The following pages link to Jia Yu (Q506292):
Displaying 40 items.
- One forward-secure signature scheme using bilinear maps and its applications (Q506297) (← links)
- Efficient unicast in bijective connection networks with the restricted faulty node set (Q545351) (← links)
- Embedding meshes into twisted-cubes (Q545387) (← links)
- An efficient fault-tolerant routing algorithm in bijective connection networks with restricted faulty edges (Q551165) (← links)
- A local construction of the Smith normal form of a matrix polynomial (Q607157) (← links)
- Forward-secure identity-based signature: security notions and construction (Q621647) (← links)
- Improved generalized Atkin algorithm for computing square roots in finite fields (Q844143) (← links)
- Verifiable secret redistribution for proactive secret sharing schemes (Q849953) (← links)
- An efficient forward secure signature scheme (Q849954) (← links)
- Key-insulated aggregate signature (Q1633053) (← links)
- IRIBE: intrusion-resilient identity-based encryption (Q1750529) (← links)
- How to securely outsource the extended Euclidean algorithm for large-scale polynomials over finite fields (Q1999182) (← links)
- Blockchain-based two-party fair contract signing scheme (Q2023216) (← links)
- Lattice-based weak-key analysis on single-server outsourcing protocols of modular exponentiations and basic countermeasures (Q2040024) (← links)
- The reliability analysis of \(k\)-ary \(n\)-cube networks (Q2192376) (← links)
- Intrusion-resilient identity-based signatures: concrete scheme in the standard model and generic construction (Q2198024) (← links)
- Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data (Q2293192) (← links)
- A multidimensional information model for managing construction information (Q2351285) (← links)
- Enabling cloud storage auditing with key-exposure resilience under continual key-leakage (Q2660966) (← links)
- Connectivity and constructive algorithms of disjoint paths in dragonfly networks (Q2672591) (← links)
- Enabling polarisation filtering in wireless communications: models, algorithms and characteristics (Q2852766) (← links)
- (Q2882385) (← links)
- (Q2951201) (← links)
- (Q2993194) (← links)
- (Q3165331) (← links)
- (Q3170746) (← links)
- (Q3193516) (← links)
- (Q3501861) (← links)
- Workflow Scheduling Algorithms for Grid Computing (Q3603115) (← links)
- Symmetric-Key Based Proofs of Retrievability Supporting Public Verification (Q5097047) (← links)
- Protecting Against Key Escrow and Key Exposure in Identity-Based Cryptosystem (Q5425428) (← links)
- New Left-to-Right Radix-r Signed-Digit Recoding Algorithm for Pairing-Based Cryptosystems (Q5425432) (← links)
- Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps (Q5505460) (← links)
- Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005 (Q5505467) (← links)
- Reliability evaluation for a class of recursive match networks (Q6118306) (← links)
- Enhancing fault tolerance of balanced hypercube networks by the edge partition method (Q6138833) (← links)
- Enabling privacy-preserving non-interactive computation for Hamming distance (Q6544595) (← links)
- Privacy-preserving Boolean range query with verifiability and forward security over spatio-textual data (Q6564956) (← links)
- Nonlocal numerical simulation of thermoelectric coupling field by using peridynamic differential operator (Q6584952) (← links)
- Growing simplicial complex with face dimension selection and preferential attachment (Q6663685) (← links)