Yingjiu Li

From MaRDI portal
(Redirected from Person:244650)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
A practical forward-secure DualRing2024-06-05Paper
M-EDESE: multi-domain, easily deployable, and efficiently searchable encryption
Information Security Practice and Experience
2023-08-04Paper
DSH: Deniable Secret Handshake Framework
Information Security Practice and Experience
2023-06-30Paper
Server-aided revocable attribute-based encryption2022-08-19Paper
Server-aided revocable identity-based encryption
Computer Security -- ESORICS 2015
2022-08-19Paper
Efficient ciphertext-policy attribute-based encryption with blackbox traceability
Information Sciences
2021-11-23Paper
Privacy-preserving remote user authentication with \(k\)-times untraceability2019-10-31Paper
Efficient tag path authentication protocol with less tag memory2018-12-07Paper
Attribute-based encryption with expressive and authorized keyword search2017-08-25Paper
Towards semantically secure outsourcing of association rule mining on categorical data
Information Sciences
2016-07-08Paper
Statistical database auditing without query denial threat
INFORMS Journal on Computing
2015-09-11Paper
Authorized keyword search on encrypted data
Computer Security - ESORICS 2014
2015-07-24Paper
PRIVACY RISK ASSESSMENT WITH BOUNDS DEDUCED FROM BOUNDS
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
2012-01-18Paper
Fully secure cipertext-policy hiding CP-ABE
Information Security Practice and Experience
2011-05-19Paper
Vulnerability analysis of RFID protocols for tag ownership transfer
Computer Networks
2010-11-25Paper
Achieving high security and efficiency in RFID-tagged supply chains
International Journal of Applied Cryptography
2010-09-22Paper
A new framework for RFID privacy
Computer Security – ESORICS 2010
2010-09-20Paper
Efficient discrete logarithm based multi-signature scheme in the plain public key model
Designs, Codes and Cryptography
2010-02-25Paper
Self-enforcing private inference control
Provable Security
2009-12-11Paper
Looking into the seeds of time: Discovering temporal patterns in large transaction sets
Information Sciences
2006-05-16Paper
A fragile watermarking scheme for detecting malicious modifications of database relations
Information Sciences
2006-05-16Paper
scientific article; zbMATH DE number 2090937 (Why is no real title available?)2004-08-13Paper
scientific article; zbMATH DE number 2088770 (Why is no real title available?)2004-08-12Paper
scientific article; zbMATH DE number 2080028 (Why is no real title available?)2004-08-04Paper
scientific article; zbMATH DE number 1718513 (Why is no real title available?)2002-03-12Paper
Algorithm of data processing of ballistic range experiment
Progress in Natural Science
1998-01-01Paper


Research outcomes over time


This page was built for person: Yingjiu Li