Lin You

Orcid: 0000-0003-2049-8961

According to our database1, Lin You authored at least 57 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
EBDTS: An Efficient BCoT-Based Data Trading System Using PUF for Authentication.
IEEE Trans. Netw. Serv. Manag., October, 2024

Secure and Efficient Biometric-Based Anonymous Authentication Scheme for Mobile-Edge Computing.
IEEE Internet Things J., October, 2024

A novel biometric authentication scheme with privacy protection based on SVM and ZKP.
Comput. Secur., 2024

BIAS: A novel secure and efficient biometric-based anonymous authentication scheme.
Comput. Networks, 2024

2023
LRS_PKI: A novel blockchain-based PKI framework using linkable ring signatures.
Comput. Networks, December, 2023

MACT: A multi-channel anonymous consensus based on Tor.
World Wide Web (WWW), May, 2023

A Novel Linkable Ring Signature on Ideal Lattices.
Entropy, February, 2023

An Improved Model on the Vague Sets-Based DPoS's Voting Phase in Blockchain.
IEEE Trans. Netw. Sci. Eng., 2023

Two-factor identity authentication scheme based on blockchain and fuzzy extractor.
Soft Comput., 2023

An Improved Model of PBFT with Anonymity and Proxy Based on Linkable Ring Signature.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023

A Multi-server Authentication Scheme Based on Fuzzy Extractor.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023

2022
An Efficient and Robust Multidimensional Data Aggregation Scheme for Smart Grid Based on Blockchain.
IEEE Trans. Netw. Serv. Manag., December, 2022

A Multipath Payment Scheme Supporting Proof of Payment.
Wirel. Commun. Mob. Comput., 2022

Offline/Online lattice-based ciphertext policy attribute-based encryption.
J. Syst. Archit., 2022

Secure Two-party Computation Approach for NTRUEncrypt.
IACR Cryptol. ePrint Arch., 2022

Cuproof: Range Proof with Constant Size.
Entropy, 2022

A novel insurance claim blockchain scheme based on zero-knowledge proof technology.
Comput. Commun., 2022

2021
A Consortium Blockchain Wallet Scheme Based on Dual-Threshold Key Sharing.
Symmetry, 2021

A Novel Machine Learning-Based Analysis Model for Smart Contract Vulnerability.
Secur. Commun. Networks, 2021

A Blockchain-Based Hierarchical Authentication Scheme for Multiserver Architecture.
Secur. Commun. Networks, 2021

Fuzzy Identity-Based Ring Signature from Lattices.
Secur. Commun. Networks, 2021

Biometric key generation based on generated intervals and two-layer error correcting technique.
Pattern Recognit., 2021

Recoverable Private Key Scheme for Consortium Blockchain Based on Verifiable Secret Sharing.
KSII Trans. Internet Inf. Syst., 2021

Cuproof: A Novel Range Proof with Constant Size.
IACR Cryptol. ePrint Arch., 2021

Random Integer Lattice Generation via the Hermite Normal Form.
Entropy, 2021

Two Efficient Constructions for Biometric-Based Signature in Identity-Based Setting Using Bilinear Pairings.
IEEE Access, 2021

2020
A novel parallel image encryption algorithm based on hybrid chaotic maps with OpenCL implementation.
Soft Comput., 2020

Random Integer Lattice Generation via HNF.
IACR Cryptol. ePrint Arch., 2020

A Novel Dynamic Fingerprint Segmentation Method Based on Fuzzy C-Means and Genetic Algorithm.
IEEE Access, 2020

2019
A novel fuzzy vault scheme based on fingerprint and finger vein feature fusion.
Soft Comput., 2019

A Secure Authentication Scheme Based on Chen's Chaotic System and Finger Vein's Auxiliary Data.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

2018
A novel location-based encryption model using fuzzy vault scheme.
Soft Comput., 2018

A Cancelable Multi-Biometric Template Generation Algorithm Based on Bloom Filter.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Secure Biometric Authentication Scheme Based on Chaotic Map.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2017
Construction of Sequences With High Nonlinear Complexity From Function Fields.
IEEE Trans. Inf. Theory, 2017

Security Enhancement for Data Migration in the Cloud.
Future Internet, 2017

A novel public key encryption model based on transformed biometrics.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

2016
High-dimension space projection-based biometric encryption for fingerprint with fuzzy minutia.
Soft Comput., 2016

A Secure Finger Vein Recognition Algorithm Based on MB-GLBP and Logistic Mapping.
J. Inf. Hiding Multim. Signal Process., 2016

A Novel Key Sharing Fuzzy Vault Scheme.
KSII Trans. Internet Inf. Syst., 2016

2015
Analysis of the information theoretically secret key agreement by public discussion.
Secur. Commun. Networks, 2015

A Key Distribution Scheme for WSN Based on Hash Chains and Deployment Knowledge.
Int. J. Distributed Sens. Networks, 2015

2014
Fast Scalar Multiplications on the Curve v<sup>2</sup> = u<sup>p</sup> - au - b over the Finite Field of Characteristic p.
Fundam. Informaticae, 2014

A Novel Fingerprint-Based Biometric Encryption.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

2013
Characteristic polynomials of the curve v<sup>2</sup> 0 u<sup>p</sup>- au-b over finite fields of characteristic p.
Finite Fields Their Appl., 2013

2012
A Novel Fuzzy Vault Scheme for Secret Key Exchange.
Proceedings of the SECRYPT 2012, 2012

A Key Sharing Fuzzy Vault Scheme.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

2011
Low complexity of a class of normal bases over finite fields.
Finite Fields Their Appl., 2011

A fast algorithm for decoding algebraic geometry codes with the displacement rank.
Proceedings of the 4th International Conference on Interaction Sciences: Information Technology, 2011

2010
Fast Scalar Multiplications on Hyperelliptic Curve Cryptosystems.
Informatica (Slovenia), 2010

The component-based design and development of remote sensing system for drought monitoring.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2010

Models for estimating Leaf Area Index of different crops using hyperspectral data.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2010

The number of the isomorphism classes of hyperelliptic curves of genus four over finite fields.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

2009
Application of Two Shortwave Infrared Water Stress Indices to Drought Monitoring over Northwestern China.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2009

A Comparative Study on Snow Cover Monitoring of Different Spatial Resolution Remote Sensing Images.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2009

The Tight Error Linear Complexity of Periodic Sequences.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

2001
Generalization of Elliptic Curve Digital Signature Schemes.
Proceedings of the Information and Communications Security, Third International Conference, 2001


  Loading...