Follow
Yong Li
Title
Cited by
Cited by
Year
On delegatability of four designated verifier signatures
Y Li, H Lipmaa, D Pei
International Conference on Information and Communications Security, 61-71, 2005
502005
Designated verifier signature: definition, framework and new constructions
Y Li, W Susilo, Y Mu, D Pei
International Conference on Ubiquitous Intelligence and Computing, 1191-1200, 2007
492007
Co-evolution of opinion and strategy in persuasion dynamics: an evolutionary game theoretical approach
F Ding, Y Liu, Y Li
Int. J. Mod. Phys. C 20, 479-490, 2009
342009
Fair secret reconstruction in (t, n) secret sharing
L Harn, C Lin, Y Li
Journal of Information Security and Applications, 2015
282015
Storage-awareness: RFID private authentication based on sparse tree
W Wang, Y Li, L Hu, L Lu
Third International Workshop on Security, Privacy and Trust in Pervasive and …, 2007
262007
Efficient proxy re-encryption with private keyword searching in untrusted storage
X Chen, Y Li
International Journal of Computer Network and Information Security 3 (2), 50, 2011
202011
多Agent 的自动协商
李勇, 李石君
计算机工程 29 (6), 2003
192003
A Practical Identity-based Signcryption Scheme
C Huiyan, L Yong, R Jinping
International Journal of Network Security 15 (6), 484-489, 2013
12*2013
Threshold Proxy Re-encryption and Its Application in Blockchain
X Chen, Y Liu, Y Li, C Lin
International Conference on Cloud Computing and Security, 16-25, 2018
102018
基于自动生成模板的 Web 信息抽取技术
张彦超, 刘云, 李勇, 沈波
北京交通大学学报: 自然科学版 33 (005), 40-45, 2009
92009
A practical certificateless signature scheme
L Guo, L Hu, Y Li
The First International Symposium on Data, Privacy, and E-Commerce (ISDPE …, 2007
92007
How to construct secure and efficient three-party password-based authenticated key exchange protocols
W Wang, L Hu, Y Li
Information Security and Cryptology, 218-235, 2011
72011
Ciphertext-Auditable Identity-Based Encryption
CCC Changlu Lin, Yong Li, Kewei Lv
International Journal of Network Security 17 (1), 23-28, 2015
62015
Identity-based strong designated verifier signature scheme with full non-delegatability
F Tang, C Lin, Y Li, S Zhang
2011IEEE 10th International Conference on Trust, Security and Privacy in …, 2011
62011
Security analysis of a dynamic program update protocol for wireless sensor networks
W Wang, L Hu, Y Li
IEEE communications letters 14 (8), 782-784, 2010
62010
支持属性撤销的外包解密方案
李勇,曾振宇张晓菲
清华大学学报 (自然科学版) 53 (12), 1664-1669, 2013
52013
Cryptanalysis of a signature scheme withou using one-way Hash functions
LF Guo, Y Li, L Hu
Journal of the Graduate School of the Chinese Academy of Sciences 25 (5 …, 2008
5*2008
Large Branching Tree Based Dynamic Provable Data Possession Scheme.
Y Li, G Yao, LN Lei, HQ Wang, CL Lin
Journal of Information Science & Engineering 33 (3), 2017
42017
An Efficient Dynamic Provable Data Possession Scheme in Cloud Storage
G Yao, Y Li, L Lei, H Wang, C Lin
Green, Pervasive, and Cloud Computing, 63-81, 2016
42016
Ciphertext-Policy Hierarchical Attribute-Based Encryption Against Key-Delegation Abuse for IoT-Connected Healthcare System
X Chen, Y Liu, HC Chao, Y Li
IEEE Access 8, 86630-86650, 2020
32020
The system can't perform the operation now. Try again later.
Articles 1–20