Artykuły udostępnione publicznie: - Yu ChenWięcej informacji
Niedostępne w żadnym miejscu: 5
Public-key authenticated encryption with keyword search revisited: Security model and constructions
B Qin, Y Chen, Q Huang, X Liu, D Zheng
Information Sciences 516, 515-528, 2020
Upoważnienia: Chinese Academy of Sciences, National Natural Science Foundation of China
Efficacy of coupled low-volume plasma exchange with plasma filtration adsorption in treating pigs with acute liver failure: a randomised study
N Zhou, J Li, Y Zhang, J Lu, E Chen, W Du, J Wang, X Pan, D Zhu, Y Yang, ...
Journal of hepatology 63 (2), 378-387, 2015
Upoważnienia: National Natural Science Foundation of China
All-but-one dual projective hashing and its applications
Z Zhang, Y Chen, SSM Chow, G Hanaoka, Z Cao, Y Zhao
Applied Cryptography and Network Security: 12th International Conference …, 2014
Upoważnienia: Research Grants Council, Hong Kong
Identity-based encryption based on DHIES
Y Chen, M Charlemagne, Z Guan, J Hu, Z Chen
Proceedings of the 5th ACM Symposium on Information, Computer and …, 2010
Upoważnienia: Science Foundation Ireland
From Attack on Feige-Shamir to Construction of Oblivious Transfer
J Yu, Y Deng, Y Chen
International Conference on Information Security and Cryptology, 44-64, 2017
Upoważnienia: Chinese Academy of Sciences, National Natural Science Foundation of China
Dostępne w jakimś miejscu: 29
Programmable hash functions from lattices: short signatures and IBEs with small key sizes
J Zhang, Y Chen, Z Zhang
Annual international cryptology conference, 303-332, 2016
Upoważnienia: National Natural Science Foundation of China
PGC: Decentralized confidential payment system with auditability
Y Chen, X Ma, C Tang, MH Au
Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020
Upoważnienia: National Natural Science Foundation of China
Generic constructions of integrated PKE and PEKS
Y Chen, J Zhang, D Lin, Z Zhang
Designs, Codes and Cryptography 78 (2), 493-526, 2016
Upoważnienia: Chinese Academy of Sciences, National Natural Science Foundation of China
I-vise: Interactive video surveillance as an edge service using unsupervised feature queries
SY Nikouei, Y Chen, AJ Aved, E Blasch
IEEE Internet of Things Journal 8 (21), 16181-16190, 2020
Upoważnienia: US Department of Defense
Blockchain methods for trusted avionics systems
E Blasch, R Xu, Y Chen, G Chen, D Shen
2019 IEEE National Aerospace and Electronics Conference (NAECON), 192-199, 2019
Upoważnienia: US Department of Defense
Generalized (identity‐based) hash proof system and its applications
Y Chen, Z Zhang, D Lin, Z Cao
Security and Communication Networks 9 (12), 1698-1716, 2016
Upoważnienia: Chinese Academy of Sciences, National Natural Science Foundation of China
Sakai–Ohgishi–Kasahara identity-based non-interactive key exchange revisited and more
Y Chen, Q Huang, Z Zhang
International Journal of Information Security 15, 15-33, 2016
Upoważnienia: Chinese Academy of Sciences, National Natural Science Foundation of China
Black-box separations for one-more (static) CDH and its generalization
J Zhang, Z Zhang, Y Chen, Y Guo, Z Zhang
International Conference on the Theory and Application of Cryptology and …, 2014
Upoważnienia: Chinese Academy of Sciences, National Natural Science Foundation of China
Adding linkability to ring signatures with one-time signatures
X Wang, Y Chen, X Ma
International Conference on Information Security, 445-464, 2019
Upoważnienia: Chinese Academy of Sciences, National Natural Science Foundation of China
Non-malleable functions and their applications
Y Chen, B Qin, J Zhang, Y Deng, SSM Chow
Public-Key Cryptography--PKC 2016, 386-416, 2016
Upoważnienia: Chinese Academy of Sciences, National Natural Science Foundation of China …
PRE: Stronger security notions and efficient construction with non-interactive opening
J Zhang, Z Zhang, Y Chen
Theoretical Computer Science 542, 1-16, 2014
Upoważnienia: National Natural Science Foundation of China
Exploration of singular spectrum analysis for online anomaly detection in crns
Q Dong, Z Yang, Y Chen, X Li, K Zeng
EAI Endorsed Transactions on Security and Safety 4 (12), 2017
Upoważnienia: US National Science Foundation
Black-box separations of hash-and-sign signatures in the non-programmable random oracle model
Z Zhang, Y Chen, SSM Chow, G Hanaoka, Z Cao, Y Zhao
Provable Security: 9th International Conference, ProvSec 2015, Kanazawa …, 2015
Upoważnienia: Chinese Academy of Sciences, National Natural Science Foundation of China …
Learning for crowdsourcing: Online dispatch for video analytics with guarantee
Y Chen, S Zhang, Y Jin, Z Qian, M Xiao, N Chen, Z Ma
IEEE INFOCOM 2022-IEEE Conference on Computer Communications, 1908-1917, 2022
Upoważnienia: National Natural Science Foundation of China
KDM security for identity-based encryption: Constructions and separations
Y Chen, J Zhang, Y Deng, J Chang
Information Sciences 486, 450-473, 2019
Upoważnienia: Chinese Academy of Sciences, National Natural Science Foundation of China
Informacje na temat publikacji i finansowania automatycznie określa program komputerowy