default search action
Yang Lu 0001
Person information
- affiliation: Hohai University, College of Computer and Information, Nanjing, China
Other persons with the same name
- Yang Lu — disambiguation page
- Yang Lu 0002 — City University Hong Kong, Department of Mechanical and Biomedical Engineering
- Yang Lu 0003 — Heilongjiang Bayi Agricultural University, Daqing, China
- Yang Lu 0004 — Harvard Medical School, Joslin Diabetes Center, MA, USA (and 1 more)
- Yang Lu 0005 — Tsinghua University, School of Software, Beijing, China
- Yang Lu 0006 — University of California, Los Angeles, USA
- Yang Lu 0007 — Imperial College London, Department of Electrical and Electronic Engineering, UK
- Yang Lu 0008 — Beijing Jiaotong University, School of Computer and Information Technology, Beijing Key Laboratory of Traffic Data Analysis and Mining / Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, China
- Yang Lu 0009 — Xiamen University, School of Informatics, China (and 2 more)
- Yang Lu 0010 — University of Houston, Department of Computer Science, TX, USA
- Yang Lu 0011 (aka: Yang Lv 0001) — United Imaging Healthcare, Molecular Imaging Business Unit, Shanghai, China (and 1 more)
- Yang Lu 0012 — Huazhong University of Science and Technology, School of Electrical and Electronic Engineering, State Key Laboratory of Advanced Electromagnetic Engineering and Technology, Wuhan, China
- Yang Lu 0013 — Henan University, Research Department, Kaifeng, China
- Yang Lu 0014 — Old Dominion University, Department of Information Technology and Decision Sciences, Norfolk, VA, USA
- Yang Lu 0015 — Hefei University of Technology, School of Computer Science and Information Engineering, China (and 1 more)
- Yang Lu 0016 — Zhengzhou University, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j48]Qiu Zhang, Yinxia Sun, Yang Lu, Wensheng Huang:
Revocable identity-based designated verifier proxy re-signature with signature evolution. Comput. Stand. Interfaces 92: 103894 (2025) - 2024
- [j47]Qiu Zhang, Yinxia Sun, Yang Lu, Nian Xia, Ge Wu:
Efficient Certificateless Aggregate Designated Verifier Signature With Conditional Privacy Preserving in VANETs. IEEE Internet Things J. 11(15): 26191-26202 (2024) - [j46]Qiu Zhang, Yinxia Sun, Yang Lu, Guoqiang Zhang:
Revocable certificateless proxy re-signature with signature evolution for EHR sharing systems. J. Inf. Secur. Appl. 87: 103892 (2024) - [j45]Jinmei Tian, Yang Lu, Jiguo Li:
Lightweight Searchable and Equality-Testable Certificateless Authenticated Encryption for Encrypted Cloud Data. IEEE Trans. Mob. Comput. 23(8): 8431-8446 (2024) - [c6]Chen Zhu, Jiale Ding, Xingrui Wei, Yang Lu, Yinxia Sun:
Efficient Revocable Attribute-Based Keyword Search Against Keyword Guessing Attack. CyberC 2024: 155-162 - 2023
- [j44]Jiguo Li, Ruyuan Zhang, Yang Lu, Jinguang Han, Yichen Zhang, Wenzheng Zhang, Xinfeng Dong:
Multiauthority Attribute-Based Encryption for Assuring Data Deletion. IEEE Syst. J. 17(2): 2029-2038 (2023) - [j43]Yang Lu, Jiguo Li:
Privacy-Preserving and Forward Public Key Encryption With Field-Free Multi-Keyword Search for Cloud Encrypted Data. IEEE Trans. Cloud Comput. 11(4): 3619-3630 (2023) - 2022
- [j42]Ruyuan Zhang, Jiguo Li, Yang Lu, Jinguang Han, Yichen Zhang:
Key escrow-free attribute based encryption with user revocation. Inf. Sci. 600: 59-72 (2022) - [j41]Fen Wang, Yang Lu, Zhongqi Wang, Jinmei Tian:
Privacy-Preserving Key-Updatable Public Key Encryption with Keyword Search Supporting Ciphertext Sharing Function. KSII Trans. Internet Inf. Syst. 16(1): 266-286 (2022) - [j40]Yang Lu, Jiguo Li:
Lightweight Public Key Authenticated Encryption With Keyword Search Against Adaptively-Chosen-Targets Adversaries for Mobile Devices. IEEE Trans. Mob. Comput. 21(12): 4397-4409 (2022) - 2021
- [j39]Jiguo Li, Min Wang, Yang Lu, Yichen Zhang, Huaqun Wang:
