 2005
- [j3]Feng Bao, Robert H. Deng, Beng Chin Ooi, Yanjiang Yang:
Tailored reversible watermarking schemes for authentication of electronic clinical atlas. IEEE Trans. Inf. Technol. Biomed. 9(4): 554-563 (2005) - [c9]Yanjiang Yang, Feng Bao, Robert H. Deng:
Security Analysis and Fix of an Anonymous Credential System. ACISP 2005: 537-547 - [c8]Elisa Bertino, Beng Chin Ooi, Yanjiang Yang, Robert H. Deng:
Privacy and Ownership Preserving of Outsourced Medical Data. ICDE 2005: 521-532 - [c7]Yanjiang Yang, Beng Chin Ooi:
A Privacy Preserving Rental System. ISC 2005: 59-73 - [c6]Yanjiang Yang, Feng Bao, Robert H. Deng:
A New Architecture for User Authentication and Key Exchange Using Password for Federated Enterprises. SEC 2005: 95-112 - 2004
- [j2]Yanjiang Yang, Shuhong Wang, Feng Bao, Jie Wang, Robert H. Deng:
New efficient user identification and key distribution scheme providing enhanced security. Comput. Secur. 23(8): 697-704 (2004) - [j1]Yanjiang Yang, Xiaoxi Han, Feng Bao, Robert H. Deng:
A smart-card-enabled privacy preserving E-prescription system. IEEE Trans. Inf. Technol. Biomed. 8(1): 47-58 (2004) - [c5]Bok-Min Goi, Raphael Chung-Wei Phan, Yanjiang Yang, Feng Bao, Robert H. Deng, M. U. Siddiqi:
Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity. ACNS 2004: 369-382 - 2003
- [c4]Yanjiang Yang, Feng Bao:
An invertible watermarking scheme for authentication of Electronic Clinical Brain Atlas. ICASSP (3) 2003: 533-536 - [c3]Yanjiang Yang, Zhenlan Wang, Feng Bao, Robert H. Deng:
Secure the image-based simulated telesurgery system. ISCAS (2) 2003: 596-599 - [c2]Yanjiang Yang, Feng Bao, Robert H. Deng:
Flexible authentication of images. VCIP 2003: 1905-1911 - 2002
- [c1]Yanjiang Yang, Feng Bao, Robert H. Deng:
Security Analysis and Improvement of the Global Key Recovery System. ACISP 2002: 17-24
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:06 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint