Yi Wang

Orcid: 0000-0002-7456-2677

Affiliations:
  • National University of Defence Technology, School of Computer, Changsha, China


According to our database1, Yi Wang authored at least 18 papers between 2017 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
REEDS: An Efficient Revocable End-to-End Encrypted Message Distribution System for IoT.
IEEE Trans. Dependable Secur. Comput., 2024

Parameter-Hiding Order-Revealing Encryption without Pairings.
IACR Cryptol. ePrint Arch., 2024

Secure Key Exchange via Transparent Reverse Firewalls.
Proceedings of the Data Security and Privacy Protection - Second International Conference, 2024

An Efficient Hardware Implementation of Crystal-Dilithium on FPGA.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024

Subverting Cryptographic Protocols from a Fine-Grained Perspective- A Case Study on 2-Party ECDSA.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024

2023
Sender-Anamorphic Encryption Reformulated: Achieving Robust and Generic Constructions.
IACR Cryptol. ePrint Arch., 2023

Secure Approximate Nearest Neighbor Search with Locality-Sensitive Hashing.
Proceedings of the Computer Security - ESORICS 2023, 2023

2022
Secure Anonymous Communication on Corrupted Machines With Reverse Firewalls.
IEEE Trans. Dependable Secur. Comput., 2022

Asymmetric subversion attacks on signature and identification schemes.
Pers. Ubiquitous Comput., 2022

Algorithm Substitution Attacks on Identity-Based Encryption.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2022

Substitution Attacks Against Sigma Protocols.
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022

2021
Receiver-Anonymity in Rerandomizable RCCA-Secure Cryptosystems Resolved.
IACR Cryptol. ePrint Arch., 2021

Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-secure IBE.
IACR Cryptol. ePrint Arch., 2021

2020
Security of Auditing Protocols Against Subversion Attacks.
Int. J. Found. Comput. Sci., 2020

Editorial of special issue on time-sensitive networking.
CCF Trans. Netw., 2020

2019
A Practical Authentication Framework for VANETs.
Secur. Commun. Networks, 2019

2018
Asymmetric Subversion Attacks on Signature Schemes.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Deja Q Encore RIBE: Anonymous Revocable Identity-Based Encryption with Short Parameters.
Proceedings of the 2017 IEEE Global Communications Conference, 2017


  Loading...