Yongquan Cai

Orcid: 0000-0002-7528-0364

According to our database1, Yongquan Cai authored at least 30 papers between 2006 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
An efficient access control scheme based on CP-ABE with supporting attribute change in cloud storage systems.
Int. J. Wirel. Mob. Comput., 2019

ID-based dynamic replicated data auditing for the cloud.
Concurr. Comput. Pract. Exp., 2019

2018
Secure Self-healing Group Key Distribution Scheme with Constant Storage for SCADA Systems in Smart Grid.
Wirel. Pers. Commun., 2018

Research on parallelisation of collaborative filtering recommendation algorithm based on Spark.
Int. J. Wirel. Mob. Comput., 2018

Wireless ad hoc network: detection of malicious node by using neighbour-based authentication approach.
Int. J. Wirel. Mob. Comput., 2018

Cloud outsourcing computing security protocol of matrix multiplication computation based on similarity transformation.
Int. J. Wirel. Mob. Comput., 2018

Information hiding: a novel algorithm for enhancement of cover text capacity by using unicode characters.
Int. J. Inf. Comput. Secur., 2018

Information hiding: Arabic text steganography by using Unicode characters to hide secret data.
Int. J. Electron. Secur. Digit. Forensics, 2018

2017
Efficient and Secure Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy.
KSII Trans. Internet Inf. Syst., 2017

Efficient public auditing for data migration across cloud systems.
Int. J. Wirel. Mob. Comput., 2017

A Novel Anti-Obfuscation Model for Detecting Malicious Code.
Int. J. Open Source Softw. Process., 2017

Detection of Malicious Node in Wireless Ad Hoc Network by Using Acknowledgement Based Approach.
Proceedings of the 7th International Conference on Communication and Network Security, 2017

2016
Credit scoring using incremental learning algorithm for SVDD.
Proceedings of the International Conference on Computer, 2016

2015
Circumventing sinkhole attack in ad hoc networks.
Int. J. Wirel. Mob. Comput., 2015

Using different techniques of steganography deducting null cipher in plain text.
Int. J. Wirel. Mob. Comput., 2015

Optimal parameter settings for bat algorithm.
Int. J. Bio Inspired Comput., 2015

2014
Using hybrid Neural Network to address Chinese Named Entity Recognition.
Proceedings of the IEEE 3rd International Conference on Cloud Computing and Intelligence Systems, 2014

2013
Rational Multi-Secret Sharing Scheme in Standard Point-to-Point Communication Networks.
Int. J. Found. Comput. Sci., 2013

2012
An Identification System of Original Painting Artworks Based on Smart Card.
J. Networks, 2012

Rational Multi-Secret Sharing Scheme Based On Bit Commitment Protocol.
J. Networks, 2012

2011
Rational Secret Sharing Scheme Based on Probability Encryption without Trusted Center.
J. Networks, 2011

A Threshold Signature Scheme with a Weakened Trusted Party.
J. Networks, 2011

Verifiable Rational Multi-secret Sharing Scheme.
Proceedings of the Information Computing and Applications, 2011

A Rational Secret Sharing Scheme Based on Repeated Game.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
A New Threshold Signature Scheme to Withstand the Conspiracy Attack.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

Game Analysis of Non-trusted Threshold Authentication Scheme.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

2008
The Banknote Anti-forgery System Based on Digital Signature Algorithms.
Proceedings of the Intelligence and Security Informatics, 2008

Identity-Based Conference Key Distribution Scheme Using Sealed Lock.
Proceedings of the 7th IEEE/ACIS International Conference on Computer and Information Science, 2008

2007
An Improved Identity-based Fault-tolerant Conference Key Distribution Scheme.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

2006
An Improved Anonymous ID-Based Key Issuing Protocol.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006


  Loading...