Yanjiang Yang

From MaRDI portal
(Redirected from Person:497667)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Ramp hyper-invertible matrices and their applications to MPC protocols2024-08-30Paper
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles
Science China Information Sciences
2022-10-28Paper
Towards revocable fine-grained encryption of cloud data: reducing trust upon cloud2017-08-25Paper
Towards lightweight anonymous entity authentication for IoT applications
Information Security and Privacy
2016-08-31Paper
Privacy-preserving \(k\)-nearest neighbour query on outsourced database
Information Security and Privacy
2016-08-31Paper
On lightweight security enforcement in cyber-physical systems
Lecture Notes in Computer Science
2016-02-22Paper
Fine-grained conditional proxy re-encryption and application
Provable Security
2015-09-29Paper
A note on the security of KHL scheme
Theoretical Computer Science
2015-09-25Paper
Adaptable Ciphertext-Policy Attribute-Based Encryption
Pairing-Based Cryptography – Pairing 2013
2014-02-18Paper
Cryptanalysis of an identity based broadcast encryption scheme without random oracles
Information Processing Letters
2013-03-28Paper
Optionally identifiable private handshakes
Information Security and Cryptology
2010-11-23Paper
Efficient Unidirectional Proxy Re-Encryption
Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
2010-05-04Paper
Self-enforcing private inference control
Provable Security
2009-12-11Paper
Multiuser private queries over encrypted databases
International Journal of Applied Cryptography
2009-10-12Paper
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security
Lecture Notes in Computer Science
2009-09-29Paper
An Efficient PIR Construction Using Trusted Hardware
Lecture Notes in Computer Science
2008-11-20Paper
Information Security
Lecture Notes in Computer Science
2006-10-20Paper
Information Security and Privacy
Lecture Notes in Computer Science
2006-06-22Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2005-06-13Paper
scientific article; zbMATH DE number 1950329 (Why is no real title available?)2003-07-17Paper


Research outcomes over time


This page was built for person: Yanjiang Yang