Yanjiang Yang
Yanjiang Yang
Huawei Singapore Research Center
Verified email at
Cited by
Cited by
Efficient unidirectional proxy re-encryption
SSM Chow, J Weng, Y Yang, RH Deng
International Conference on Cryptology in Africa, 316-332, 2010
Private query on encrypted data in multi-user settings
F Bao, RH Deng, X Ding, Y Yang
International Conference on Information Security Practice and Experience, 71-85, 2008
Privacy and ownership preserving of outsourced medical data
E Bertino, BC Ooi, Y Yang, RH Deng
21st International Conference on Data Engineering (ICDE'05), 521-532, 2005
Forensic-by-design framework for cyber-physical cloud systems
NH Ab Rahman, WB Glisson, Y Yang, KKR Choo
IEEE Cloud Computing 3 (1), 50-59, 2016
Efficient online/offline identity-based signature for wireless sensor network
JK Liu, J Baek, J Zhou, Y Yang, JW Wong
International Journal of Information Security 9 (4), 287-296, 2010
Multi-user private keyword search for cloud computing
Y Yang, H Lu, J Weng
2011 IEEE third international conference on cloud computing technology and …, 2011
Extended proxy-assisted approach: Achieving revocable fine-grained encryption of cloud data
Y Yang, JK Liu, K Liang, KKR Choo, J Zhou
European symposium on research in computer security, 146-166, 2015
Efficient conditional proxy re-encryption with chosen-ciphertext security
J Weng, Y Yang, Q Tang, RH Deng, F Bao
International Conference on Information Security, 151-166, 2009
Cloud based data sharing with fine-grained proxy re-encryption
Y Yang, H Zhu, H Lu, J Weng, Y Zhang, KKR Choo
Pervasive and Mobile computing 28, 122-134, 2016
SKM: Scalable key management for advanced metering infrastructure in smart grids
Z Wan, G Wang, Y Yang, S Shi
IEEE Transactions on Industrial Electronics 61 (12), 7055-7066, 2014
A practical password-based two-server authentication and key exchange system
Y Yang, RH Deng, F Bao
IEEE Transactions on Dependable and Secure Computing 3 (2), 105-114, 2006
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles
J Weng, M Chen, Y Yang, R Deng, K Chen, F Bao
Science China Information Sciences 53 (3), 593-606, 2010
Tailored reversible watermarking schemes for authentication of electronic clinical atlas
F Bao, RH Deng, BC Ooi, Y Yang
IEEE Transactions on information technology in biomedicine 9 (4), 554-563, 2005
New efficient user identification and key distribution scheme providing enhanced security
Y Yang, S Wang, F Bao, J Wang, RH Deng
Computers & Security 23 (8), 697-704, 2004
A smart-card-enabled privacy preserving e-prescription system
Y Yang, X Han, F Bao, RH Deng
IEEE Transactions on Information Technology in Biomedicine 8 (1), 47-58, 2004
Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity
BM Goi, RCW Phan, Y Yang, F Bao, RH Deng, MU Siddiqi
International Conference on Applied Cryptography and Network Security, 369-382, 2004
A generic scheme for secure data sharing in cloud
Y Yang, Y Zhang
2011 40th International Conference on Parallel Processing Workshops, 145-153, 2011
Towards lightweight anonymous entity authentication for IoT applications
Y Yang, H Cai, Z Wei, H Lu, KKR Choo
Australasian conference on information security and privacy, 265-280, 2016
V2X security: A case study of anonymous authentication
Y Yang, Z Wei, Y Zhang, H Lu, KKR Choo, H Cai
Pervasive and Mobile Computing 41, 259-269, 2017
Towards multi-user private keyword search for cloud computing
Y Yang
2011 IEEE 4th International Conference on Cloud Computing, 758-759, 2011
The system can't perform the operation now. Try again later.
Articles 1–20