Yinghui Zhang
Orcid: 0000-0002-5764-3272Affiliations:
- Xi'an University of Posts and Telecommunications, National Engineering Laboratory for Wireless Security, Xi'an, China
According to our database1,
Yinghui Zhang
authored at least 125 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
An Anonymous and Secure Data Transmission Mechanism With Trajectory Tracking for D2D Relay Communication in 3GPP 5G Networks.
IEEE Trans. Intell. Transp. Syst., August, 2024
CEAMP: A Cross-Domain Entity Authentication and Message Protection Framework for Intra-Vehicle Network.
IEEE Trans. Intell. Transp. Syst., July, 2024
UAVA: Unmanned Aerial Vehicle Assisted Vehicular Authentication Scheme in Edge Computing Networks.
IEEE Internet Things J., June, 2024
IEEE Trans. Netw. Serv. Manag., April, 2024
CADFA: A Clock Skew-Based Active Device Fingerprint Authentication Scheme for Class-1 IoT Devices.
IEEE Syst. J., March, 2024
J. Ambient Intell. Humaniz. Comput., January, 2024
DRCLAS: An efficient certificateless aggregate signature scheme with dynamic revocation in vehicular ad-hoc networks.
Veh. Commun., 2024
IEEE Trans. Serv. Comput., 2024
Hierarchal Bilateral Access Control With Constant Size Ciphertexts for Mobile Cloud Computing.
IEEE Trans. Cloud Comput., 2024
Efficient public-key searchable encryption against inside keyword guessing attacks for cloud storage.
J. Syst. Archit., 2024
2023
A Novel Access and Handover Authentication Scheme in UAV-Aided Satellite-Terrestrial Integration Networks Enabling 5G.
IEEE Trans. Netw. Serv. Manag., September, 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Cloud Comput., 2023
Int. J. Intell. Syst., 2023
LK-AKA: A lightweight location key-based authentication and key agreement protocol for S2S communication.
Comput. Commun., 2023
DP-Loc: A Differential Privacy-Based Indoor Localization Scheme with Bilateral Privacy Protection.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023
2022
A Group-Based Multicast Service Authentication and Data Transmission Scheme for 5G-V2X.
IEEE Trans. Intell. Transp. Syst., 2022
IEEE Trans. Ind. Informatics, 2022
Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing.
IEEE Trans. Dependable Secur. Comput., 2022
EAP-DDBA: Efficient Anonymity Proximity Device Discovery and Batch Authentication Mechanism for Massive D2D Communication Devices in 3GPP 5G HetNet.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Lightweight and Expressive Fine-Grained Access Control for Healthcare Internet-of-Things.
IEEE Trans. Cloud Comput., 2022
IEEE Trans. Cloud Comput., 2022
Toward Secure and Privacy-Preserving Cloud Data Sharing: Online/Offline Multiauthority CP-ABE With Hidden Policy.
IEEE Syst. J., 2022
Compact Multiple Attribute-Based Signatures With Key Aggregation and Its Application.
IEEE Syst. J., 2022
An Efficient Certificateless Ring Signcryption Scheme With Conditional Privacy-Preserving in VANETs.
J. Syst. Archit., 2022
Blockchain-Enabled decentralized Attribute-Based access control with policy hiding for smart healthcare.
J. King Saud Univ. Comput. Inf. Sci., 2022
J. Ambient Intell. Humaniz. Comput., 2022
A Novel PUF-Based Group Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks.
IEEE Internet Things J., 2022
Blockchain-based attribute-based keyword searchable encryption for health cloud system.
Int. J. Embed. Syst., 2022
Proceedings of the Security and Privacy in Social Networks and Big Data, 2022
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022
2021
Outsourcing Service Fair Payment Based on Blockchain and Its Applications in Cloud Computing.
IEEE Trans. Serv. Comput., 2021
On the Security of Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-Owner Setting.
IEEE Trans. Dependable Secur. Comput., 2021
CPPHA: Capability-Based Privacy-Protection Handover Authentication Mechanism for SDN-Based 5G HetNets.
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
Peer-to-Peer Netw. Appl., 2021
Inf. Sci., 2021
O<sup>3</sup>-R-CP-ABE: An Efficient and Revocable Attribute-Based Encryption Scheme in the Cloud-Assisted IoMT System.
IEEE Internet Things J., 2021
IEEE Internet Things J., 2021
Int. J. Inf. Sec., 2021
ACM Comput. Surv., 2021
Flexible and anonymous network slicing selection for C-RAN enabled 5G service authentication.
Comput. Commun., 2021
2020
An attribute-based encryption scheme with multiple authorities on hierarchical personal health record in cloud.
J. Supercomput., 2020
Inf. Sci., 2020
Lightweight and Privacy-Aware Fine-Grained Access Control for IoT-Oriented Smart Health.
IEEE Internet Things J., 2020
LSAA: A Lightweight and Secure Access Authentication Scheme for Both UE and mMTC Devices in 5G Networks.
IEEE Internet Things J., 2020
An Efficient Mobile Location-based Service Framework for Resource-constrained Devices.
Int. J. Netw. Secur., 2020
A lightweight verifiable outsourced decryption of attribute-based encryption scheme for blockchain-enabled wireless body area network in fog computing.
Int. J. Distributed Sens. Networks, 2020
Sci. China Inf. Sci., 2020
IEEE Access, 2020
Cloud-Assisted Privacy Protection for Data Retrieval Against Keyword Guessing Attacks.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020
Catch You If You Deceive Me: Verifiable and Privacy-Aware Truth Discovery in Crowdsensing Systems.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
2019
Efficient and Robust Certificateless Signature for Data Crowdsensing in Cloud-Assisted Industrial IoT.
