Yong Yu(禹勇)
Yong Yu(禹勇)
在 snnu.edu.cn 的电子邮件经过验证 - 首页
Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage
Y Yu, MH Au, G Ateniese, X Huang, W Susilo, Y Dai, G Min
IEEE Transactions on Information Forensics and Security 12 (4), 767-778, 2016
Blockchain-based solutions to security and privacy issues in the internet of things
Y Yu, Y Li, J Tian, J Liu
IEEE Wireless Communications 25 (6), 12-18, 2018
Fuzzy identity-based data integrity auditing for reliable cloud storage systems
Y Li, Y Yu, G Min, W Susilo, J Ni, KKR Choo
IEEE Transactions on Dependable and Secure Computing 16 (1), 72-83, 2017
A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing
K Liang, MH Au, JK Liu, W Susilo, DS Wong, G Yang, Y Yu, A Yang
Future Generation Computer Systems 52, 95-108, 2015
Identity based signcryption scheme without random oracles
Y Yu, B Yang, Y Sun, S Zhu
Computer Standards & Interfaces 31 (1), 56-62, 2009
Cloud data integrity checking with an identity-based auditing mechanism from RSA
Y Yu, L Xue, MH Au, W Susilo, J Ni, Y Zhang, AV Vasilakos, J Shen
Future Generation Computer Systems 62, 85-91, 2016
Providing task allocation and secure deduplication for mobile crowdsensing via fog computing
J Ni, K Zhang, Y Yu, X Lin, XS Shen
IEEE Transactions on Dependable and Secure Computing 17 (3), 581-594, 2018
Efficient attribute-based encryption with attribute revocation for assured data deletion
L Xue, Y Yu, Y Li, MH Au, X Du, B Yang
Information Sciences 479, 640-650, 2019
Machine learning based privacy-preserving fair data trading in big data market
Y Zhao, Y Yu, Y Li, G Han, X Du
Information Sciences 478, 449-460, 2019
Privacy-preserving smart parking navigation supporting efficient driving guidance retrieval
J Ni, K Zhang, Y Yu, X Lin, X Shen
IEEE Transactions on Vehicular Technology 67 (7), 6504-6517, 2018
Secure pub-sub: Blockchain-based fair payment with reputation for reliable cyber physical systems
Y Zhao, Y Li, Q Mu, B Yang, Y Yu
IEEE Access 6, 12295-12303, 2018
Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage
Y Yu, MH Au, Y Mu, S Tang, J Ren, W Susilo, L Dong
International Journal of Information Security 14, 307-318, 2015
Efficient identity-based signcryption scheme for multiple receivers
Y Yu, B Yang, X Huang, M Zhang
Autonomic and Trusted Computing: 4th International Conference, ATC 2007 …, 2007
On the security of an efficient dynamic auditing protocol in cloud storage
J Ni, Y Yu, Y Mu, Q Xia
IEEE Transactions on Parallel and Distributed Systems 25 (10), 2760-2761, 2013
Traceable monero: Anonymous cryptocurrency with enhanced accountability
Y Li, G Yang, W Susilo, Y Yu, MH Au, D Liu
IEEE Transactions on Dependable and Secure Computing 18 (2), 679-691, 2019
Assured data deletion with fine-grained access control for fog-based industrial applications
Y Yu, L Xue, Y Li, X Du, M Guizani, B Yang
IEEE Transactions on Industrial Informatics 14 (10), 4538-4547, 2018
Attribute-based cloud data integrity auditing for secure outsourced storage
Y Yu, Y Li, B Yang, W Susilo, G Yang, J Bai
IEEE Transactions on Emerging Topics in Computing 8 (2), 377-390, 2017
Improved security of a dynamic remote data possession checking protocol for cloud storage
Y Yu, J Ni, MH Au, H Liu, H Wang, C Xu
Expert systems with applications 41 (17), 7789-7796, 2014
On the security of auditing mechanisms for secure cloud storage
Y Yu, L Niu, G Yang, Y Mu, W Susilo
Future Generation Computer Systems 30, 127-132, 2014
Improved certificateless signature scheme provably secure in the standard model
Y Yu, Y Mu, G Wang, Q Xia, B Yang
IET Information Security 6 (2), 102-110, 2012
文章 1–20