Yuan Zhang
Orcid: 0000-0002-7909-9845Affiliations:
- University of Electronic Science and Technology of China, Center for Cyber Security, Chengdu, China
According to our database1,
Yuan Zhang
authored at least 67 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Blockchain-Based Proxy-Oriented Data Integrity Checking Mechanism in Cloud-Assisted Intelligent Transportation Systems.
IEEE Trans. Intell. Transp. Syst., November, 2024
IEEE Trans. Ind. Informatics, August, 2024
Blockchain-Based Portable Authenticated Data Transmission for Mobile Edge Computing: A Universally Composable Secure Solution.
IEEE Trans. Computers, April, 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
PrivSSO: Practical Single-Sign-On Authentication Against Subscription/Access Pattern Leakage.
IEEE Trans. Inf. Forensics Secur., 2024
IB-IADR: Enabling Identity-Based Integrity Auditing and Data Recovery With Fault Localization for Multicloud Storage.
IEEE Internet Things J., 2024
CoRR, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IEEE International Conference on Communications, 2024
Proceedings of the IEEE International Conference on Communications, 2024
2023
HealthFort: A Cloud-Based eHealth System With Conditional Forward Transparency and Secure Provenance via Blockchain.
IEEE Trans. Mob. Comput., November, 2023
Edge-Cloud-Assisted Certificate Revocation Checking: An Efficient Solution Against Irresponsible Service Providers.
IEEE Internet Things J., September, 2023
Backdoor-Resistant Public Data Integrity Verification Scheme Based on Smart Contracts.
IEEE Internet Things J., August, 2023
LAMA: A secure lattice-based authentication scheme for cloud storage against misbehaved private key generator.
J. Ambient Intell. Humaniz. Comput., July, 2023
Blockchain-Based Transparent Integrity Auditing and Encrypted Deduplication for Cloud Storage.
IEEE Trans. Serv. Comput., 2023
There Is Always a Way Out! Destruction-Resistant Key Management: Formal Definition and Practical Instantiation.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the 34th IEEE Annual International Symposium on Personal, 2023
2022
DOPIV: Post-Quantum Secure Identity-Based Data Outsourcing with Public Integrity Verification in Cloud Storage.
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Lightweight Multidimensional Encrypted Data Aggregation Scheme With Fault Tolerance for Fog-Assisted Smart Grids.
IEEE Syst. J., 2022
Efficient Data Retrieval Over Encrypted Attribute-Value Type Databases in Cloud-Assisted Ehealth Systems.
IEEE Syst. J., 2022
Proceedings of the IEEE International Conference on Communications, 2022
2021
PROTECT: Efficient Password-Based Threshold Single-Sign-On Authentication for Mobile Users against Perpetual Leakage.
IEEE Trans. Mob. Comput., 2021
Cryptoanalysis of an Authenticated Data Structure Scheme With Public Privacy-Preserving Auditing.
IEEE Trans. Inf. Forensics Secur., 2021
FS-PEKS: Lattice-Based Forward Secure Public-Key Encryption with Keyword Search for Cloud-Assisted Industrial Internet of Things.
IEEE Trans. Dependable Secur. Comput., 2021
CIPPPA: Conditional Identity Privacy-Preserving Public Auditing for Cloud-Based WBANs Against Malicious Auditors.
IEEE Trans. Cloud Comput., 2021
Blockchain-Assisted Public-Key Encryption with Keyword Search Against Keyword Guessing Attacks for Cloud Storage.
IEEE Trans. Cloud Comput., 2021
Blockchain-Based Public Integrity Verification for Cloud Storage against Procrastinating Auditors.
IEEE Trans. Cloud Comput., 2021
Key-Leakage Resilient Encrypted Data Aggregation With Lightweight Verification in Fog-Assisted Smart Grids.
IEEE Internet Things J., 2021
A blockchain-based access control and intrusion detection framework for satellite communication systems.
Comput. Commun., 2021
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021
A Blockchain-based Online Transaction System for Physical Products Trading with Fairness, Privacy Preservation, and Auditability.
Proceedings of the 9th IEEE International Conference on Smart City and Informatization, 2021
Proceedings of the IEEE Global Communications Conference, 2021
2020
Wireless Networks, Springer, ISBN: 978-981-15-4373-9, 2020
Chronos$^{{\mathbf +}}$+: An Accurate Blockchain-Based Time-Stamping Scheme for Cloud Storage.
IEEE Trans. Serv. Comput., 2020
Functional encryption with application to machine learning: simple conversions from generic functions to quadratic functions.
Peer-to-Peer Netw. Appl., 2020
Public data integrity auditing without homomorphic authenticators from indistinguishability obfuscation.
Int. J. Inf. Sec., 2020
LDVAS: Lattice-Based Designated Verifier Auditing Scheme for Electronic Medical Data in Cloud-Assisted WBANs.
IEEE Access, 2020
Multi-user Dynamic Symmetric Searchable Encryption for Attribute-Value Type Database in Cloud Storage.
Proceedings of the Security and Privacy in Digital Economy, 2020
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020
Blockchain-Based Efficient Public Integrity Auditing for Cloud Storage Against Malicious Auditors.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020
2019
CSED: Client-Side encrypted deduplication scheme based on proofs of ownership for cloud storage.
J. Inf. Secur. Appl., 2019
Inf. Sci., 2019
An efficient \(\mathcal{iO}\) -based data integrity verification scheme for cloud storage.
Sci. China Inf. Sci., 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Secure Encrypted Data Deduplication for Cloud Storage against Compromised Key Servers.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
2018
HealthDep: An Efficient and Secure Deduplication Scheme for Cloud-Assisted eHealth Systems.
IEEE Trans. Ind. Informatics, 2018
KSII Trans. Internet Inf. Syst., 2018
A dynamic and non-interactive boolean searchable symmetric encryption in multi-client setting.
J. Inf. Secur. Appl., 2018
IEEE Access, 2018
Proceedings of the Information and Communications Security - 20th International Conference, 2018
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
2017
Efficient Integrity Verification Scheme for Medical Data Records in Cloud-Assisted Wireless Medical Sensor Networks.
Wirel. Pers. Commun., 2017
Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation.
IEEE Trans. Inf. Forensics Secur., 2017
Fuzzy identity-based signature scheme from lattice and its application in biometric authentication.
KSII Trans. Internet Inf. Syst., 2017
2016
IEEE Cloud Comput., 2016
2015
SCLPV: Secure Certificateless Public Verification for Cloud-Based Cyber-Physical-Social Systems Against Malicious Auditors.
IEEE Trans. Comput. Soc. Syst., 2015
J. Inf. Secur. Appl., 2015
2014
KSII Trans. Internet Inf. Syst., 2014
2011
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011