IEEE Trans. Ind. Informatics, 2019
J. Comput. Secur., 2019
Traceable Dynamic Public Auditing with Identity Privacy Preserving for Cloud Storage.
KSII Trans. Internet Inf. Syst., 2019
Comments on "A Large-Scale Concurrent Data Anonymous Batch Verification Scheme for Mobile Healthcare Crowd Sensing".
IEEE Internet Things J., 2019
SybSub: Privacy-Preserving Expressive Task Subscription With Sybil Detection in Crowdsourcing.
IEEE Internet Things J., 2019
Int. J. Found. Comput. Sci., 2019
Secure and flexible keyword search over encrypted data with outsourced decryption in Internet of things.
Ann. des Télécommunications, 2019
Ann. des Télécommunications, 2019
PPSHA: Privacy preserving secure handover authentication scheme for all application scenarios in LTE-A networks.
Ad Hoc Networks, 2019
Certificateless Multi-Party Authenticated Encryption for NB-IoT Terminals in 5G Networks.
IEEE Access, 2019
IEEE Access, 2019
Efficient Privacy-Preserving Access Control of Mobile Multimedia Data in Cloud Computing.
IEEE Access, 2019
Generic Construction of ElGamal-Type Attribute-Based Encryption Schemes with Revocability and Dual-Policy.
Proceedings of the Security and Privacy in Communication Networks, 2019
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019
Lightweight Attribute-Based Keyword Search with Policy Protection for Cloud-Assisted IoT.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
2018
Efficient and secure big data storage system with leakage resilience in cloud computing.
Soft Comput., 2018
Privacy-Preserving Data Aggregation against False Data Injection Attacks in Fog Computing.
Sensors, 2018
Hidden Policy Attribute-Based Data Sharing with Direct Revocation and Keyword Search in Cloud Computing.
Sensors, 2018
Secure Deduplication Based on Rabin Fingerprinting over Wireless Sensing Data in Cloud Computing.
Secur. Commun. Networks, 2018
Secur. Commun. Networks, 2018
灵活访问且模糊可搜索的EHR云服务系统 (Flexibly Accessed and Vaguely Searchable EHR Cloud Service System).
计算机科学, 2018
Privacy-preserving communication and power injection over vehicle networks and 5G smart grid slice.
J. Netw. Comput. Appl., 2018
Secure smart health with privacy-aware aggregate authentication and access control in Internet of Things.
J. Netw. Comput. Appl., 2018
J. Netw. Comput. Appl., 2018
J. Ambient Intell. Humaniz. Comput., 2018
Blockchain based efficient and robust fair payment for outsourcing services in cloud computing.
Inf. Sci., 2018
Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control.
IEEE Internet Things J., 2018
Secure and fine-grained access control on e-healthcare records in mobile cloud computing.
Future Gener. Comput. Syst., 2018
Efficient and robust attribute-based encryption supporting access policy hiding in Internet of Things.
Future Gener. Comput. Syst., 2018
Comput. Secur., 2018
Fine-Grained Access Control Systems Suitable for Resource-Constrained Users in Cloud Computing.
Comput. Informatics, 2018
Efficient and Privacy-Preserving Medical Data Sharing in Internet of Things With Limited Computing Power.
IEEE Access, 2018
TKSE: Trustworthy Keyword Search Over Encrypted Data With Two-Side Verifiability via Blockchain.
IEEE Access, 2018
PUSC: Privacy-Preserving User-Centric Skyline Computation Over Multiple Encrypted Domains.
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the Information Security Practice and Experience, 2018
Proceedings of the Information Security Practice and Experience, 2018
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
Proceedings of the IEEE Global Communications Conference, 2018
2017
Pers. Ubiquitous Comput., 2017
Efficient and Privacy-Aware Power Injection over AMI and Smart Grid Slice in Future 5G Networks.
Mob. Inf. Syst., 2017
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing.
Inf. Sci., 2017
Int. J. Embed. Syst., 2017
Characterizing Linear Structures of Boolean Functions from Arithmetic Walsh Transform.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
PADA: Privacy-Aware Data Aggregation with Efficient Communication for Power Injection in 5G Smart Grid Slice.
Proceedings of the International Conference on Networking and Network Applications, 2017
Efficient privacy-preserving decentralized ABE supporting expressive access structures.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017
Privacy-Preserving Attribute-Based Encryption Supporting Expressive Access Structures.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017
Anonymous Attribute-Based Encryption with Large Universe and Threshold Access Structures.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017
An Efficient and Secure Deduplication Scheme Based on Rabin Fingerprinting in Cloud Storage.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017
2016
Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing.
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
Pervasive Mob. Comput., 2016
Efficient and Expressive Anonymous Attribute-Based Encryption for Mobile Cloud Computing.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016
Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
Privacy-aware attribute-based PHR sharing with user accountability in cloud computing.
J. Supercomput., 2015
2014
J. Internet Serv. Inf. Secur., 2014
KSII Trans. Internet Inf. Syst., 2014
Efficient and robust identity-based handoff authentication for EAP-based wireless networks.
Concurr. Comput. Pract. Exp., 2014
Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks.
Comput. Networks, 2014
Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts.
Proceedings of the Provable Security - 8th International Conference, 2014
2013
Int. J. Grid Util. Comput., 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
Identity-based construction for secure and efficient handoff authentication schemes in wireless networks.
Secur. Commun. Networks, 2012
Proceedings of the Network and System Security - 6th International Conference, 2012