Artikel dengan mandat akses publik - Rupeng YangPelajari lebih lanjut
Tidak tersedia di mana pun: 12
Position based cryptography with location privacy: A step for fog computing
R Yang, Q Xu, MH Au, Z Yu, H Wang, L Zhou
Future Generation Computer Systems 78, 799-806, 2018
Mandat: National Natural Science Foundation of China
Towards leakage-resilient fine-grained access control in fog computing
Z Yu, MH Au, Q Xu, R Yang, J Han
Future Generation Computer Systems 78, 763-777, 2018
Mandat: National Natural Science Foundation of China
Updatable hash proof system and its applications
R Yang, Q Xu, Y Zhou, R Zhang, C Hu, Z Yu
Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015
Mandat: Chinese Academy of Sciences, National Natural Science Foundation of China
Lattice-based universal accumulator with nonmembership arguments
Z Yu, MH Au, R Yang, J Lai, Q Xu
Information Security and Privacy: 23rd Australasian Conference, ACISP 2018 …, 2018
Mandat: National Natural Science Foundation of China, Research Grants Council, Hong Kong
Practical range proof for cryptocurrency monero with provable security
K Li, R Yang, MH Au, Q Xu
Information and Communications Security: 19th International Conference …, 2018
Mandat: National Natural Science Foundation of China
Leakage-resilient functional encryption via pair encodings
Z Yu, MH Au, Q Xu, R Yang, J Han
Information Security and Privacy: 21st Australasian Conference, ACISP 2016 …, 2016
Mandat: National Natural Science Foundation of China
Unforgeable watermarking schemes with public extraction
R Yang, MH Au, J Lai, Q Xu, Z Yu
Security and Cryptography for Networks: 11th International Conference, SCN …, 2018
Mandat: National Natural Science Foundation of China, Research Grants Council, Hong Kong
A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience
C Hu, R Yang, P Liu, T Li, F Kong
The Journal of Supercomputing 75, 3099-3122, 2019
Mandat: National Natural Science Foundation of China
Accountable anonymous credentials
Z Yu, MH Au, R Yang
Advances in Cyber Security: Principles, Techniques, and Applications, 49-68, 2019
Mandat: National Natural Science Foundation of China, Research Grants Council, Hong Kong
Verifiable public-key encryption with keyword search secure against continual memory attacks
C Hu, Z Li, P Liu, R Yang, S Guo, H Zhang
Mobile Networks and Applications, 1-11, 2021
Mandat: National Natural Science Foundation of China
Achieving flexibility for ABE with outsourcing via proxy re-encryption
Z Yu, MH Au, R Yang, J Lai, Q Xu
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
Mandat: National Natural Science Foundation of China
Weak leakage resilient extractable hash proof system and construction for weak leakage resilient CCA-secure public-key encryption
C Hu, Z Yu, R Yang, Q Xu, Y Zhou, Q Yuan
International Journal of Embedded Systems 7 (3-4), 216-229, 2015
Mandat: National Natural Science Foundation of China
Tersedia di suatu tempat: 11
Efficient lattice-based zero-knowledge arguments with standard soundness: construction and applications
R Yang, MH Au, Z Zhang, Q Xu, Z Yu, W Whyte
Annual International Cryptology Conference, 147-175, 2019
Mandat: National Natural Science Foundation of China, Research Grants Council, Hong Kong
New empirical traceability analysis of cryptonote-style blockchains
Z Yu, MH Au, J Yu, R Yang, Q Xu, WF Lau
International Conference on Financial Cryptography and Data Security, 133-149, 2019
Mandat: National Natural Science Foundation of China, Luxembourg National Research …
Decentralized blacklistable anonymous credentials with reputation
R Yang, MH Au, Q Xu, Z Yu
Computers & Security 85, 353-371, 2019
Mandat: National Natural Science Foundation of China, Research Grants Council, Hong Kong
Collusion resistant watermarking schemes for cryptographic functionalities
R Yang, MH Au, J Lai, Q Xu, Z Yu
Advances in Cryptology–ASIACRYPT 2019: 25th International Conference on the …, 2019
Mandat: National Natural Science Foundation of China, Research Grants Council, Hong Kong
Collusion resistant watermarkable PRFs from standard assumptions
R Yang, MH Au, Z Yu, Q Xu
Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020
Mandat: National Natural Science Foundation of China, Research Grants Council, Hong Kong
Possibility and impossibility results for receiver selective opening secure PKE in the multi-challenge setting
R Yang, J Lai, Z Huang, MH Au, Q Xu, W Susilo
Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020
Mandat: National Natural Science Foundation of China, Research Grants Council, Hong Kong
Public-key encryption with keyword search via obfuscation
C Hu, P Liu, R Yang, Y Xu
IEEE Access 7, 37394-37405, 2019
Mandat: National Natural Science Foundation of China
Public‐key encryption with keyword search secure against continual memory attacks
C Hu, R Yang, P Liu, Z Yu, Y Zhou, Q Xu
Security and Communication Networks 9 (11), 1613-1629, 2016
Mandat: National Natural Science Foundation of China
Informasi terbitan dan pendanaan ditentukan secara otomatis oleh program komputer