Obserwuj
Yangguang Tian
Tytuł
Cytowane przez
Cytowane przez
Rok
Privacy-preserving communication and power injection over vehicle networks and 5G smart grid slice
Y Zhang, J Li, D Zheng, P Li, Y Tian
Journal of Network and Computer Applications 122, 50-60, 2018
862018
Faster authenticated key agreement with perfect forward secrecy for industrial internet-of-things
Z Yang, J He, Y Tian, J Zhou
IEEE Transactions on Industrial Informatics 16 (10), 6584-6596, 2019
532019
Policy-based chameleon hash for blockchain rewriting with black-box accountability
Y Tian, N Li, Y Li, P Szalachowski, J Zhou
Proceedings of the 36th Annual Computer Security Applications Conference …, 2020
402020
Mobiceal: Towards secure and practical plausibly deniable encryption on mobile devices
B Chang, F Zhang, B Chen, Y Li, WT Zhu, Y Tian, Z Wang, A Ching
2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018
272018
Privacy-preserving k-time authenticated secret handshakes
Y Tian, S Zhang, G Yang, Y Mu, Y Yu
Information Security and Privacy: 22nd Australasian Conference, ACISP 2017 …, 2017
162017
Pribioauth: Privacy-preserving biometric-based remote user authentication
Y Tian, Y Li, X Liu, RH Deng, B Sengupta
2018 IEEE conference on dependable and secure computing (DSC), 1-8, 2018
132018
Lis: Lightweight signature schemes for continuous message authentication in cyber-physical systems
Z Yang, C Jin, Y Tian, J Lai, J Zhou
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
122020
ISC-CPPA: Improverd-Security Certificateless Conditional Privacy-Preserving Authentication Scheme With Revocation
Y Wang, Y Liu, Y Tian
IEEE transactions on vehicular technology 71 (11), 12304-12314, 2022
92022
DSH: deniable secret handshake framework
Y Tian, Y Li, Y Zhang, N Li, G Yang, Y Yu
Information Security Practice and Experience: 14th International Conference …, 2018
92018
Accountable fine-grained blockchain rewriting in the permissionless setting
Y Tian, B Liu, Y Li, P Szalachowski, J Zhou
IEEE Transactions on Information Forensics and Security, 2023
82023
Leakage-resilient biometric-based remote user authentication with fuzzy extractors
Y Tian, Y Li, B Sengupta, N Li, C Su
Theoretical computer science 814, 223-233, 2020
72020
Strong identity-based proxy signature schemes, revisited
W Liu, Y Mu, G Yang, Y Tian
Wireless Communications and Mobile Computing 2018, 2018
72018
Privacy-preserving yoking proof with key exchange in the three-party setting
Y Tian, G Yang, Y Mu
Wireless Personal Communications 94, 1017-1034, 2017
72017
One-round attribute-based key exchange in the multi-party setting
Y Tian, G Yang, Y Mu, K Liang, Y Yu
Provable Security: 10th International Conference, ProvSec 2016, Nanjing …, 2016
72016
Security of a PUF mutual authentication and session key establishment protocol for IoT devices
DZ Sun, Y Tian
Mathematics 10 (22), 4310, 2022
62022
Lattice-based remote user authentication from reusable fuzzy signature
Y Tian, Y Li, RH Deng, B Sengupta, G Yang
Journal of computer security 29 (3), 273-298, 2021
52021
Privacy-preserving biometric-based remote user authentication
Y Tian, Y Li, X Liu, RH Deng, B Sengupta
Journal of Internet Technology 20 (7), 2265-2276, 2019
52019
On the Security of a PUF-Based Authentication and Key Exchange Protocol for IoT Devices
DZ Sun, YN Gao, Y Tian
Sensors 23 (14), 6559, 2023
32023
Unlinkable and revocable secret handshake
Y Tian, Y Li, Y Mu, G Yang
The Computer Journal 64 (8), 1303-1314, 2021
32021
A new construction for linkable secret handshake
Y Tian, Y Li, RH Deng, N Li, G Yang, Z Yang
The Computer Journal 63 (4), 536-548, 2020
32020
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20