Bo Yang
Orcid: 0000-0002-0419-1209Affiliations:
- Shaanxi Normal University, School of Computer Science, Xi'an, China
- Chinese Academy of Sciences, Institute of Information Engineering, State Key Laboratory of Information Security, Beijing, China
- South China Argicultural University, Guangzhou, China (former)
- Xidian University, National Key Laboratory of ISN at Xi'an, China (PhD 1999)
According to our database1,
Bo Yang
authored at least 158 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Veh. Technol., September, 2024
An Anonymous and Efficient Certificate-Based Identity Authentication Protocol for VANET.
IEEE Internet Things J., April, 2024
IEEE Internet Things J., April, 2024
Multiagent Deep Reinforcement Learning Based Incentive Mechanism for Mobile Crowdsensing in Intelligent Transportation Systems.
IEEE Syst. J., March, 2024
An efficient identity authentication protocol with revocation, tracking and fine-grained access control for electronic medical system.
Comput. Stand. Interfaces, March, 2024
J. Syst. Archit., February, 2024
IEEE Internet Things J., January, 2024
IEEE Trans. Serv. Comput., 2024
Efficient Revocable Attribute-Based Encryption with Data Integrity and Key Escrow-Free.
Inf., 2024
Proceedings of the Information Security Practice and Experience, 2024
2023
An Efficient Certificateless Signature Scheme With Provably Security and Its Applications.
IEEE Syst. J., December, 2023
Des. Codes Cryptogr., November, 2023
A Novel Construction Of Certificateless Aggregate Signature Scheme For Healthcare Wireless Medical Sensor Networks.
Comput. J., November, 2023
A redesigned secure and efficient data transaction protocol for mobile payment system.
J. Syst. Archit., October, 2023
IEEE Internet Things J., October, 2023
IEEE Internet Things J., June, 2023
Identity-Based Encryption With Continuous Leakage-Resilient CCA Security From Static Complexity Assumption.
Comput. J., April, 2023
An Efficient Identity Authentication Scheme With Provable Security and Anonymity for Mobile Edge Computing.
IEEE Syst. J., March, 2023
An Efficient Certificate-Based Aggregate Signature Scheme With Provable Security for Industrial Internet of Things.
IEEE Syst. J., March, 2023
ABCrowdMed: A Fine-Grained Worker Selection Scheme for Crowdsourcing Healthcare With Privacy-Preserving.
IEEE Trans. Serv. Comput., 2023
Multitask-Oriented Collaborative Crowdsensing Based on Reinforcement Learning and Blockchain for Intelligent Transportation System.
IEEE Trans. Ind. Informatics, 2023
IEEE Trans. Cloud Comput., 2023
Inf. Process. Lett., 2023
An Anonymous and Efficient Multimessage and Multireceiver Certificateless Signcryption Scheme for VANET.
IEEE Internet Things J., 2023
An Anonymous and Revocable Authentication Protocol for Vehicle-to-Vehicle Communications.
IEEE Internet Things J., 2023
A direct construction of continuous leakage-resilient (H)IBE scheme with CCA security from dual system encryption.
Comput. Stand. Interfaces, 2023
Privacy-preserving anomaly counting for time-series data in edge-assisted crowdsensing.
Comput. Stand. Interfaces, 2023
Proceedings of the Provable and Practical Security, 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
Secure and Efficient Certificate-Based Proxy Signature Schemes for Industrial Internet of Things.
IEEE Syst. J., 2022
Constructions of non-basic totally disjoint spectra plateaued functions for cryptographic applications.
J. Inf. Secur. Appl., 2022
An Efficient Verifiable Searchable Encryption Scheme With Aggregating Authorization for Blockchain-Enabled IoT.
IEEE Internet Things J., 2022
Des. Codes Cryptogr., 2022
Constructing totally disjoint spectra plateaued functions and searching five-value spectrum functions in odd variables.
Discret. Appl. Math., 2022
Modular-based secret image sharing in Internet of Things: A global progressive-enabled approach.
Concurr. Comput. Pract. Exp., 2022
Comput. J., 2022
Lightweight integrity auditing of edge data for distributed edge computing scenarios.
Ad Hoc Networks, 2022
Bilateral Privacy-Preserving Task Assignment with Personalized Participant Selection for Mobile Crowdsensing.
Proceedings of the Information Security - 25th International Conference, 2022
2021
PrivCrowd: A Secure Blockchain-Based Crowdsourcing Framework with Fine-Grained Worker Selection.
Wirel. Commun. Mob. Comput., 2021
IEEE Trans. Inf. Forensics Secur., 2021
Continuous leakage-resilient certificate-based signcryption scheme and application in cloud computing.
Theor. Comput. Sci., 2021
Blockchain-based searchable encryption with efficient result verification and fair payment.
J. Inf. Secur. Appl., 2021
Inf. Sci., 2021
Int. J. Found. Comput. Sci., 2021
Des. Codes Cryptogr., 2021
Ad Hoc Networks, 2021
2020
IEEE Trans. Emerg. Top. Comput., 2020
Theor. Comput. Sci., 2020
Theor. Comput. Sci., 2020
Fully secure wicked identity-based encryption resilient to continual auxiliary- inputs leakage.
J. Inf. Secur. Appl., 2020
Inf. Process. Lett., 2020
Frontiers Comput. Sci., 2020
A construction of highly nonlinear Boolean functions with optimal algebraic immunity and low hardware implementation cost.
Discret. Appl. Math., 2020
Continuous Leakage-Resilient Certificate-Based Encryption Scheme Without Bilinear Pairings.
Comput. J., 2020
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020
2019
The generic construction of continuous leakage-resilient identity-based cryptosystems.
