Yanjiang Yang

According to our database1, Yanjiang Yang authored at least 81 papers between 2002 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Ramp hyper-invertible matrices and their applications to MPC protocols.
IACR Cryptol. ePrint Arch., 2023

2021
Stochastic Workflow Authorizations With Queueing Constraints.
IEEE Trans. Dependable Secur. Comput., 2021

2019
On Data Sovereignty in Cloud-Based Computation Offloading for Smart Cities Applications.
IEEE Internet Things J., 2019

Chinese address standardisation via hybrid approach combining statistical and rule-based methods.
Int. J. Internet Enterp. Manag., 2019

2018
AutoPrivacy: Automatic privacy protection and tagging suggestion for mobile social photo.
Comput. Secur., 2018

Human-Driven Edge Computing and Communication: Part 2.
IEEE Commun. Mag., 2018

AnchorCAN: Anchor-Based Secure CAN Communications System.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

2017
V2X security: A case study of anonymous authentication.
Pervasive Mob. Comput., 2017

Secure server-aided top-k monitoring.
Inf. Sci., 2017

Efficient outsourcing of secure k-nearest neighbour query over encrypted database.
Comput. Secur., 2017

Human-Driven Edge Computing and Communication: Part 1.
IEEE Commun. Mag., 2017

HIBS-KSharing: Hierarchical Identity-Based Signature Key Sharing for Automotive.
IEEE Access, 2017

IoVShield: An Efficient Vehicular Intrusion Detection System for Self-driving (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017

Towards Revocable Fine-Grained Encryption of Cloud Data: Reducing Trust upon Cloud.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Cloud based data sharing with fine-grained proxy re-encryption.
Pervasive Mob. Comput., 2016

Forensic-by-Design Framework for Cyber-Physical Cloud Systems.
IEEE Cloud Comput., 2016

Authenticated CAN Communications Using Standardized Cryptographic Techniques.
Proceedings of the Information Security Practice and Experience, 2016

Credential Wrapping: From Anonymous Password Authentication to Anonymous Biometric Authentication.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Towards Lightweight Anonymous Entity Authentication for IoT Applications.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Privacy-Preserving k-Nearest Neighbour Query on Outsourced Database.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
A note on the security of KHL scheme.
Theor. Comput. Sci., 2015

Towards user-oriented RBAC model.
J. Comput. Secur., 2015

On Lightweight Security Enforcement in Cyber-Physical Systems.
Proceedings of the Lightweight Cryptography for Security and Privacy, 2015

Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data.
Proceedings of the Computer Security - ESORICS 2015, 2015

2014
SKM: Scalable Key Management for Advanced Metering Infrastructure in Smart Grids.
IEEE Trans. Ind. Electron., 2014

Fine-Grained Conditional Proxy Re-Encryption and Application.
Proceedings of the Provable Security - 8th International Conference, 2014

Dynamic Workflow Adjustment with Security Constraints.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

2013
Self-blindable Credential: Towards LightWeight Anonymous Entity Authentication.
IACR Cryptol. ePrint Arch., 2013

Adaptable Ciphertext-Policy Attribute-Based Encryption.
Proceedings of the Pairing-Based Cryptography - Pairing 2013, 2013

Achieving Revocable Fine-Grained Cryptographic Access Control over Cloud Data.
Proceedings of the Information Security, 16th International Conference, 2013

Self-blindable Credential: Towards Anonymous Entity Authentication Upon Resource Constrained Devices.
Proceedings of the Information Security, 16th International Conference, 2013

2012
A Generic Approach for Providing Revocation Support in Secret Handshake.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

2011
Database Access Pattern Protection Without Full-Shuffles.
IEEE Trans. Inf. Forensics Secur., 2011

Better security enforcement in trusted computing enabled heterogeneous wireless sensor networks.
Secur. Commun. Networks, 2011

Cryptanalysis of an identity based broadcast encryption scheme without random oracles.
Inf. Process. Lett., 2011

A Generic Scheme for Secure Data Sharing in Cloud.
Proceedings of the 2011 International Conference on Parallel Processing Workshops, 2011

Multi-User Private Keyword Search for Cloud Computing.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

Towards Multi-user Private Keyword Search for Cloud Computing.
Proceedings of the IEEE International Conference on Cloud Computing, 2011

