Yin Li
Orcid: 0000-0002-9529-8481Affiliations:
- Dongguan University of Technology, School of Cyberspace Security, China
- Xinyang Normal University, School of Computer and Information Technology, China
- Shanghai Jiao Tong University, China (PhD 2011)
According to our database1,
Yin Li
authored at least 42 papers
between 2015 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Prism: Privacy-Preserving and Verifiable Set Computation Over Multi-Owner Secret Shared Outsourced Databases.
IEEE Trans. Dependable Secur. Comput., 2024
2023
Secret-shared RAM indefinite private and secure RAM execution of perfectly unrevealed programs.
Acta Informatica, March, 2023
Proc. VLDB Endow., 2023
Prism: Private Set Intersection and Union with Aggregation over Multi-Owner Outsourced Data.
IACR Cryptol. ePrint Arch., 2023
2022
Obscure: Information-Theoretically Secure, Oblivious, and Verifiable Aggregation Queries on Secret-Shared Outsourced Data.
IEEE Trans. Knowl. Data Eng., 2022
IEEE Trans. Computers, 2022
Symmetry, 2022
2021
IEEE Trans. Dependable Secur. Comput., 2021
Efficient Hybrid <i>GF</i>(2<i><sup>m</sup></i>) Multiplier for All-One Polynomial Using Varied Karatsuba Algorithm.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021
Proceedings of the SIGMOD '21: International Conference on Management of Data, 2021
2020
IEEE Trans. Very Large Scale Integr. Syst., 2020
IEEE Trans. Circuits Syst. I Regul. Pap., 2020
Efficient Searchable Symmetric Encryption Supporting Dynamic Multikeyword Ranked Search.
Secur. Commun. Networks, 2020
Mob. Inf. Syst., 2020
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020
IACR Cryptol. ePrint Arch., 2020
Obscure: Information-Theoretically Secure, Oblivious, and Verifiable Aggregation Queries on Secret-Shared Outsourced Data - Full Version.
CoRR, 2020
Obscure: Information-Theoretically Secure, Oblivious, and Verifiable Aggregation Queries.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020
2019
Secure and Efficient Searchable Public Key Encryption for Resource Constrained Environment Based on Pairings under Prime Order Group.
Secur. Commun. Networks, 2019
Proc. VLDB Endow., 2019
SLS-STQ: A Novel Scheme for Securing Spatial-Temporal Top-k Queries in TWSNs-Based Edge Computing Systems.
IEEE Internet Things J., 2019
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
IACR Cryptol. ePrint Arch., 2019
IEEE Access, 2019
2018
Achieve Adaptive Data Storage and Retrieval Using Mobile Sinks in Wireless Sensor Networks.
Wirel. Pers. Commun., 2018
Efficient Nonrecursive Bit-Parallel Karatsuba Multiplier for a Special Class of Trinomials.
VLSI Design, 2018
A Survey on Data Storage and Information Discovery in the WSANs-Based Edge Computing Systems.
Sensors, 2018
A Comparative Study on Two Typical Schemes for Securing Spatial-Temporal Top-<i>k</i> Queries in Two-Tiered Mobile Wireless Sensor Networks.
Sensors, 2018
Conjunctive and Disjunctive Keyword Search over Encrypted Mobile Cloud Data in Public Key System.
Mob. Inf. Syst., 2018
Efficient Public Key Encryption with Disjunctive Keywords Search Using the New Keywords Conversion Method.
Inf., 2018
Future Gener. Comput. Syst., 2018
N-Term Karatsuba Algorithm and its Application to Multiplier Designs for Special Trinomials.
IEEE Access, 2018
IEEE Access, 2018
2017
IEEE Trans. Computers, 2017
IACR Cryptol. ePrint Arch., 2017
2016
Magnifying computing gaps: Establishing encrypted communication over unidirectional channels.
Theor. Comput. Sci., 2016
IACR Cryptol. ePrint Arch., 2016
Private and Secure Secret Shared MapReduce (Extended Abstract) - (Extended Abstract).
Proceedings of the Data and Applications Security and Privacy XXX, 2016
2015