Yanjiang Yang
According to our database1,
Yanjiang Yang
authored at least 81 papers
between 2002 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
IACR Cryptol. ePrint Arch., 2023
2021
IEEE Trans. Dependable Secur. Comput., 2021
2019
On Data Sovereignty in Cloud-Based Computation Offloading for Smart Cities Applications.
IEEE Internet Things J., 2019
Chinese address standardisation via hybrid approach combining statistical and rule-based methods.
Int. J. Internet Enterp. Manag., 2019
2018
AutoPrivacy: Automatic privacy protection and tagging suggestion for mobile social photo.
Comput. Secur., 2018
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018
2017
Comput. Secur., 2017
IEEE Access, 2017
IoVShield: An Efficient Vehicular Intrusion Detection System for Self-driving (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
2016
Pervasive Mob. Comput., 2016
IEEE Cloud Comput., 2016
Proceedings of the Information Security Practice and Experience, 2016
Credential Wrapping: From Anonymous Password Authentication to Anonymous Biometric Authentication.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
Proceedings of the Lightweight Cryptography for Security and Privacy, 2015
Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data.
Proceedings of the Computer Security - ESORICS 2015, 2015
2014
IEEE Trans. Ind. Electron., 2014
Proceedings of the Provable Security - 8th International Conference, 2014
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014
2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Pairing-Based Cryptography - Pairing 2013, 2013
Proceedings of the Information Security, 16th International Conference, 2013
Self-blindable Credential: Towards Anonymous Entity Authentication Upon Resource Constrained Devices.
Proceedings of the Information Security, 16th International Conference, 2013
2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
2011
IEEE Trans. Inf. Forensics Secur., 2011
Better security enforcement in trusted computing enabled heterogeneous wireless sensor networks.
Secur. Commun. Networks, 2011
Cryptanalysis of an identity based broadcast encryption scheme without random oracles.
Inf. Process. Lett., 2011
Proceedings of the 2011 International Conference on Parallel Processing Workshops, 2011
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011
Proceedings of the IEEE International Conference on Cloud Computing, 2011
2010
IEEE Trans. Dependable Secur. Comput., 2010
IACR Cryptol. ePrint Arch., 2010
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles.
Sci. China Inf. Sci., 2010
Privacy Disclosure Analysis and Control for 2D Contingency Tables Containing Inaccurate Data.
Proceedings of the Privacy in Statistical Databases, 2010
Addressing Leakage of Re-encryption Key in Proxy Re-encryption Using Trusted Computing.
Proceedings of the Trusted Systems - Second International Conference, 2010
Proceedings of the Trusted Systems - Second International Conference, 2010
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
2009
A study of content authentication in proxy-enabled multimedia delivery systems: Model, techniques, and applications.
ACM Trans. Multim. Comput. Commun. Appl., 2009
Secur. Commun. Networks, 2009
Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks.
Proceedings of the Security and Privacy in Communication Networks, 2009
Proceedings of the Provable Security, Third International Conference, 2009
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009
Proceedings of the Information Security, 12th International Conference, 2009
Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing.
Proceedings of the Information Security Practice and Experience, 2009
Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks.
Proceedings of the Information and Communications Security, 11th International Conference, 2009
Proceedings of IEEE International Conference on Communications, 2009
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009
2008
Proceedings of the Information Security, 11th International Conference, 2008
Proceedings of the Information Security Practice and Experience, 2008
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
2007
Proceedings of the Information Security Practice and Experience, 2007
Achieving End-to-End Authentication in Intermediary-Enabled Multimedia Delivery Systems.
Proceedings of the Information Security Practice and Experience, 2007
Proceedings of the Data and Applications Security XXI, 2007
2006
IEEE Trans. Dependable Secur. Comput., 2006
Proceedings of the 2006 ACM CIKM International Conference on Information and Knowledge Management, 2006
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
2005
Tailored reversible watermarking schemes for authentication of electronic clinical atlas.
IEEE Trans. Inf. Technol. Biomed., 2005
A New Architecture for User Authentication and Key Exchange Using Password for Federated Enterprises.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005
Proceedings of the Information Security, 8th International Conference, 2005
Proceedings of the 21st International Conference on Data Engineering, 2005
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005
2004
IEEE Trans. Inf. Technol. Biomed., 2004
New efficient user identification and key distribution scheme providing enhanced security.
Comput. Secur., 2004
Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity.
Proceedings of the Applied Cryptography and Network Security, 2004
2003
Flexible authentication of images.
Proceedings of the Visual Communications and Image Processing 2003, 2003
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003
An invertible watermarking scheme for authentication of Electronic Clinical Brain Atlas.
Proceedings of the 2003 IEEE International Conference on Acoustics, 2003
2002
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002