2010
Shifting Inference Control to User Side: Architecture and Protocol.
IEEE Trans. Dependable Secur. Comput., 2010

A new hardware-assisted PIR with O(<i>n</i>) shuffle cost.
Int. J. Inf. Sec., 2010

Efficient Online/Offline Identity-Based Signature for Wireless Sensor Network.
IACR Cryptol. ePrint Arch., 2010

CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles.
Sci. China Inf. Sci., 2010

Privacy Disclosure Analysis and Control for 2D Contingency Tables Containing Inaccurate Data.
Proceedings of the Privacy in Statistical Databases, 2010

Addressing Leakage of Re-encryption Key in Proxy Re-encryption Using Trusted Computing.
Proceedings of the Trusted Systems - Second International Conference, 2010

Modeling TCG-Based Secure Systems with Colored Petri Nets.
Proceedings of the Trusted Systems - Second International Conference, 2010

Towards practical anonymous password authentication.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

Enabling Use of Single Password over Multiple Servers in Two-Server Model.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
A study of content authentication in proxy-enabled multimedia delivery systems: Model, techniques, and applications.
ACM Trans. Multim. Comput. Commun. Appl., 2009

Privacy-preserving rental services using one-show anonymous credentials.
Secur. Commun. Networks, 2009

Multiuser private queries over encrypted databases.
Int. J. Appl. Cryptogr., 2009

Efficient Unidirectional Proxy Re-Encryption.
IACR Cryptol. ePrint Arch., 2009

Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks.
Proceedings of the Security and Privacy in Communication Networks, 2009

Self-enforcing Private Inference Control.
Proceedings of the Provable Security, Third International Conference, 2009

Private handshakes with optional accountability.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security.
Proceedings of the Information Security, 12th International Conference, 2009

Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing.
Proceedings of the Information Security Practice and Experience, 2009

Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

A Lightweight Fast Handover Authentication Scheme in Mobile Networks.
Proceedings of IEEE International Conference on Communications, 2009

Optionally Identifiable Private Handshakes.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009

A New Approach for Anonymous Password Authentication.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
An Efficient PIR Construction Using Trusted Hardware.
Proceedings of the Information Security, 11th International Conference, 2008

Private Query on Encrypted Data in Multi-user Settings.
Proceedings of the Information Security Practice and Experience, 2008

Efficient Client-to-Client Password Authenticated Key Exchange.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

2007
Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers.
Proceedings of the Information Security Practice and Experience, 2007

Achieving End-to-End Authentication in Intermediary-Enabled Multimedia Delivery Systems.
Proceedings of the Information Security Practice and Experience, 2007

New Paradigm of Inference Control with Trusted Computing.
Proceedings of the Data and Applications Security XXI, 2007

2006
A Practical Password-Based Two-Server Authentication and Key Exchange System.
IEEE Trans. Dependable Secur. Comput., 2006

Practical private data matching deterrent to spoofing attacks.
Proceedings of the 2006 ACM CIKM International Conference on Information and Knowledge Management, 2006

Fortifying password authentication in integrated healthcare delivery systems.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

2005
Tailored reversible watermarking schemes for authentication of electronic clinical atlas.
IEEE Trans. Inf. Technol. Biomed., 2005

A New Architecture for User Authentication and Key Exchange Using Password for Federated Enterprises.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

A Privacy Preserving Rental System.
Proceedings of the Information Security, 8th International Conference, 2005

Privacy and Ownership Preserving of Outsourced Medical Data.
Proceedings of the 21st International Conference on Data Engineering, 2005

Security Analysis and Fix of an Anonymous Credential System.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

2004
A smart-card-enabled privacy preserving E-prescription system.
IEEE Trans. Inf. Technol. Biomed., 2004

New efficient user identification and key distribution scheme providing enhanced security.
Comput. Secur., 2004

Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity.
Proceedings of the Applied Cryptography and Network Security, 2004

2003
Flexible authentication of images.
Proceedings of the Visual Communications and Image Processing 2003, 2003

Secure the image-based simulated telesurgery system.
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003

An invertible watermarking scheme for authentication of Electronic Clinical Brain Atlas.
Proceedings of the 2003 IEEE International Conference on Acoustics, 2003

2002
Security Analysis and Improvement of the Global Key Recovery System.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002


  Loading...