ABKS-SKGA: Attribute-based keyword search secure against keyword guessing attack. Comput. Stand. Interfaces 74: 103471 (2021) - [j38]Yang Lu, Jiguo Li, Fen Wang:
Pairing-Free Certificate-Based Searchable Encryption Supporting Privacy-Preserving Keyword Search Function for IIoTs. IEEE Trans. Ind. Informatics 17(4): 2696-2706 (2021) - [j37]Yang Lu, Jiguo Li, Yichen Zhang:
Secure Channel Free Certificate-Based Searchable Encryption Withstanding Outside and Inside Keyword Guessing Attacks. IEEE Trans. Serv. Comput. 14(6): 2041-2054 (2021) - [c5]Xuanang Yu, Yang Lu, Jinmei Tian, Fen Wang:
Keyword Guessing Attacks on Some Proxy Re-Encryption with Keyword Search Schemes. ICAIS (2) 2021: 253-264 - 2020
- [j36]Chen Shen, Yang Lu, Jiguo Li:
Expressive Public-Key Encryption With Keyword Search: Generic Construction From KP-ABE and an Efficient Scheme Over Prime-Order Groups. IEEE Access 8: 93-103 (2020) - [j35]Yang Lu, Jiguo Li, Yichen Zhang:
Privacy-Preserving and Pairing-Free Multirecipient Certificateless Encryption With Keyword Search for Cloud-Assisted IIoT. IEEE Internet Things J. 7(4): 2553-2562 (2020) - [j34]Liqing Chen, Jiguo Li, Yang Lu, Yichen Zhang:
Adaptively secure certificate-based broadcast encryption and its application to cloud storage service. Inf. Sci. 538: 273-289 (2020)
2010 – 2019
- 2019
- [j33]Yang Lu, Jiguo Li, Yichen Zhang:
SCF-PEPCKS: Secure Channel Free Public Key Encryption With Privacy-Conserving Keyword Search. IEEE Access 7: 40878-40892 (2019) - [j32]Yang Lu, Jiguo Li:
Efficient searchable public key encryption against keyword guessing attacks for cloud-based EMR systems. Clust. Comput. 22(1): 285-299 (2019) - [j31]Yang Lu, Quanling Zhang, Jiguo Li:
A certificate-based AKA protocol secure against public key replacement attacks. Int. Arab J. Inf. Technol. 16(4): 754-765 (2019) - [j30]Yang Lu, Jiguo Li:
Constructing designated server public key encryption with keyword search schemes withstanding keyword guessing attacks. Int. J. Commun. Syst. 32(3) (2019) - [j29]Yang Lu, Gang Wang, Jiguo Li:
Keyword guessing attacks on a public key encryption with keyword search scheme without random oracle and its improvement. Inf. Sci. 479: 270-276 (2019) - [j28]Yang Lu, Jiguo Li:
A Forward-Secure Certificate-Based Signature Scheme with Enhanced Security in the Standard Model. KSII Trans. Internet Inf. Syst. 13(3): 1502-1522 (2019) - [j27]Yang Lu, Jiguo Li:
Constructing pairing-free certificateless public key encryption with keyword search. Frontiers Inf. Technol. Electron. Eng. 20(8): 1049-1060 (2019) - 2018
- [j26]Jiguo Li, Liqing Chen, Yang Lu, Yichen Zhang:
Anonymous certificate-based broadcast encryption with constant decryption cost. Inf. Sci. 454-455: 110-127 (2018) - [j25]Yang Lu, Gang Wang, Jiguo Li:
On Security of a Secure Channel Free Public Key Encryption with Conjunctive Field Keyword Search Scheme. Inf. Technol. Control. 47(1): 56-62 (2018) - [j24]Yuyan Guo, Jiguo Li, Yang Lu, Yichen Zhang, Futai Zhang:
Provably secure certificate-based encryption with leakage resilience. Theor. Comput. Sci. 711: 1-10 (2018) - 2017
- [j23]Yang Lu, Gang Wang, Jiguo Li, Jian Shen:
Efficient designated server identity-based encryption with conjunctive keyword search. Ann. des Télécommunications 72(5-6): 359-370 (2017) - [j22]Yang Lu, Jiguo Li:
Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model. Adv. Math. Commun. 11(1): 161-177 (2017) - [j21]Yang Lu, Jiguo Li, Jian Shen:
Weakness and Improvement of a Certificate-Based Key-Insulated Signature in the Standard Model. Comput. J. 60(12): 1729-1744 (2017) - [j20]Yang Lu, Quanling Zhang, Jiguo Li, Jian Shen:
An Efficient Certificate-Based Authenticated Key Agreement Protocol without Bilinear Pairing. Inf. Technol. Control. 46(3): 345-359 (2017) - [j19]Yang Lu, Gang Wang, Jiguo Li, Jian Shen:
