Follow
Ya-Nan Li
Ya-Nan Li
Verified email at sydney.edu.au
Title
Cited by
Cited by
Year
A social-network-based cryptocurrency wallet-management scheme
S He, Q Wu, X Luo, Z Liang, D Li, H Feng, H Zheng, Y Li
IEEE Access 6, 7654-7663, 2018
482018
Secure communications in unmanned aerial vehicle network
S He, Q Wu, J Liu, W Hu, B Qin, YN Li
Information Security Practice and Experience: 13th International Conference …, 2017
322017
A decentralized and secure blockchain platform for open fair data trading
YN Li, X Feng, J Xie, H Feng, Z Guan, Q Wu
Concurrency and Computation: Practice and Experience 32 (7), e5578, 2020
252020
CCA updatable encryption against malicious re-encryption attacks
L Chen, Y Li, Q Tang
Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020
192020
Traceable ring signatures: general framework and post-quantum security
H Feng, J Liu, D Li, YN Li, Q Wu
Designs, Codes and Cryptography 89, 1111-1145, 2021
172021
Traceable ring signatures with post-quantum security
H Feng, J Liu, Q Wu, YN Li
Topics in Cryptology–CT-RSA 2020: The Cryptographers’ Track at the RSA …, 2020
172020
Functional privacy-preserving outsourcing scheme with computation verifiability in fog computing
W Tang, B Qin, Y Li, Q Wu
KSII Transactions on Internet and Information Systems (TIIS) 14 (1), 281-298, 2020
52020
{End-to-Same-End} Encryption: Modularly Augmenting an App with an Efficient, Portable, and Blind Cloud Storage
L Chen, YN Li, Q Tang, M Yung
31st USENIX Security Symposium (USENIX Security 22), 2353-2370, 2022
32022
Outsourcing encrypted excel files
YN Li, Q Wu, W Tang, B Qin, Q Wang, M Miao
Information Security Practice and Experience: 13th International Conference …, 2017
22017
The system can't perform the operation now. Try again later.
Articles 1–9