default search action
Lin You
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j37]Qiang Zhu, Lin You, Gengran Hu, Wei-Nan Liu:
BIAS: A novel secure and efficient biometric-based anonymous authentication scheme. Comput. Networks 254: 110754 (2024) - [j36]Chunjie Guo, Lin You, Xingyu Li, Gengran Hu, Shengguo Wang, Chengtang Cao:
A novel biometric authentication scheme with privacy protection based on SVM and ZKP. Comput. Secur. 144: 103995 (2024) - [j35]Qiang Zhu, Lin You, Gengran Hu, Shengguo Wang:
Secure and Efficient Biometric-Based Anonymous Authentication Scheme for Mobile-Edge Computing. IEEE Internet Things J. 11(20): 33604-33623 (2024) - [j34]Zhiyuan Rao, Lin You, Gengran Hu, Fei Zhu:
EBDTS: An Efficient BCoT-Based Data Trading System Using PUF for Authentication. IEEE Trans. Netw. Serv. Manag. 21(5): 5795-5808 (2024) - 2023
- [j33]Weibiao Liang, Lin You, Gengran Hu:
LRS_PKI: A novel blockchain-based PKI framework using linkable ring signatures. Comput. Networks 237: 110043 (2023) - [j32]Chengtang Cao, Lin You, Gengran Hu:
A Novel Linkable Ring Signature on Ideal Lattices. Entropy 25(2): 237 (2023) - [j31]Di Bao, Lin You:
Two-factor identity authentication scheme based on blockchain and fuzzy extractor. Soft Comput. 27(2): 1091-1103 (2023) - [j30]Lin You, Zhuobiao Wang, Gengran Hu, Chengtang Cao, Liang Li:
An Improved Model on the Vague Sets-Based DPoS's Voting Phase in Blockchain. IEEE Trans. Netw. Sci. Eng. 10(6): 4010-4019 (2023) - [j29]Xingyu Li, Ziyu Zheng, Pengyu Cheng, Jin Li, Lin You:
MACT: A multi-channel anonymous consensus based on Tor. World Wide Web (WWW) 26(3): 1005-1029 (2023) - [c17]Wang Cheng, Lin You, Gengran Hu:
A Multi-server Authentication Scheme Based on Fuzzy Extractor. ICA3PP (1) 2023: 488-500 - [c16]Zhuobiao Wang, Gengran Hu, Lin You:
An Improved Model of PBFT with Anonymity and Proxy Based on Linkable Ring Signature. ICA3PP (5) 2023: 491-502 - 2022
- [j28]Houyu Zheng, Lin You, Gengran Hu:
A novel insurance claim blockchain scheme based on zero-knowledge proof technology. Comput. Commun. 195: 207-216 (2022) - [j27]Cong Deng, Lin You, Xianghong Tang, Gengran Hu, Shuhong Gao:
Cuproof: Range Proof with Constant Size. Entropy 24(3): 334 (2022) - [j26]Xingbing Fu, Yinglun Wang, Lin You, Jianting Ning, Ziquan Hu, Fagen Li:
Offline/Online lattice-based ciphertext policy attribute-based encryption. J. Syst. Archit. 130: 102684 (2022) - [j25]Xinhua Zhang, Lin You, Gengran Hu:
An Efficient and Robust Multidimensional Data Aggregation Scheme for Smart Grid Based on Blockchain. IEEE Trans. Netw. Serv. Manag. 19(4): 3949-3959 (2022) - [j24]Hangguan Qian, Lin You:
A Multipath Payment Scheme Supporting Proof of Payment. Wirel. Commun. Mob. Comput. 2022: 9911915:1-9911915:7 (2022) - [i3]Lin You, Yan Wang, Liang Li, Gengran Hu:
Secure Two-party Computation Approach for NTRUEncrypt. IACR Cryptol. ePrint Arch. 2022: 386 (2022) - 2021
- [j23]Xiwei Shan, Lin You, Gengran Hu:
Two Efficient Constructions for Biometric-Based Signature in Identity-Based Setting Using Bilinear Pairings. IEEE Access 9: 25973-25983 (2021) - [j22]Gengran Hu, Lin You, Liang Li, Liqin Hu, Hui Wang:
