Yue Wang

Affiliations:
  • Xi'an University, School of Information Engineering, China


According to our database1, Yue Wang authored at least 14 papers between 2007 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2019
Layout optimization methodology for ring-based on-chip optical network.
IEICE Electron. Express, 2019

2018
Blockchain-based efficient privacy preserving and data sharing scheme of content-centric network in 5G.
IET Commun., 2018

2016
Low-Power Low-Latency Optical Network Architecture for Memory Access Communication.
JOCN, 2016

A Secure RFID Application Revocation Scheme for IoT.
IEICE Trans. Inf. Syst., 2016

Privacy protection based access control scheme in cloud-based services.
Proceedings of the 2016 IEEE/CIC International Conference on Communications in China, 2016

Cloud-Based Lightweight RFID Healthcare Privacy Protection Protocol.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
Secure and Efficient Personal Health Record Scheme Using Attribute-Based Encryption.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2012
Fairness electronic payment protocol.
Int. J. Grid Util. Comput., 2012

A new proxy blind signature scheme.
Int. J. Grid Util. Comput., 2012

2011
Abuse-freeness Electronic Payment Protocol.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

Forward Secure Proxy Blind Signature Scheme.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

2009
A New Abuse-Free Fair Electronic Payment Protocol.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Security Analysis of the Kerberos Protocol Using BAN Logic.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2007
Adaptive Encrypted Information Hiding Scheme for Images.
Proceedings of the Computational Intelligence and Security, International Conference, 2007


  Loading...