Folgen
Yaxi Yang
Titel
Zitiert von
Zitiert von
Jahr
Maliciously secure and efficient large-scale genome-wide association study with multi-party computation
C Dong, J Weng, JN Liu, A Yang, Z Liu, Y Yang, J Ma
IEEE Transactions on Dependable and Secure Computing 20 (2), 1243-1257, 2022
162022
Notes on a provably-secure certificate-based encryption against malicious CA attacks
W Yang, J Weng, A Yang, C Xie, Y Yang
Information Sciences 463, 86-91, 2018
72018
Predicate private set intersection with linear complexity
Y Yang, J Weng, Y Yi, C Dong, LY Zhang, J Zhou
International Conference on Applied Cryptography and Network Security, 143-166, 2023
32023
PPOLQ: Privacy-Preserving Optimal Location Query With Multiple-Condition Filter in Outsourced Environments
L Han, W Luo, Y Yang, A Yang, R Lu, J Lai, Y Zheng
IEEE Transactions on Services Computing 16 (5), 3564-3577, 2023
32023
PriRanGe: Privacy-Preserving Range-Constrained Intersection Query Over Genomic Data
Y Yang, Y Tong, J Weng, Y Yi, Y Zheng, LY Zhang, R Lu
IEEE Transactions on Cloud Computing 11 (3), 2379-2391, 2022
32022
PriGenX: privacy-preserving query with anonymous access control for genomic data
Y Yang, J Weng, Y Tong, JN Liu, Z Wu, LY Zhang, A Yang
IEEE Transactions on Dependable and Secure Computing 21 (2), 961-974, 2023
22023
Efficient Privacy-preserving Non-exhaustive Nearest Neighbor Search of large-scale databases
Y Yi, W Tan, Y Yang
Journal of Information Security and Applications 70, 103335, 2022
12022
Maliciously Secure Circuit-PSI via SPDZ-Compatible Oblivious PRF
Y Yang, X Liang, X Song, L Huang, H Ren, C Dong, J Zhou
Cryptology ePrint Archive, 2024
2024
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–8