Jia Yu

From MaRDI portal
Person:506292

Available identifiers

zbMath Open yu.jiaMaRDI QIDQ506292

List of research outcomes





PublicationDate of PublicationType
Growing simplicial complex with face dimension selection and preferential attachment2025-01-14Paper
Nonlocal numerical simulation of thermoelectric coupling field by using peridynamic differential operator2024-08-08Paper
Privacy-preserving Boolean range query with verifiability and forward security over spatio-textual data2024-07-01Paper
Enabling privacy-preserving non-interactive computation for Hamming distance2024-05-27Paper
Reliability evaluation for a class of recursive match networks2024-02-23Paper
Enhancing fault tolerance of balanced hypercube networks by the edge partition method2024-01-16Paper
Symmetric-Key Based Proofs of Retrievability Supporting Public Verification2022-08-19Paper
Connectivity and constructive algorithms of disjoint paths in dragonfly networks2022-06-13Paper
Lattice-based weak-key analysis on single-server outsourcing protocols of modular exponentiations and basic countermeasures2021-07-06Paper
Blockchain-based two-party fair contract signing scheme2021-05-03Paper
Enabling cloud storage auditing with key-exposure resilience under continual key-leakage2021-03-31Paper
How to securely outsource the extended Euclidean algorithm for large-scale polynomials over finite fields2021-03-18Paper
Intrusion-resilient identity-based signatures: concrete scheme in the standard model and generic construction2020-09-08Paper
The reliability analysis of \(k\)-ary \(n\)-cube networks2020-08-17Paper
Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data2020-02-07Paper
Key-insulated aggregate signature2018-12-19Paper
IRIBE: intrusion-resilient identity-based encryption2018-05-22Paper
One forward-secure signature scheme using bilinear maps and its applications2017-01-31Paper
https://portal.mardi4nfdi.de/entity/Q29512012017-01-06Paper
https://portal.mardi4nfdi.de/entity/Q29931942016-08-10Paper
https://portal.mardi4nfdi.de/entity/Q31935162015-10-28Paper
A multidimensional information model for managing construction information2015-06-23Paper
Enabling polarisation filtering in wireless communications: models, algorithms and characteristics2013-10-18Paper
New forward-secure signature scheme with untrusted update2012-10-26Paper
Forward-secure identity-based public-key encryption without random oracles2012-05-04Paper
A verifiable multi-secret-sharing scheme based on homogeneous linear recursion2011-09-29Paper
An efficient fault-tolerant routing algorithm in bijective connection networks with restricted faulty edges2011-07-14Paper
Efficient unicast in bijective connection networks with the restricted faulty node set2011-06-22Paper
Embedding meshes into twisted-cubes2011-06-22Paper
Forward-secure identity-based signature: security notions and construction2011-01-28Paper
A local construction of the Smith normal form of a matrix polynomial2010-11-19Paper
Improved generalized Atkin algorithm for computing square roots in finite fields2010-01-18Paper
Workflow Scheduling Algorithms for Grid Computing2009-02-13Paper
Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps2009-01-27Paper
Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 20052009-01-27Paper
A new proactive secret sharing scheme2008-06-03Paper
New Left-to-Right Radix-r Signed-Digit Recoding Algorithm for Pairing-Based Cryptosystems2007-11-13Paper
Protecting Against Key Escrow and Key Exposure in Identity-Based Cryptosystem2007-11-13Paper
Verifiable secret redistribution for proactive secret sharing schemes2006-11-15Paper
An efficient forward secure signature scheme2006-11-15Paper

Research outcomes over time

This page was built for person: Jia Yu