Theor. Comput. Sci., 2019
Soft Comput., 2019
Secur. Commun. Networks, 2019
Secur. Commun. Networks, 2019
A secure data sharing scheme with cheating detection based on Chaum-Pedersen protocol for cloud storage.
Frontiers Inf. Technol. Electron. Eng., 2019
J. Univers. Comput. Sci., 2019
Efficient attribute-based encryption with attribute revocation for assured data deletion.
Inf. Sci., 2019
Novel Identity-Based Hash Proof System with Compact Master Public Key from Lattices in the Standard Model.
Int. J. Found. Comput. Sci., 2019
Des. Codes Cryptogr., 2019
Comput. J., 2019
Leakage Resilient CCA Security in Stronger Model: Branch Hidden ABO-LTFs and Their Applications.
Comput. J., 2019
Proceedings of the Provable Security, 2019
Proceedings of the Information and Communications Security - 21st International Conference, 2019
2018
Assured Data Deletion With Fine-Grained Access Control for Fog-Based Industrial Applications.
IEEE Trans. Ind. Informatics, 2018
Secur. Commun. Networks, 2018
Frontiers Inf. Technol. Electron. Eng., 2018
Updatable Identity-Based Hash Proof System Based on Lattices and Its Application to Leakage-Resilient Public-Key Encryption Schemes.
J. Comput. Sci. Technol., 2018
Secure rational numbers equivalence test based on threshold cryptosystem with rational numbers.
Inf. Sci., 2018
Leakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairing.
Inf. Process. Lett., 2018
IACR Cryptol. ePrint Arch., 2018
Future Gener. Comput. Syst., 2018
IEEE Commun. Mag., 2018
Comput. J., 2018
Ad Hoc Networks, 2018
Secure Pub-Sub: Blockchain-Based Fair Payment With Reputation for Reliable Cyber Physical Systems.
IEEE Access, 2018
Proceedings of the Information Security Practice and Experience, 2018
Verifiable Secret Sharing Based on Hyperplane Geometry with Its Applications to Optimal Resilient Proactive Cryptosystems.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
Continuous leakage-resilient certificateless public key encryption with CCA security.
Knowl. Based Syst., 2017
Frontiers Inf. Technol. Electron. Eng., 2017
Comput. J., 2017
Sci. China Inf. Sci., 2017
2016
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
AEP-M: Practical Anonymous E-Payment for Mobile Devices using ARM TrustZone and Divisible E-Cash (Full Version).
IACR Cryptol. ePrint Arch., 2016
Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing.
Discret. Appl. Math., 2016
An error-tolerant keyword search scheme based on public-key encryption in secure cloud computing.
Concurr. Comput. Pract. Exp., 2016
AEP-M: Practical Anonymous E-Payment for Mobile Devices Using ARM TrustZone and Divisible E-Cash.
Proceedings of the Information Security - 19th International Conference, 2016
2015
Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization.
IEEE Trans. Inf. Forensics Secur., 2015
Secur. Commun. Networks, 2015
On security against the server in designated tester public key encryption with keyword search.
Inf. Process. Lett., 2015
Int. J. Netw. Secur., 2015
IACR Cryptol. ePrint Arch., 2015
Comput. J., 2015
2014
Secur. Commun. Networks, 2014
Secur. Commun. Networks, 2014
J. Comput. Sci. Technol., 2014
Anonymous spatial encryption under affine space delegation functionality with full security.
Inf. Sci., 2014
CCLAS: A Practical and Compact Certificateless Aggregate Signature with Share Extraction.
Int. J. Netw. Secur., 2014
Int. J. Commun. Syst., 2014
Anonymous encryption with partial-order subset delegation and its application in privacy email systems.
IET Inf. Secur., 2014
2013
Efficient Multicast Key Distribution Using HOWP-Based Dynamic Group Access Structures.
IEEE Trans. Computers, 2013
Secur. Commun. Networks, 2013
J. Comput. Sci. Technol., 2013
J. Comput., 2013
Comput. J., 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
2012
Reconciling and improving of multi-receiver signcryption protocols with threshold decryption.
Secur. Commun. Networks, 2012
IET Inf. Secur., 2012
Cryptanalysis of Strong Designated Verifier Signature Scheme with Non-delegatability and Non-transferability.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
LR-UESDE: A Continual-Leakage Resilient Encryption with Unbounded Extensible Set Delegation.
Proceedings of the Provable Security - 6th International Conference, 2012
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2012
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
2011
Inf. Sci., 2011
Int. J. Netw. Secur., 2011
Cryptanalysis and Fixed of Short Signature Scheme without Random Oracle from Bilinear Parings.
Int. J. Netw. Secur., 2011
IACR Cryptol. ePrint Arch., 2011
Comput. Commun., 2011
Proceedings of the Provable Security - 5th International Conference, 2011
Dual-Verifiers DVS with Message Recovery for Tolerant Routing in Wireless Sensor Networks.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2011
Proceedings of the Information Security, 14th International Conference, 2011
2010
J. Digit. Content Technol. its Appl., 2010
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2010
Towards Confidentiality of ID-Based Signcryption Schemes under without Random Oracle Model.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2010
2009
Int. J. Netw. Secur., 2009
IACR Cryptol. ePrint Arch., 2009
Comput. Stand. Interfaces, 2009
Proceedings of the Emerging Intelligent Computing Technology and Applications, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
Proceedings of the Provable Security, Second International Conference, 2008
Efficient Secret Authenticatable Anonymous Signcryption Scheme with Identity Privacy.
Proceedings of the Intelligence and Security Informatics, 2008
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008
2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Proceedings of the Third International Conference on Natural Computation, 2007
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007
2006
Proceedings of the Computational Intelligence and Security, International Conference, 2006
2003
Proceedings of the IEEE 14th International Symposium on Personal, 2003