Jia Yu

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Growing simplicial complex with face dimension selection and preferential attachment
Chaos
2025-01-14Paper
Nonlocal numerical simulation of thermoelectric coupling field by using peridynamic differential operator
ZAMP. Zeitschrift für angewandte Mathematik und Physik
2024-08-08Paper
Privacy-preserving Boolean range query with verifiability and forward security over spatio-textual data
Information Sciences
2024-07-01Paper
Enabling privacy-preserving non-interactive computation for Hamming distance
Information Sciences
2024-05-27Paper
Reliability evaluation for a class of recursive match networks
Theoretical Computer Science
2024-02-23Paper
Enhancing fault tolerance of balanced hypercube networks by the edge partition method
Theoretical Computer Science
2024-01-16Paper
Symmetric-key based proofs of retrievability supporting public verification
Computer Security -- ESORICS 2015
2022-08-19Paper
Connectivity and constructive algorithms of disjoint paths in dragonfly networks
Theoretical Computer Science
2022-06-13Paper
Lattice-based weak-key analysis on single-server outsourcing protocols of modular exponentiations and basic countermeasures
Journal of Computer and System Sciences
2021-07-06Paper
Blockchain-based two-party fair contract signing scheme
Information Sciences
2021-05-03Paper
Enabling cloud storage auditing with key-exposure resilience under continual key-leakage
Information Sciences
2021-03-31Paper
How to securely outsource the extended Euclidean algorithm for large-scale polynomials over finite fields
Information Sciences
2021-03-18Paper
Intrusion-resilient identity-based signatures: concrete scheme in the standard model and generic construction
Information Sciences
2020-09-08Paper
The reliability analysis of \(k\)-ary \(n\)-cube networks
Theoretical Computer Science
2020-08-17Paper
Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data
Information Sciences
2020-02-07Paper
Key-insulated aggregate signature
Frontiers of Computer Science
2018-12-19Paper
IRIBE: intrusion-resilient identity-based encryption
Information Sciences
2018-05-22Paper
One forward-secure signature scheme using bilinear maps and its applications
Information Sciences
2017-01-31Paper
Cloud storage integrity checking scheme with private key recovery capability
 
2017-01-06Paper
scientific article; zbMATH DE number 6611879 (Why is no real title available?)
 
2016-08-10Paper
Minimum channel capacity required for stability of Markov jump systems based on nonstochastic information theory
 
2015-10-28Paper
A multidimensional information model for managing construction information
Journal of Industrial and Management Optimization
2015-06-23Paper
Enabling polarisation filtering in wireless communications: models, algorithms and characteristics
IET Communications
2013-10-18Paper
New forward-secure signature scheme with untrusted update
 
2012-10-26Paper
Forward-secure identity-based public-key encryption without random oracles
Fundamenta Informaticae
2012-05-04Paper
A verifiable multi-secret-sharing scheme based on homogeneous linear recursion
 
2011-09-29Paper
An efficient fault-tolerant routing algorithm in bijective connection networks with restricted faulty edges
Theoretical Computer Science
2011-07-14Paper
Efficient unicast in bijective connection networks with the restricted faulty node set
Information Sciences
2011-06-22Paper
Embedding meshes into twisted-cubes
Information Sciences
2011-06-22Paper
Forward-secure identity-based signature: security notions and construction
Information Sciences
2011-01-28Paper
A local construction of the Smith normal form of a matrix polynomial
Journal of Symbolic Computation
2010-11-19Paper
Improved generalized Atkin algorithm for computing square roots in finite fields
Information Processing Letters
2010-01-18Paper
Workflow Scheduling Algorithms for Grid Computing
Studies in Computational Intelligence
2009-02-13Paper
Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps
Provable Security
2009-01-27Paper
Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005
Provable Security
2009-01-27Paper
A new proactive secret sharing scheme
 
2008-06-03Paper
New Left-to-Right Radix-r Signed-Digit Recoding Algorithm for Pairing-Based Cryptosystems
Lecture Notes in Computer Science
2007-11-13Paper
Protecting Against Key Escrow and Key Exposure in Identity-Based Cryptosystem
Lecture Notes in Computer Science
2007-11-13Paper
Verifiable secret redistribution for proactive secret sharing schemes
Journal of Shanghai Jiaotong University (Science)
2006-11-15Paper
An efficient forward secure signature scheme
Journal of Shanghai Jiaotong University (Science)
2006-11-15Paper


Research outcomes over time


This page was built for person: Jia Yu