Lin You
Orcid: 0000-0003-2049-8961
According to our database1,
Lin You
authored at least 57 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Trans. Netw. Serv. Manag., October, 2024
Secure and Efficient Biometric-Based Anonymous Authentication Scheme for Mobile-Edge Computing.
IEEE Internet Things J., October, 2024
A novel biometric authentication scheme with privacy protection based on SVM and ZKP.
Comput. Secur., 2024
Comput. Networks, 2024
2023
Comput. Networks, December, 2023
World Wide Web (WWW), May, 2023
IEEE Trans. Netw. Sci. Eng., 2023
Soft Comput., 2023
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023
2022
An Efficient and Robust Multidimensional Data Aggregation Scheme for Smart Grid Based on Blockchain.
IEEE Trans. Netw. Serv. Manag., December, 2022
Wirel. Commun. Mob. Comput., 2022
J. Syst. Archit., 2022
IACR Cryptol. ePrint Arch., 2022
Comput. Commun., 2022
2021
Symmetry, 2021
Secur. Commun. Networks, 2021
Secur. Commun. Networks, 2021
Biometric key generation based on generated intervals and two-layer error correcting technique.
Pattern Recognit., 2021
Recoverable Private Key Scheme for Consortium Blockchain Based on Verifiable Secret Sharing.
KSII Trans. Internet Inf. Syst., 2021
Two Efficient Constructions for Biometric-Based Signature in Identity-Based Setting Using Bilinear Pairings.
IEEE Access, 2021
2020
A novel parallel image encryption algorithm based on hybrid chaotic maps with OpenCL implementation.
Soft Comput., 2020
A Novel Dynamic Fingerprint Segmentation Method Based on Fuzzy C-Means and Genetic Algorithm.
IEEE Access, 2020
2019
Soft Comput., 2019
A Secure Authentication Scheme Based on Chen's Chaotic System and Finger Vein's Auxiliary Data.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019
2018
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
2017
IEEE Trans. Inf. Theory, 2017
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017
2016
High-dimension space projection-based biometric encryption for fingerprint with fuzzy minutia.
Soft Comput., 2016
J. Inf. Hiding Multim. Signal Process., 2016
2015
Secur. Commun. Networks, 2015
Int. J. Distributed Sens. Networks, 2015
2014
Fast Scalar Multiplications on the Curve v<sup>2</sup> = u<sup>p</sup> - au - b over the Finite Field of Characteristic p.
Fundam. Informaticae, 2014
Proceedings of the 2014 Ninth International Conference on P2P, 2014
2013
Characteristic polynomials of the curve v<sup>2</sup> 0 u<sup>p</sup>- au-b over finite fields of characteristic p.
Finite Fields Their Appl., 2013
2012
A Novel Fuzzy Vault Scheme for Secret Key Exchange.
Proceedings of the SECRYPT 2012, 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
2011
Finite Fields Their Appl., 2011
Proceedings of the 4th International Conference on Interaction Sciences: Information Technology, 2011
2010
Informatica (Slovenia), 2010
The component-based design and development of remote sensing system for drought monitoring.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2010
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2010
The number of the isomorphism classes of hyperelliptic curves of genus four over finite fields.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010
2009
Application of Two Shortwave Infrared Water Stress Indices to Drought Monitoring over Northwestern China.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2009
A Comparative Study on Snow Cover Monitoring of Different Spatial Resolution Remote Sensing Images.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2009
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009
2001
Proceedings of the Information and Communications Security, Third International Conference, 2001