Yong Yu(禹勇)
Yong Yu(禹勇)
Verified email at snnu.edu.cn - Homepage
Cited by
Cited by
Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage
Y Yu, MH Au, G Ateniese, X Huang, W Susilo, Y Dai, G Min
IEEE Transactions on Information Forensics and Security 12 (4), 767-778, 2016
Fuzzy identity-based data integrity auditing for reliable cloud storage systems
Y Li, Y Yu, G Min, W Susilo, J Ni, KKR Choo
IEEE Transactions on Dependable and Secure Computing 16 (1), 72-83, 2017
Blockchain-based solutions to security and privacy issues in the internet of things
Y Yu, Y Li, J Tian, J Liu
IEEE Wireless Communications 25 (6), 12-18, 2018
A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing
K Liang, MH Au, JK Liu, W Susilo, DS Wong, G Yang, Y Yu, A Yang
Future Generation Computer Systems 52, 95-108, 2015
Identity based signcryption scheme without random oracles
Y Yu, B Yang, Y Sun, S Zhu
Computer Standards & Interfaces 31 (1), 56-62, 2009
Cloud data integrity checking with an identity-based auditing mechanism from RSA
Y Yu, L Xue, MH Au, W Susilo, J Ni, Y Zhang, AV Vasilakos, J Shen
Future Generation Computer Systems 62, 85-91, 2016
Providing task allocation and secure deduplication for mobile crowdsensing via fog computing
J Ni, K Zhang, Y Yu, X Lin, XS Shen
IEEE Transactions on Dependable and Secure Computing 17 (3), 581-594, 2018
Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage
Y Yu, MH Au, Y Mu, S Tang, J Ren, W Susilo, L Dong
International Journal of Information Security 14 (4), 307-318, 2015
Efficient attribute-based encryption with attribute revocation for assured data deletion
L Xue, Y Yu, Y Li, MH Au, X Du, B Yang
Information Sciences 479, 640-650, 2019
Efficient identity-based signcryption scheme for multiple receivers
Y Yu, B Yang, X Huang, M Zhang
International Conference on Autonomic and Trusted Computing, 13-21, 2007
Improved security of a dynamic remote data possession checking protocol for cloud storage
Y Yu, J Ni, MH Au, H Liu, H Wang, C Xu
Expert systems with applications 41 (17), 7789-7796, 2014
On the security of an efficient dynamic auditing protocol in cloud storage
J Ni, Y Yu, Y Mu, Q Xia
IEEE Transactions on Parallel and Distributed Systems 25 (10), 2760-2761, 2013
Improved certificateless signature scheme provably secure in the standard model
Y Yu, Y Mu, G Wang, Q Xia, B Yang
IET Information Security 6 (2), 102-110, 2012
Privacy-preserving smart parking navigation supporting efficient driving guidance retrieval
J Ni, K Zhang, Y Yu, X Lin, X Shen
IEEE Transactions on Vehicular Technology 67 (7), 6504-6517, 2018
On the security of auditing mechanisms for secure cloud storage
Y Yu, L Niu, G Yang, Y Mu, W Susilo
Future Generation Computer Systems 30, 127-132, 2014
Secure pub-sub: Blockchain-based fair payment with reputation for reliable cyber physical systems
Y Zhao, Y Li, Q Mu, B Yang, Y Yu
IEEE Access 6, 12295-12303, 2018
An efficient anonymous proxy signature scheme with provable security
Y Yu, C Xu, X Huang, Y Mu
Computer Standards & Interfaces 31 (2), 348-353, 2009
Privacy preserving cloud data auditing with efficient key update
Y Li, Y Yu, B Yang, G Min, H Wu
Future Generation Computer Systems 78, 789-798, 2018
Remote data possession checking with enhanced security for cloud storage
Y Yu, Y Zhang, J Ni, MH Au, L Chen, H Liu
Future Generation Computer Systems 52, 77-85, 2015
Designated verifier proxy signature scheme without random oracles
Y Yu, C Xu, X Zhang, Y Liao
Computers & Mathematics with Applications 57 (8), 1352-1364, 2009
The system can't perform the operation now. Try again later.
Articles 1–20