Yan Zhu
Orcid: 0000-0002-9159-745XAffiliations:
- University of Science and Technology Beijing, China
- University of Michigan-Dearborn, MI, USA (2012)
- Peking University, Beijing Key Laboratory of Internet Security Technology, China (2007 - 2012)
- Harbin Engineering University, China (PhD 2005)
According to our database1,
Yan Zhu
authored at least 87 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Privacy-Preserving Smart Contracts for Confidential Transactions Using Dual-Mode Broadcast Encryption.
IEEE Trans. Reliab., June, 2024
Privacy-Preserving Queries Using Multisource Private Data Counting on Real Numbers in IoT.
IEEE Internet Things J., April, 2024
Efficient Key Generation on Lattice Cryptography for Privacy Protection in Mobile IoT Crowdsourcing.
IEEE Internet Things J., January, 2024
Privacy-Preserving Collaborative Queries in Services Computing Using Multisource Private Data Counting.
IEEE Trans. Serv. Comput., 2024
Toward Efficient Key Extraction of LBC Over Ring: Fast Non-Spherical G-Lattice Sampler and Optimized Perturbation Generation.
IEEE Trans. Inf. Forensics Secur., 2024
2023
Efficient Multiparty Fully Homomorphic Encryption With Computation Fairness and Error Detection in Privacy Preserving Multisource Data Mining.
IEEE Trans. Reliab., December, 2023
SaaSC: Toward Pay-as-You-Go Mode for Software Service Transactions Based on Blockchain's Smart Legal Contracts.
IEEE Trans. Serv. Comput., 2023
Secure Remote Cloud File Sharing With Attribute-Based Access Control and Performance Optimization.
IEEE Trans. Cloud Comput., 2023
Remotely Controllable Data Self-Destruction for Privacy-Preserving Sensitive Data Services.
Proceedings of the IEEE International Conference on High Performance Computing & Communications, 2023
2022
SPESC-Translator: Towards Automatically Smart Legal Contract Conversion for Blockchain-Based Auction Services.
IEEE Trans. Serv. Comput., 2022
Continuous improvement of script-driven verifiable random functions for reducing computing power in blockchain consensus protocols.
Peer-to-Peer Netw. Appl., 2022
Policy-driven Data Sharing over Attribute-Based Encryption supporting Dual Membership.
J. Syst. Softw., 2022
Attribute-Based Private Data Sharing With Script-Driven Programmable Ciphertext and Decentralized Key Management in Blockchain Internet of Things.
IEEE Internet Things J., 2022
Policychain: A Decentralized Authorization Service With Script-Driven Policy on Blockchain for Internet of Things.
IEEE Internet Things J., 2022
2021
TA-SPESC: Toward Asset-Driven Smart Contract Language Supporting Ownership Transaction and Rule-Based Generation on Blockchain.
IEEE Trans. Reliab., 2021
Blockchain-Based Software Architecture Development for Service Requirements With Smart Contracts.
Computer, 2021
How to implement secure cloud file sharing using optimized attribute-based access control with small policy matrix and minimized cumulative errors.
Comput. Secur., 2021
2020
Zero-pole cancellation for identity-based aggregators: a constant-size designated verifier-set signature.
Frontiers Comput. Sci., 2020
IEEE Access, 2020
A Privacy-Preserving Framework With Self-Governance and Permission Delegation in Online Social Networks.
IEEE Access, 2020
2019
Cryptographic Attribute-Based Access Control (ABAC) for Secure Decision Making of Dynamic Policy With Multiauthority Attribute Tokens.
IEEE Trans. Reliab., 2019
New instant confirmation mechanism based on interactive incontestable signature in consortium blockchain.
Frontiers Comput. Sci., 2019
Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, 2019
From Data-Driven to Intelligent-Driven: Technology Evolution of Network Security in Big Data Era.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
FlashGhost: Data Sanitization with Privacy Protection Based on Frequent Colliding Hash Table.
Proceedings of the 2019 IEEE International Conference on Services Computing, 2019
2018
IEEE Trans. Syst. Man Cybern. Syst., 2018
IEEE Trans. Dependable Secur. Comput., 2018
PHE: An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing in Cloud.
