Jia Yu

From MaRDI portal
Person:506292


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Growing simplicial complex with face dimension selection and preferential attachment
Chaos
2025-01-14Paper
Nonlocal numerical simulation of thermoelectric coupling field by using peridynamic differential operator
ZAMP. Zeitschrift für angewandte Mathematik und Physik
2024-08-08Paper
Privacy-preserving Boolean range query with verifiability and forward security over spatio-textual data
Information Sciences
2024-07-01Paper
Enabling privacy-preserving non-interactive computation for Hamming distance
Information Sciences
2024-05-27Paper
Reliability evaluation for a class of recursive match networks
Theoretical Computer Science
2024-02-23Paper
Enhancing fault tolerance of balanced hypercube networks by the edge partition method
Theoretical Computer Science
2024-01-16Paper
Symmetric-key based proofs of retrievability supporting public verification
Computer Security -- ESORICS 2015
2022-08-19Paper
Connectivity and constructive algorithms of disjoint paths in dragonfly networks
Theoretical Computer Science
2022-06-13Paper
Lattice-based weak-key analysis on single-server outsourcing protocols of modular exponentiations and basic countermeasures
Journal of Computer and System Sciences
2021-07-06Paper
Blockchain-based two-party fair contract signing scheme
Information Sciences
2021-05-03Paper
Enabling cloud storage auditing with key-exposure resilience under continual key-leakage
Information Sciences
2021-03-31Paper
How to securely outsource the extended Euclidean algorithm for large-scale polynomials over finite fields
Information Sciences
2021-03-18Paper
Intrusion-resilient identity-based signatures: concrete scheme in the standard model and generic construction
Information Sciences
2020-09-08Paper
The reliability analysis of \(k\)-ary \(n\)-cube networks
Theoretical Computer Science
2020-08-17Paper
Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data
Information Sciences
2020-02-07Paper
Key-insulated aggregate signature
Frontiers of Computer Science
2018-12-19Paper
IRIBE: intrusion-resilient identity-based encryption
Information Sciences
2018-05-22Paper
One forward-secure signature scheme using bilinear maps and its applications
Information Sciences
2017-01-31Paper
Cloud storage integrity checking scheme with private key recovery capability
 
2017-01-06Paper
scientific article; zbMATH DE number 6611879 (Why is no real title available?)
 
2016-08-10Paper
Minimum channel capacity required for stability of Markov jump systems based on nonstochastic information theory
 
2015-10-28Paper
A multidimensional information model for managing construction information
Journal of Industrial and Management Optimization
2015-06-23Paper
Enabling polarisation filtering in wireless communications: models, algorithms and characteristics
IET Communications
2013-10-18Paper
New forward-secure signature scheme with untrusted update
 
2012-10-26Paper
Forward-secure identity-based public-key encryption without random oracles
Fundamenta Informaticae
2012-05-04Paper
A verifiable multi-secret-sharing scheme based on homogeneous linear recursion
 
2011-09-29Paper
An efficient fault-tolerant routing algorithm in bijective connection networks with restricted faulty edges
Theoretical Computer Science
2011-07-14Paper
Efficient unicast in bijective connection networks with the restricted faulty node set
Information Sciences
2011-06-22Paper
Embedding meshes into twisted-cubes
Information Sciences
2011-06-22Paper
Forward-secure identity-based signature: security notions and construction
Information Sciences
2011-01-28Paper
A local construction of the Smith normal form of a matrix polynomial
Journal of Symbolic Computation
2010-11-19Paper
Improved generalized Atkin algorithm for computing square roots in finite fields
Information Processing Letters
2010-01-18Paper
Workflow Scheduling Algorithms for Grid Computing
Studies in Computational Intelligence
2009-02-13Paper
Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps
Provable Security
2009-01-27Paper
Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005
Provable Security
2009-01-27Paper
A new proactive secret sharing scheme
 
2008-06-03Paper
New Left-to-Right Radix-r Signed-Digit Recoding Algorithm for Pairing-Based Cryptosystems
Lecture Notes in Computer Science
2007-11-13Paper
Protecting Against Key Escrow and Key Exposure in Identity-Based Cryptosystem
Lecture Notes in Computer Science
2007-11-13Paper
Verifiable secret redistribution for proactive secret sharing schemes
Journal of Shanghai Jiaotong University (Science)
2006-11-15Paper
An efficient forward secure signature scheme
Journal of Shanghai Jiaotong University (Science)
2006-11-15Paper


Research outcomes over time


This page was built for person: Jia Yu