1 |
Cryptanalysis of an Off-Line Electronic Cash Scheme Based on Proxy Blind Signature
|
期刊论文 |
Yu, Yong|Mu, Yi|Wang, Guilin|Sun, Ying| |
2 |
A New Construction of Proxy Signature Using Chameleon Hash Function
|
会议论文 |
Yannan Li|Qi Xia|Jianbing Ni|Yong Yu| |
3 |
Cryptanalysis of two searchable public key encryption schemes with a designated tester
|
期刊论文 |
Jianbing Ni|Yong Yu|Qi Xia|Lei Niu| |
4 |
Security analysis of a distributed reprogramming protocol for wireless sensor networks
|
期刊论文 |
Yong Yu|Jianbing Ni|Ying Sun| |
5 |
基于身份签名方案的安全性分析
|
期刊论文 |
禹勇|李继国|伍玮|黄欣沂| |
6 |
A novel construction of SDVS with secure disavowability
|
期刊论文 |
Bo Yang|Yong Yu|Ying Sun| |
7 |
Efficient public key encryption with revocable keyword search
|
期刊论文 |
Yong Yu|Jianbing Ni|Haomiao Yang|Yi Mu|Willy Susilo| |
8 |
对一种基于身份环签名方案的安全性分析
|
期刊论文 |
吴淮|孙颖|许春香|伍玮| |
9 |
A Secure Scalar Product Protocol Against Malicious Adversaries
|
期刊论文 |
Bo Yang|Yong Yu|Zhonghuang Yang| |
10 |
Enhanced authentication for commercial video services
|
期刊论文 |
Xinyi Huang|Chengkang Chu|Hung Ming Hu|Jianying Zhou| |
11 |
A Provably Secure Construction of Certificate-Based Encryption from Certificateless Encryption
|
期刊论文 |
Wei Wu|Yi Mu|Willy Susilo|Xinyi Huang|Li Xu| |
12 |
On indistinguishability in remote data integrity checking
|
期刊论文 |
Xinyu Fan|Guomin Yang|Yi Mu|Yong Yu| |
13 |
Further observation on proxy re-encryption with keyword search
|
期刊论文 |
Xu An Wang|Xinyi Huang|Xiaoyuan Yang|Longfei Liu|Xuguang Wu| |
14 |
Cryptanalysis of a Fuzzy Identity Based Encryption Scheme in the Standard Model
|
期刊论文 |
Wang, Xu An|Yang, Xiaoyuan|Zhang, Minqing|Yu, Yong| |
15 |
On the security of auditing mechanisms for secure cloud storage
|
期刊论文 |
Yong Yu|Lei Niu|Guomin Yang|Yi Mu|Willy Susilo| |
16 |
Provably secure proxy signature scheme from factorization
|
期刊论文 |
Yu, Yong|Mu, Yi|Susilo, Willy|Sun, Ying|Ji, Yafu| |
17 |
Secure Delegation of Signing Power from Factorization
|
期刊论文 |
Yong Yu|Man Ho Au|Yi Mu|Willy Susilo| |
18 |
Further cryptanalysis of a signature scheme with message recovery
|
会议论文 |
Lei Niu|Jianbing Ni|Ying Sun|Yong Yu| |
19 |
对一种代理签名方案的攻击和改进
|
期刊论文 |
孙颖|许春香|吴淮|陈艾东| |
20 |
Improved certificateless signature scheme provably secure in the standard model
|
期刊论文 |
Yong Yu|Yi Mu|Guilin Wang|Qi Xia| |
21 |
Further Analysis of a Practical Hierarchical Identity-Based Encryption Scheme
|
期刊论文 |
Sun, Ying|Yu, Yong|Mu, Yi| |
22 |
Certificateless Signatures: New Schemes and Security Models
|
期刊论文 |
Xinyi Huang|Yi Mu|Willy Susilo|Duncan S. Wong|Wei Wu| |
23 |
Security pitfalls of an efficient threshold proxy signature scheme for mobile agents
|
期刊论文 |
Yong Yu|Yi Mu|Willy Susilo|Man Ho Au| |
24 |
Group key agreement for secure group communication in dynamic peer systems.
|
期刊论文 |
Xixiang Lv|Hui Li|baocang Wang| |
25 |
安全高效基于身份签名方案的密码学分析
|
期刊论文 |
禹勇|倪剑兵|许春香|牛磊| |
26 |
Improvement of a remote data possession checking protocol from algebraic signatures
|
会议论文 |
Yong Yu|Jianbing Ni|Jian Ren|Wei Wu|Lanxiang Chen|Qi Xia| |
27 |
Strongly unforgeable proxy signature scheme secure in the standard model
|
期刊论文 |
Sun, Ying|Xu, Chunxiang|Yu, Yong|Mu, Yi| |
28 |
An efficient short certificate-based signature scheme
|
期刊论文 |
jiguo Li|Xinyi Huang|Yichen Zhang|Lizhong Xu| |
29 |
On the Security of an Identity-Based Proxy Signature Scheme in the Standard Model
|
期刊论文 |
Sun, Ying|Yu, Yong|Zhang, Xiaosong|Chai, Jiwen| |
30 |
A Secure and Efficient E-cheque Protocol from Chameleon Hash Function
|
会议论文 |
Ying Sun|Jiwen Chai|Huihui Liang|Jianbing Ni|Yong Yu| |