Yang Ming

Orcid: 0000-0003-1734-8866

Affiliations:
  • Chang'an University, School of Information Engineering, Xi'an, China
  • Xidian University, Xi'an, China (PhD 2008)


According to our database1, Yang Ming authored at least 37 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Secure and Flexible Data Sharing With Dual Privacy Protection in Vehicular Digital Twin Networks.
IEEE Trans. Intell. Transp. Syst., September, 2024

Towards Synchronized Privacy-Preserving Authentication for MDTEN-Driven VANETs.
IEEE Trans. Veh. Technol., March, 2024

Flexible Selective Data Sharing With Fine-Grained Erasure in VANETs.
IEEE Trans. Inf. Forensics Secur., 2024

Comments on "Enabling Verifiable Privacy-Preserving Multi-Type Data Aggregation in Smart Grids".
IEEE Trans. Dependable Secur. Comput., 2024

Generic Construction: Cryptographic Reverse Firewalls for Public Key Encryption With Keyword Search in Cloud Storage.
IEEE Trans. Cloud Comput., 2024

VCSA: Verifiable and collusion-resistant secure aggregation for federated learning using symmetric homomorphic encryption.
J. Syst. Archit., 2024

Blockchain-assisted verifiable certificate-based searchable encryption against untrusted cloud server for Industrial Internet of Things.
Future Gener. Comput. Syst., 2024

2023
Certificateless public auditing scheme with sensitive information hiding for data sharing in cloud storage.
J. Syst. Archit., October, 2023

A Secure One-to-Many Authentication and Key Agreement Scheme for Industrial IoT.
IEEE Syst. J., June, 2023

Identity-Based Proxy Re-encryption Based on SM9.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

2022
Efficient Privacy-Preserving Data Aggregation Scheme with Fault Tolerance in Smart Grid.
Secur. Commun. Networks, 2022

Blockchain-Enabled Efficient Dynamic Cross-Domain Deduplication in Edge Computing.
IEEE Internet Things J., 2022

Practical algorithm substitution attack on extractable signatures.
Des. Codes Cryptogr., 2022

2021
Constructions of Optimal Binary Z-Complementary Sequence Sets With Large Zero Correlation Zone.
IEEE Signal Process. Lett., 2021

Blockchain-Enabled Secure Data Sharing Scheme in Mobile-Edge Computing: An Asynchronous Advantage Actor-Critic Learning Approach.
IEEE Internet Things J., 2021

Efficient Revocable Multi-Authority Attribute-Based Encryption for Cloud Storage.
IEEE Access, 2021

2020
Efficient Privacy-Preserving Data Sharing for Fog-Assisted Vehicular Sensor Networks.
Sensors, 2020

Efficient Anonymous Certificate-Based Multi- Message and Multi-Receiver Signcryption Scheme for Healthcare Internet of Things.
IEEE Access, 2020

2019
Identity-Based Encryption with Filtered Equality Test for Smart City Applications.
Sensors, 2019

Efficient Certificateless Conditional Privacy-Preserving Authentication Scheme in VANETs.
Mob. Inf. Syst., 2019

Efficient Privacy-Preserving Multi-Dimensional Data Aggregation Scheme in Smart Grid.
IEEE Access, 2019

Efficient Privacy-Preserving Certificateless Provable Data Possession Scheme for Cloud Storage.
IEEE Access, 2019

2018
Efficient Privacy-Preserving Access Control Scheme in Electronic Health Records System.
Sensors, 2018

PCPA: A Practical Certificateless Conditional Privacy Preserving Authentication Scheme for Vehicular Ad Hoc Networks.
Sensors, 2018

Certificateless Proxy Signature Scheme in the Standard Model.
Fundam. Informaticae, 2018

2017
Identity Based Generalized Signcryption Scheme in the Standard Model.
Entropy, 2017

2016
Cryptanalysis of an Identity Based Signcryption Scheme in the Standard Model.
Int. J. Netw. Secur., 2016

Identity based broadcast encryption with group of prime order.
Int. Arab J. Inf. Technol., 2016

2015
Proxy signcryption scheme in the standard model.
Secur. Commun. Networks, 2015

On the Security of Three Public Auditing Schemes in Cloud Computing.
Int. J. Netw. Secur., 2015

2011
Provably Security Identity-based Sanitizable Signature Scheme Without Random Oracles.
J. Softw., 2011

Multi-receiver Identity-Based Signcryption Scheme in the Standard Model.
Proceedings of the Information Computing and Applications, 2011

2010
Improved Identity Based Online/Offline Signature Scheme.
Proceedings of the Symposia and Workshops on Ubiquitous, 2010

Identity-Based Sanitizable Signature Scheme in the Standard Model.
Proceedings of the Information Computing and Applications - International Conference, 2010

2009
An Efficient Verifiably Encrypted Signature Scheme without Random Oracles.
Int. J. Netw. Secur., 2009

Efficient Certificate-Based Signature Scheme.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
A Provable Secure ID-Based Explicit Authenticated Key Agreement Protocol Without Random Oracles.
J. Comput. Sci. Technol., 2008


  Loading...