Xiaodong Yang

Orcid: 0000-0002-0382-5943

Affiliations:
  • State Key Laboratory of Cryptology, Beijing, China
  • Northwest Normal University, College of Computer Science and Engineering, Lanzhou, China


According to our database1, Xiaodong Yang authored at least 27 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Efficient and Security-Enhanced Certificateless Aggregate Signature-Based Authentication Scheme With Conditional Privacy Preservation for VANETs.
IEEE Trans. Intell. Transp. Syst., September, 2024

Proxy re-signature scheme with cryptographic reverse firewall for medical data security.
Peer Peer Netw. Appl., September, 2024

Heterogeneous Signcryption Scheme From PKI to IBC With Multi-Ciphertext Equality Test in Internet of Vehicles.
IEEE Internet Things J., April, 2024

Cryptanalysis and Improvement of a Blockchain-Based Certificateless Signature for IIoT Devices.
IEEE Trans. Ind. Informatics, February, 2024

Backdoor-resistant certificateless-based message-locked integrity auditing for computing power network.
J. Syst. Archit., 2024

KASE-AKA: Key-aggregate keyword searchable encryption against keyword guessing attack and authorization abuse.
Comput. Stand. Interfaces, 2024

2023
Cryptanalysis of a Transaction Scheme With Certificateless Cryptographic Primitives for IoT-Based Mobile Payments.
IEEE Syst. J., March, 2023

Improved Security of a Pairing-Free Certificateless Aggregate Signature in Healthcare Wireless Medical Sensor Networks.
IEEE Internet Things J., 2023

2022
Blockchain-based multi-user certificateless encryption with keyword search for electronic health record sharing.
Peer-to-Peer Netw. Appl., 2022

A blockchain-based keyword search scheme with dual authorization for electronic health record sharing.
J. Inf. Secur. Appl., 2022

Security analysis and improvement of a privacy-preserving authentication scheme in VANET.
Int. J. Inf. Sec., 2022

2021
An efficient outsourcing attribute-based encryption scheme in 5G mobile network environments.
Peer-to-Peer Netw. Appl., 2021

Efficient and anonymous multi-message and multi-receiver electronic health records sharing scheme without secure channel based on blockchain.
Trans. Emerg. Telecommun. Technol., 2021

A proxy-protected proxy signature based on SM9.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

2020
Stateless Cloud Auditing Scheme for Non-Manager Dynamic Group Data With Privacy Preservation.
IEEE Access, 2020

Privacy-Preserving Cloud Auditing for Multiple Users Scheme With Authorization and Traceability.
IEEE Access, 2020

Multi-Replica and Multi-Cloud Data Public Audit Scheme Based on Blockchain.
IEEE Access, 2020

A Blockchain-Assisted Verifiable Outsourced Attribute-Based Signcryption Scheme for EHRs Sharing in the Cloud.
IEEE Access, 2020

Medical Data Sharing Scheme Based on Attribute Cryptosystem and Blockchain Technology.
IEEE Access, 2020

Multi-Keyword Certificateless Searchable Public Key Authenticated Encryption Scheme Based on Blockchain.
IEEE Access, 2020

Privacy Protection of VANET Based on Traceable Ring Signature on Ideal Lattice.
IEEE Access, 2020

2019
A Strongly Unforgeable Certificateless Signature Scheme and Its Application in IoT Environments.
Sensors, 2019

2018
A Strong Designated Verifier Proxy Re-Signature Scheme for IoT Environments.
Symmetry, 2018

Security Analysis of a Revocable and Strongly Unforgeable Identity-Based Signature Scheme.
Inf. Technol. Control., 2018

Identity-Based Blind Proxy Re-Signature Scheme for Data Security.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

2017
Cryptanalysis and Improvement of a Strongly Unforgeable Identity-Based Signature Scheme.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

2009
An Efficient Identity-Based Certified E-mail Protocol.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009


  Loading...