Random Integer Lattice Generation via the Hermite Normal Form. Entropy 23(11): 1509 (2021) - [j21]Guojia Li, Lin You, Gengran Hu, Liqin Hu:
Recoverable Private Key Scheme for Consortium Blockchain Based on Verifiable Secret Sharing. KSII Trans. Internet Inf. Syst. 15(8): 2865-2878 (2021) - [j20]Peiyi Wang, Lin You, Gengran Hu, Liqin Hu, Zhihua Jian, Chaoping Xing:
Biometric key generation based on generated intervals and two-layer error correcting technique. Pattern Recognit. 111: 107733 (2021) - [j19]Miqi Wu, Lin You, Gengran Hu, Liang Li, Chengtang Cao:
A Blockchain-Based Hierarchical Authentication Scheme for Multiserver Architecture. Secur. Commun. Networks 2021: 5592119:1-5592119:20 (2021) - [j18]Yingjie Xu, Gengran Hu, Lin You, Chengtang Cao:
A Novel Machine Learning-Based Analysis Model for Smart Contract Vulnerability. Secur. Commun. Networks 2021: 5798033:1-5798033:12 (2021) - [j17]Chengtang Cao, Lin You, Gengran Hu:
Fuzzy Identity-Based Ring Signature from Lattices. Secur. Commun. Networks 2021: 6692608:1-6692608:9 (2021) - [j16]Guojia Li, Lin You:
A Consortium Blockchain Wallet Scheme Based on Dual-Threshold Key Sharing. Symmetry 13(8): 1444 (2021) - [i2]Cong Deng, Xianghong Tang, Lin You, Gengran Hu:
Cuproof: A Novel Range Proof with Constant Size. IACR Cryptol. ePrint Arch. 2021: 127 (2021) - 2020
- [j15]Wu Lei, Lin You:
A Novel Dynamic Fingerprint Segmentation Method Based on Fuzzy C-Means and Genetic Algorithm. IEEE Access 8: 132694-132702 (2020) - [j14]Lin You, Ersong Yang, Guangyi Wang:
A novel parallel image encryption algorithm based on hybrid chaotic maps with OpenCL implementation. Soft Comput. 24(16): 12413-12427 (2020) - [i1]Gengran Hu, Lin You, Liqin Hu, Hui Wang:
Random Integer Lattice Generation via HNF. IACR Cryptol. ePrint Arch. 2020: 208 (2020)
2010 – 2019
- 2019
- [j13]Lin You, Ting Wang:
A novel fuzzy vault scheme based on fingerprint and finger vein feature fusion. Soft Comput. 23(11): 3843-3851 (2019) - [c15]Tingting Lan, Hui Wang, Lin You:
A Secure Authentication Scheme Based on Chen's Chaotic System and Finger Vein's Auxiliary Data. CSS (2) 2019: 462-476 - 2018
- [j12]Lin You, Yulei Chen, Bin Yan, Meng Zhan:
A novel location-based encryption model using fuzzy vault scheme. Soft Comput. 22(10): 3383-3393 (2018) - [c14]Lin You, Xun Li:
A Cancelable Multi-Biometric Template Generation Algorithm Based on Bloom Filter. ICA3PP (3) 2018: 547-559 - [c13]Jiahao Liang, Lin You:
Secure Biometric Authentication Scheme Based on Chaotic Map. ICA3PP (4) 2018: 643-653 - 2017
- [j11]Jean Raphael Ngnie Sighom, Pin Zhang, Lin You:
Security Enhancement for Data Migration in the Cloud. Future Internet 9(3): 23 (2017) - [j10]Yuan Luo, Chaoping Xing, Lin You:
Construction of Sequences With High Nonlinear Complexity From Function Fields. IEEE Trans. Inf. Theory 63(12): 7646-7650 (2017) - [c12]Bin Yan, Lin You:
A novel public key encryption model based on transformed biometrics. DSC 2017: 424-428 - 2016
- [j9]Lin You, Yuna Wang, Yulei Chen, Qi Deng, Huanhuan Zhang:
A Novel Key Sharing Fuzzy Vault Scheme. KSII Trans. Internet Inf. Syst. 10(9): 4585-4602 (2016) - [j8]Lin You, Jiawan Wang, Bin Yan:
