Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Yong Li
    Last name: 0002
    DBLP: l/YongLi2
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 18 of 18  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Yong Li 0002, Ge Yao, Huaqun Wang, Changlu Lin.
    Large Branching Tree Based Dynamic Provable Data Possession Scheme.
    J. Inf. Sci. Eng. 2017, Volume 33 (0) 2017
    Conference paper
    Ge Yao, Yong Li 0002, Linan Lei, Huaqun Wang, Changlu Lin.
    An Efficient Dynamic Provable Data Possession Scheme in Cloud Storage.
    Green, Pervasive, and Cloud Computing - 11th International Conference, GPC 2016, Xi'an, China, May 6-8, 2016. Proceedings 2016 (0) 2016
    Journal article
    Changlu Lin, Yong Li 0002, Kewei Lv, Chin-Chen Chang.
    Ciphertext-Auditable Identity-Based Encryption.
    I. J. Network Security 2015, Volume 17 (0) 2015
    Journal article
    Lein Harn, Changlu Lin, Yong Li 0002.
    Fair secret reconstruction in (t, n) secret sharing.
    J. Inf. Sec. Appl. 2015, Volume 23 (0) 2015
    Journal article
    Huiyan Chen, Yong Li 0002, Jinping Ren.
    A Practical Identity-based Signcryption Scheme.
    I. J. Network Security 2013, Volume 15 (0) 2013
    Conference paper
    Xiuqun Wang, Changlu Lin, Yong Li 0002.
    Proactive Secret Sharing without a Trusted Party.
    2013 5th International Conference on Intelligent Networking and Collaborative Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013 2013 (0) 2013
    Conference paper
    Weijia Wang, Lei Hu, Yong Li 0002.
    Privacy-Preserving Password-Based Authenticated Key Exchange in the Three-Party Setting.
    Network and System Security - 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings 2013 (0) 2013
    Conference paper
    Changlu Lin, Yong Li 0002, Sriramkrishnan Srinivasan, Li Lu.
    Analysis on Token-Controlled Public Key Encryption.
    8th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2012, Chengdu, China, December 14-16, 2012 2012 (0) 2012
    Conference paper
    Fei Tang, Changlu Lin, Yong Li 0002, Shengyuan Zhang.
    Identity-Based Strong Designated Verifier Signature Scheme with Full Non-Delegatability.
    IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, Changsha, China, 16-18 November, 2011 2011 (0) 2011
    Conference paper
    Weijia Wang, Lei Hu, Yong Li 0002.
    How to Construct Secure and Efficient Three-Party Password-Based Authenticated Key Exchange Protocols.
    Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers 2011 (0) 2010
    Conference paper
    Weijia Wang, Lei Hu, Yong Li 0002.
    Security Analysis of a Dynamic Program Update Protocol for Wireless Sensor Networks.
    IEEE Communications Letters 2010, Volume 14 (0) 2010
    Conference paper
    Weijia Wang, Yong Li 0002, Lei Hu, Li Lu.
    Storage-Awareness: RFID Private Authentication based on Sparse Tree.
    Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SECPerU 2007, Istanbul, Turkey, July 19, 2007 2007 (0) 2007
    Conference paper
    Weijia Wang, Lei Hu, Yong Li 0002.
    Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA Setting.
    Information Security and Cryptology, Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers 2008 (0) 2007
    Conference paper
    Yong Li 0002, Huiyan Chen.
    Efficient Identity-based Signature Scheme with Partial Message Recovery.
    Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2007, July 30 - August 1, 2007, Qingdao, China 2007 (0) 2007
    Conference paper
    Yong Li 0002.
    Non-interactive Designated Confirmer Signature with Specific Verifier.
    Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2007, July 30 - August 1, 2007, Qingdao, China 2007 (0) 2007
    Conference paper
    Yong Li 0002, Willy Susilo, Yi Mu, Dingyi Pei.
    Designated Verifier Signature: Definition, Framework and New Constructions.
    Ubiquitous Intelligence and Computing, 4th International Conference, UIC 2007, Hong Kong, China, July 11-13, 2007, Proceedings 2007 (0) 2007
    Conference paper
    Yong Li 0002, Helger Lipmaa, Dingyi Pei.
    On Delegatability of Four Designated Verifier Signatures.
    Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings 2005 (0) 2005
    Conference paper
    Yong Li 0002, Dingyi Pei.
    A New Designated Confirmer Signature Variant with Intended Recipient.
    IACR Cryptology ePrint Archive 2004, Volume 2004 (0) 2004
    Show item 1 to 18 of 18  

    Your query returned 18 matches in the database.