IEEE Trans. Cloud Comput., 2018
Sci. China Inf. Sci., 2018
Provably Secure Cryptographic ABAC System to Enhance Reliability and Privacy Using Real-Time Token and Dynamic Policy.
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
An Efficient Retrograde Storage for Self-Destructing Messages on Frequently Colliding Hash Table.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
TBAC: Transaction-Based Access Control on Blockchain for Resource Sharing with Cryptographically Decentralized Authorization.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
Digital Asset Management with Distributed Permission over Blockchain and Attribute-Based Access Control.
Proceedings of the 2018 IEEE International Conference on Services Computing, 2018
2017
Int. J. Cooperative Inf. Syst., 2017
Proceedings of the 2017 IEEE Symposium on Service-Oriented System Engineering, 2017
2016
Proceedings of the 2016 IEEE Symposium on Service-Oriented System Engineering, 2016
Exploring the Procrastination of College Students: A Data-Driven Behavioral Perspective.
Proceedings of the Database Systems for Advanced Applications, 2016
Interactive Incontestable Signature for Transactions Confirmation in Bitcoin Blockchain.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
2015
From RBAC to ABAC: Constructing Flexible Data Access Control for Cloud Storage Services.
IEEE Trans. Serv. Comput., 2015
Tap-Wave-Rub: Lightweight Human Interaction Approach to Curb Emerging Smartphone Malware.
IEEE Trans. Inf. Forensics Secur., 2015
IEEE Trans. Computers, 2015
Establishing A Personal On-Demand Execution Environment for Mobile Cloud Applications.
Mob. Networks Appl., 2015
Identity-Set-based Broadcast Encryption supporting "Cut-or-Select" with Short Ciphertext.
IACR Cryptol. ePrint Arch., 2015
Secure Snaps: A New Forward Secrecy Cryptosystem for Self-Destructing Messages in Mobile Services.
Proceedings of the 2015 IEEE International Conference on Mobile Services, MS 2015, New York City, NY, USA, June 27, 2015
Traitor Tracing and Revocation for Secure Decoders in File Syncing-and-Sharing Service.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015
AR-ABAC: A New Attribute Based Access Control Model Supporting Attribute-Rules for Cloud Computing.
Proceedings of the IEEE Conference on Collaboration and Internet Computing, 2015
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015
2014
J. Netw. Comput. Appl., 2014
Sci. China Inf. Sci., 2014
Proceedings of the Trusted Systems - 6th International Conference, 2014
Proceedings of the IEEE Conference on Communications and Network Security, 2014
2013
IEEE Trans. Serv. Comput., 2013
Role-Based Cryptosystem: A New Cryptographic RBAC System Based on Role-Key Hierarchy.
IEEE Trans. Inf. Forensics Secur., 2013
Location-Aware and Safer Cards: Enhancing RFID Security and Privacy via Location Sensing.
IEEE Trans. Dependable Secur. Comput., 2013
Tap-Wave-Rub: lightweight malware prevention for smartphones using intuitive human gestures.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013
Efficient Identity-Based Encryption without Pairings and Key Escrow for Mobile Devices.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2013
Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing, 2013
Proceedings of the first ACM workshop on Asia public-key cryptography, 2013
How to use attribute-based encryption to implement role-based access control in the cloud.
Proceedings of the 2013 International Workshop on Security in Cloud Computing, 2013
Proceedings of the Eighth International Conference on P2P, 2013
2012
Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage.
IEEE Trans. Parallel Distributed Syst., 2012
J. Syst. Softw., 2012
Int. J. Cooperative Inf. Syst., 2012
Efficient construction of provably secure steganography under ordinary covert channels.
Sci. China Inf. Sci., 2012
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012
Proceedings of the 2012 IEEE Global Communications Conference, 2012
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012
2011
J. Comput. Sci. Technol., 2011
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
J. Comput. Sci. Technol., 2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
2007
Structural Digital Signature and Semi-Fragile Fingerprinting for Image Authentication in Wavelet Domain.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007
2006
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
2005
Proceedings of the Digital Watermarking, 4th International Workshop, 2005