A Secure Finger Vein Recognition Algorithm Based on MB-GLBP and Logistic Mapping. J. Inf. Hiding Multim. Signal Process. 7(6): 1231-1242 (2016) - [j7]Zhendong Wu, Bin Liang, Lin You, Zhihua Jian, Jin Li:
High-dimension space projection-based biometric encryption for fingerprint with fuzzy minutia. Soft Comput. 20(12): 4907-4918 (2016) - 2015
- [j6]Lin You, Younan Yuan, Wangke Yu, Qiuhua Wang:
A Key Distribution Scheme for WSN Based on Hash Chains and Deployment Knowledge. Int. J. Distributed Sens. Networks 11: 640792:1-640792:12 (2015) - [j5]Qiuhua Wang, Xiaojun Wang, Qiuyun Lv, Xueyi Ye, Yi Luo, Lin You:
Analysis of the information theoretically secret key agreement by public discussion. Secur. Commun. Networks 8(15): 2507-2523 (2015) - 2014
- [j4]Lin You, Yilin Yang, Shuhong Gao, Yongxuan Sang:
Fast Scalar Multiplications on the Curve v2 = up - au - b over the Finite Field of Characteristic p. Fundam. Informaticae 129(4): 395-412 (2014) - [c11]Bin Liang, Zhendong Wu, Lin You:
A Novel Fingerprint-Based Biometric Encryption. 3PGCIC 2014: 146-150 - 2013
- [j3]Lin You, Shuhong Gao, Hui Xue:
Characteristic polynomials of the curve v2 0 up- au-b over finite fields of characteristic p. Finite Fields Their Appl. 21: 35-49 (2013) - 2012
- [c10]Lin You, Mengsheng Fan, Jie Lu, Shengguo Wang, Fenghai Li:
A Key Sharing Fuzzy Vault Scheme. ICICS 2012: 453-460 - [c9]Lin You, Jie Lu:
A Novel Fuzzy Vault Scheme for Secret Key Exchange. SECRYPT 2012: 426-429 - 2011
- [j2]Qunying Liao, Lin You:
Low complexity of a class of normal bases over finite fields. Finite Fields Their Appl. 17(1): 1-14 (2011) - [c8]Xiaohui Fu, Lin You:
A fast algorithm for decoding algebraic geometry codes with the displacement rank. ICIS 2011: 73-76 - 2010
- [j1]Lin You, Jiwen Zeng:
Fast Scalar Multiplications on Hyperelliptic Curve Cryptosystems. Informatica (Slovenia) 34(2): 227-236 (2010) - [c7]Lin You, Fugeng Zeng:
The number of the isomorphism classes of hyperelliptic curves of genus four over finite fields. IAS 2010: 161-166 - [c6]Heng Dong, Qiming Qin, Lin You, Xinxin Sui, Jun Li, Hongbo Jiang, Jinliang Wang, Haixia Feng, Hongmei Sun:
Models for estimating Leaf Area Index of different crops using hyperspectral data. IGARSS 2010: 3283-3286 - [c5]Lin You, Qiming Qin, Heng Dong, Jun Li, Jinliang Wang, Xuebin Yang:
The component-based design and development of remote sensing system for drought monitoring. IGARSS 2010: 3849-3852
2000 – 2009
- 2009
- [c4]Jianqin Zhou, Wei Xiong, Zemao Zhao, Lin You:
The Tight Error Linear Complexity of Periodic Sequences. CIS (2) 2009: 197-201 - [c3]Shaohua Zhao, Qiming Qin, Lin You, Yunjun Yao, Nan Yang, Jianping Li:
Application of Two Shortwave Infrared Water Stress Indices to Drought Monitoring over Northwestern China. IGARSS (3) 2009: 530-533 - [c2]Hongbo Jiang, Qiming Qin, Ning Zhang, Shaohua Zhao, Lin You, Heng Dong:
A Comparative Study on Snow Cover Monitoring of Different Spatial Resolution Remote Sensing Images. IGARSS (2) 2009: 567-570 - 2001
- [c1]Lin You, Yixian Yang, Chun Qi Zhang:
Generalization of Elliptic Curve Digital Signature Schemes. ICICS 2001: 246-250
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint