Yanjiang Yang
Yanjiang Yang
Huawei Singapore Research Center
Verified email at
Cited by
Cited by
Efficient unidirectional proxy re-encryption
SSM Chow, J Weng, Y Yang, RH Deng
Progress in Cryptology–AFRICACRYPT 2010: Third International Conference on …, 2010
Private query on encrypted data in multi-user settings
F Bao, RH Deng, X Ding, Y Yang
International Conference on Information Security Practice and Experience, 71-85, 2008
Forensic-by-design framework for cyber-physical cloud systems
NH Ab Rahman, WB Glisson, Y Yang, KKR Choo
IEEE Cloud Computing 3 (1), 50-59, 2016
Privacy and ownership preserving of outsourced medical data
E Bertino, BC Ooi, Y Yang, RH Deng
21st International Conference on Data Engineering (ICDE'05), 521-532, 2005
Efficient online/offline identity-based signature for wireless sensor network
JK Liu, J Baek, J Zhou, Y Yang, JW Wong
International Journal of Information Security 9, 287-296, 2010
Multi-user private keyword search for cloud computing
Y Yang, H Lu, J Weng
2011 IEEE third international conference on cloud computing technology and …, 2011
SKM: Scalable key management for advanced metering infrastructure in smart grids
Z Wan, G Wang, Y Yang, S Shi
IEEE Transactions on Industrial Electronics 61 (12), 7055-7066, 2014
Extended proxy-assisted approach: Achieving revocable fine-grained encryption of cloud data
Y Yang, JK Liu, K Liang, KKR Choo, J Zhou
Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015
Efficient conditional proxy re-encryption with chosen-ciphertext security
J Weng, Y Yang, Q Tang, RH Deng, F Bao
Information Security: 12th International Conference, ISC 2009, Pisa, Italy …, 2009
Cloud based data sharing with fine-grained proxy re-encryption
Y Yang, H Zhu, H Lu, J Weng, Y Zhang, KKR Choo
Pervasive and Mobile computing 28, 122-134, 2016
A practical password-based two-server authentication and key exchange system
Y Yang, RH Deng, F Bao
IEEE Transactions on Dependable and Secure Computing 3 (2), 105-114, 2006
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles
J Weng, M Chen, Y Yang, R Deng, K Chen, F Bao
Science China Information Sciences 53, 593-606, 2010
New efficient user identification and key distribution scheme providing enhanced security
Y Yang, S Wang, F Bao, J Wang, RH Deng
Computers & Security 23 (8), 697-704, 2004
Tailored reversible watermarking schemes for authentication of electronic clinical atlas
F Bao, RH Deng, BC Ooi, Y Yang
IEEE Transactions on information technology in biomedicine 9 (4), 554-563, 2005
A smart-card-enabled privacy preserving e-prescription system
Y Yang, X Han, F Bao, RH Deng
IEEE Transactions on Information Technology in Biomedicine 8 (1), 47-58, 2004
Towards lightweight anonymous entity authentication for IoT applications
Y Yang, H Cai, Z Wei, H Lu, KKR Choo
Information Security and Privacy: 21st Australasian Conference, ACISP 2016 …, 2016
A generic scheme for secure data sharing in cloud
Y Yang, Y Zhang
2011 40th International Conference on Parallel Processing Workshops, 145-153, 2011
Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity
BM Goi, RCW Phan, Y Yang, F Bao, RH Deng, MU Siddiqi
Applied Cryptography and Network Security: Second International Conference …, 2004
V2X security: A case study of anonymous authentication
Y Yang, Z Wei, Y Zhang, H Lu, KKR Choo, H Cai
Pervasive and Mobile Computing 41, 259-269, 2017
Multiuser private queries over encrypted databases
Y Yang, F Bao, X Ding, RH Deng
International Journal of Applied Cryptography 1 (4), 309-319, 2009
The system can't perform the operation now. Try again later.
Articles 1–20