New Construction of Short Certificate-Based Signature against Existential Forgery Attacks. KSII Trans. Internet Inf. Syst. 11(7): 3629-3647 (2017) - 2016
- [j18]Yang Lu, Jiguo Li:
A pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds. Future Gener. Comput. Syst. 62: 140-147 (2016) - [j17]Yang Lu, Jiguo Li:
Improved certificate-based signature scheme without random oracles. IET Inf. Secur. 10(2): 80-86 (2016) - [j16]Jiguo Li, Yuyan Guo, Qihong Yu, Yang Lu, Yichen Zhang, Futai Zhang:
Continuous leakage-resilient certificate-based encryption. Inf. Sci. 355-356: 1-14 (2016) - [j15]Yang Lu, Quanling Zhang, Jiguo Li, Jian Shen:
Comment on a certificateless one-pass and two-party authenticated key agreement protocol. Inf. Sci. 369: 184-187 (2016) - [j14]Yang Lu, Jiguo Li:
A provably secure certificate-based encryption scheme against malicious CA attacks in the standard model. Inf. Sci. 372: 745-757 (2016) - [j13]Yang Lu, Quanling Zhang:
Enhanced Certificate-Based Encryption Scheme without Bilinear Pairings", KSII Transactions on Internet and Information Systems. KSII Trans. Internet Inf. Syst. 10(2): 881-896 (2016) - [j12]Jiguo Li, Yuyan Guo, Qihong Yu, Yang Lu, Yichen Zhang:
Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage. Secur. Commun. Networks 9(10): 1016-1024 (2016) - [j11]Yang Lu, Jiguo Li:
Provably secure certificateless proxy signature scheme in the standard model. Theor. Comput. Sci. 639: 42-59 (2016) - 2015
- [j10]Yang Lu, Quanling Zhang, Jiguo Li:
An improved certificateless strong key-insulated signature scheme in the standard model. Adv. Math. Commun. 9(3): 353-373 (2015) - [i2]Yang Lu, Quanling Zhang, Jiguo Li:
Cryptanalysis of Three Certificate-Based Authenticated Key Agreement Protocols and a Secure Construction. IACR Cryptol. ePrint Arch. 2015: 256 (2015) - 2014
- [j9]Yang Lu, Jiguo Li:
Efficient constructions of certificate-based key encapsulation mechanism. Int. J. Internet Protoc. Technol. 8(2/3): 96-106 (2014) - [j8]Yang Lu, Jiguo Li:
Provably Secure Certificate-Based Signcryption Scheme without Pairings. KSII Trans. Internet Inf. Syst. 8(7): 2554-2571 (2014) - [j7]Yang Lu, Jiguo Li:
Efficient Certificate-Based Encryption Scheme Secure Against Key Replacement Attacks in the Standard Model. J. Inf. Sci. Eng. 30(5): 1553-1568 (2014) - 2013
- [j6]Yang Lu, Jiguo Li:
New forward-secure public-key encryption without random oracles. Int. J. Comput. Math. 90(12): 2603-2613 (2013) - 2012
- [j5]Yang Lu, Jiguo Li:
Generic Construction of Forward-Secure Identity-Based Encryption. J. Comput. 7(12): 3068-3074 (2012) - 2011
- [j4]Yang Lu, Jiguo Li:
A Practical Forward-Secure Public-Key Encryption Scheme. J. Networks 6(9): 1254-1261 (2011) - [i1]Yang Lu, Jiguo Li:
Certificate-Based Signcryption: Security Model and Efficient Construction. IACR Cryptol. ePrint Arch. 2011: 542 (2011) - 2010
- [j3]Yang Lu, Jiguo Li:
Forward-Secure Certificate-Based Encryption and its Generic Construction. J. Networks 5(5): 527-534 (2010)
2000 – 2009
- 2009
- [j2]Yang Lu, Jiguo Li, Junmo Xiao:
Constructing Efficient Certificate-based Encryption with Paring. J. Comput. 4(1): 19-26 (2009) - [j1]Yang Lu, Jiguo Li, Junmo Xiao:
Threshold Certificate-based Encryption. J. Softw. 4(3): 210-217 (2009) - [c4]Yang Lu, Jiguo Li:
Forward-Secure Certificate-Based Encryption. IAS 2009: 57-60 - 2008
- [c3]Yang Lu, Jiguo Li:
A General and Secure Certification-based Encryption Construction. ChinaGrid 2008: 182-189 - [c2]Yang Lu, Jiguo Li, Junmo Xiao:
Generic Construction of Certificate-Based Encryption. ICYCS 2008: 1589-1594 - [c1]Yang Lu, Jiguo Li, Junmo Xiao:
Applying the Fujisaki-Okamoto Conversion to Certificate-based Encryption. ISECS 2008: 296-300
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 20:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint