default search action
Bo Yang 0003
Person information
- affiliation: Shaanxi Normal University, School of Computer Science, Xi'an, China
- affiliation: Chinese Academy of Sciences, Institute of Information Engineering, State Key Laboratory of Information Security, Beijing, China
- affiliation (former): South China Argicultural University, Guangzhou, China
- affiliation (PhD 1999): Xidian University, National Key Laboratory of ISN at Xi'an, China
Other persons with the same name
- Bo Yang — disambiguation page
- Bo Yang 0001 — University of Jinan, Shandong Provincial Key Laboratory of Network Based Intelligent Computing, China
- Bo Yang 0002 — Jilin University, College of Computer Science and Technology, Key Laboratory of Symbolic Computation and Knowledge Engineering, Changchun, China
- Bo Yang 0004 — Synopsys, Inc., Mountain View, CA, USA (and 2 more)
- Bo Yang 0005 — Bowie State University
- Bo Yang 0006 — Shanghai Jiao Tong University, Department of Automation, Key Laboratory of System Control and Information Processing, Shanghai, China (and 1 more)
- Bo Yang 0007 — Beijing University of Posts and Telecommunications
- Bo Yang 0008 — Samsung (and 2 more)
- Bo Yang 0009 (aka: Tony Bo Yang) — University of Turku
- Bo Yang 0010 — NVIDIA (and 1 more)
- Bo Yang 0011 — University of Electronic Science and Technology of China, School of Computer Science and Engineering, Chengdu (and 1 more)
- Bo Yang 0012 — Chongqing University of Science and Technology, College of Electrical and Information Engineering, China
- Bo Yang 0013 — IBM China Research Laboratory (and 1 more)
- Bo Yang 0016 — Renmin University of China
- Bo Yang 0017 — Université Michel de Montaigne
- Bo Yang 0018 — Texas Tech University (and 1 more)
- Bo Yang 0019 — Southeast University, School of Instrument Science and Engineering, Nanjing, China (and 1 more)
- Bo Yang 0020 — University of Calgary, Department of Chemical and Petroleum Engineering, AB, Canada
- Bo Yang 0021 — Hunan University, National Supercomputing Center in Changsha, China
- Bo Yang 0022 — University of Electronic Science and Technology of China, School of Automation Engineering, Chengdu, China (and 1 more)
- Bo Yang 0023 — National University of Defense Technology, Department of Computer Sciences, Changsha, China
- Bo Yang 0024 — Nanjing Agricultural University, Department of Information Management, China
- Bo Yang 0025 — Southwest University, College of Electronic and Information Engineering, Chongqing, China
- Bo Yang 0026 — Chinese Academy of Sciences, Institute of Computing Technology, SKL Computer Architecture, Beijing, China (and 1 more)
- Bo Yang 0027 — The Hong Kong Polytechnic University, Department of Computing, HKSAR (and 2 more)
- Bo Yang 0028 — Beijing Forestry University, School of Information Science and Technology, China
- Bo Yang 0029 — Southeast University, Jiangsu Key Laboratory of Urban ITS, Nanjing, China
- Bo Yang 0030 — University of Paris-Sud, Orsay, France
- Bo Yang 0031 — Jiang Xi University of Finance and Economics, School of Information Management, Nanchang, China
- Bo Yang 0032 — Inner Mongolia University, College of Computer Science, Hohhot, China (and 1 more)
- Bo Yang 0033 — University of Central Florida, FL, USA (and 1 more)
- Bo Yang 0034 — Tongji University, Key Laboratory of Embedded System and Service Computing, Shanghai, China
- Bo Yang 0035 — Northwestern Polytechnical University, School of Computer Science, Xi'an, China (and 3 more)
- Bo Yang 0036 — Hunan Institute of Science and Technology, College of Information and Communication Engineering, Yueyang, China (and 1 more)
- Bo Yang 0038 — Harbin Engineering University, College of Automation, China
- Bo Yang 0039 — Xi'an Research Institute of High Technology, Department of Control Engineering, China
- Bo Yang 0040 — Beihang University, School of Electronic and Information Engineering, Beijing, China
- Bo Yang 0041 — Xi'an Polytechnic University, School of Computer Science, Shaanxi Key Laboratory of Clothing Intelligence, China (and 1 more)
- Bo Yang 0042 — Chongqing University, State Key Laboratory of Mechanical Transmission, China
- Bo Yang 0043 — Northwest Normal University, Institute of Computer Science and Engineering, Lanzhou, China
- Bo Yang 0044 — University of Tokyo, Institute of Industrial Science, Japan
- Bo Yang 0045 — Alibaba Group, Hangzhou, China
- Bo Yang 0046 — Kunming University of Science and Technology, Faculty of Electric Power Engineering, China (and 1 more)
- Bo Yang 0047 — Xidian University, School of Artificial Intelligence, Xi'an, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j122]Kui Ma, Guoji Song, Yanwei Zhou, Ran Xu, Bo Yang:
An efficient identity authentication protocol with revocation, tracking and fine-grained access control for electronic medical system. Comput. Stand. Interfaces 88: 103784 (2024) - [j121]Meijuan Huang, Yutian Liu, Bo Yang, Yanqi Zhao, Mingrui Zhang:
Efficient Revocable Attribute-Based Encryption with Data Integrity and Key Escrow-Free. Inf. 15(1): 32 (2024) - [j120]Ming Zhang, Yanping Li, Yong Ding, Bo Yang:
A Lightweight and Robust Multidimensional Data Aggregation Scheme for IoT. IEEE Internet Things J. 11(2): 3578-3588 (2024) - [j119]Zirui Qiao, Kui Ma, Yanwei Zhou, Qiliang Yang, Zhe Xia, Bo Yang, Mingwu Zhang:
An Anonymous and Efficient Certificate-Based Identity Authentication Protocol for VANET. IEEE Internet Things J. 11(7): 11232-11245 (2024) - [j118]Yu Han, Yanwei Zhou, Bo Yang, Zhe Xia, Mingwu Zhang:
An Efficient and Secure Lightweight Certificateless Hybrid Signcryption Scheme. IEEE Internet Things J. 11(7): 12252-12265 (2024) - [j117]Yasi Zhu, Yanwei Zhou, Jing Wang, Bo Yang, Mingwu Zhang:
A Lightweight Cross-Domain Direct Identity Authentication Protocol for VANETs. IEEE Internet Things J. 11(23): 37741-37757 (2024) - [j116]Ran Xu, Yanwei Zhou, Qiliang Yang, Kunwei Yang, Yu Han, Bo Yang, Zhe Xia:
An efficient and secure certificateless aggregate signature scheme. J. Syst. Archit. 147: 103030 (2024) - [j115]Mengge Li, Miao Ma, Liang Wang, Zhao Pei, Jie Ren, Bo Yang:
Multiagent Deep Reinforcement Learning Based Incentive Mechanism for Mobile Crowdsensing in Intelligent Transportation Systems. IEEE Syst. J. 18(1): 527-538 (2024) - [j114]Mengge Li, Miao Ma, Liang Wang, Bo Yang:
Quality-Improved and Delay-Aware Incentive Mechanism for Mobile Crowdsensing With Social Concerns: A Stackelberg Game Approach. IEEE Trans. Comput. Soc. Syst. 11(6): 7618-7633 (2024) - [j113]Liping Qiao, Yanping Li, Yong Ding, Bo Yang:
Lightweight and Decentralized Cross-Cloud Auditing With Data Recovery. IEEE Trans. Serv. Comput. 17(1): 60-73 (2024) - [j112]Yanwei Zhou, Lei Cao, Zirui Qiao, Ran Xu, Yu Han, Junsheng Xing, Bo Yang, Zhe Xia, Mingwu Zhang:
A Novel Cloud-Assisted Authentication Key Agreement Protocol for VANET. IEEE Trans. Veh. Technol. 73(9): 13526-13541 (2024) - [c34]Zirui Qiao, Ran Xu, Yonghui Lu, Yanwei Zhou, Bo Yang:
A New Construction of Leakage-Resilient Identity-Based Encryption Scheme. ISPEC 2024: 133-150 - 2023
- [j111]Yanwei Zhou, Zhaolong Wang, Zirui Qiao, Ying Wang, Bo Yang, Yi Mu, Mingwu Zhang:
Identity-Based Encryption With Continuous Leakage-Resilient CCA Security From Static Complexity Assumption. Comput. J. 66(4): 924-940 (2023) - [j110]Zirui Qiao, Qiliang Yang, Yanwei Zhou, Bo Yang, Mingwu Zhang:
A Novel Construction Of Certificateless Aggregate Signature Scheme For Healthcare Wireless Medical Sensor Networks. Comput. J. 66(11): 2810-2824 (2023) - [j109]Yanwei Zhou, Lei Cao, Bo Yang, Zhe Xia, Chunxiang Gu, Mingwu Zhang:
A direct construction of continuous leakage-resilient (H)IBE scheme with CCA security from dual system encryption. Comput. Stand. Interfaces 83: 103668 (2023) - [j108]Shijin Chen, Willy Susilo, Yudi Zhang, Bo Yang, Mingwu Zhang:
Privacy-preserving anomaly counting for time-series data in edge-assisted crowdsensing. Comput. Stand. Interfaces 85: 103707 (2023) - [j107]Yanwei Zhou, Bo Yang, Zirui Qiao, Zhe Xia, Mingwu Zhang, Yi Mu:
Leakage-resilient identity-based cryptography from minimal assumptions. Des. Codes Cryptogr. 91(11): 3757-3801 (2023) - [j106]Zhaolong Wang, Yanwei Zhou, Zirui Qiao, Bo Yang, Chunxiang Gu, Yuan Xu, Mingwu Zhang:
An Anonymous and Revocable Authentication Protocol for Vehicle-to-Vehicle Communications. IEEE Internet Things J. 10(6, March 15): 5114-5127 (2023) - [j105]Yanwei Zhou, Lei Cao, Zirui Qiao, Zhe Xia, Bo Yang, Mingwu Zhang, Wenzheng Zhang:
An Efficient Identity Authentication Scheme With Dynamic Anonymity for VANETs. IEEE Internet Things J. 10(11): 10052-10065 (2023) - [j104]Yanwei Zhou, Zhaolong Wang, Zirui Qiao, Bo Yang, Mingwu Zhang:
An Efficient and Provably Secure Identity Authentication Scheme for VANET. IEEE Internet Things J. 10(19): 17170-17183 (2023) - [j103]Yanwei Zhou, Ran Xu, Zirui Qiao, Bo Yang, Zhe Xia, Mingwu Zhang:
An Anonymous and Efficient Multimessage and Multireceiver Certificateless Signcryption Scheme for VANET. IEEE Internet Things J. 10(24): 22823-22835 (2023) - [j102]Yanwei Zhou, Ran Xu, Wenzheng Zhang, Zhe Xia, Bo Yang, Chunxiang Gu, Meijuan Huang:
Public-key encryption scheme with optimal continuous leakage resilience. Inf. Process. Lett. 180: 106318 (2023) - [j101]Zirui Qiao, Qiliang Yang, Yanwei Zhou, Bo Yang, Mingwu Zhang:
A redesigned secure and efficient data transaction protocol for mobile payment system. J. Syst. Archit. 143: 102964 (2023) - [j100]Zirui Qiao, Qiliang Yang, Yanwei Zhou, Bo Yang, Zhe Xia, Mingwu Zhang, Tao Wang:
An Efficient Certificate-Based Aggregate Signature Scheme With Provable Security for Industrial Internet of Things. IEEE Syst. J. 17(1): 72-82 (2023) - [j99]Yuan Xu, Yanwei Zhou, Bo Yang, Zirui Qiao, Zhaolong Wang, Zhe Xia, Mingwu Zhang:
An Efficient Identity Authentication Scheme With Provable Security and Anonymity for Mobile Edge Computing. IEEE Syst. J. 17(1): 1012-1023 (2023) - [j98]Kui Ma, Yanwei Zhou, Ying Wang, Chunsheng Dong, Zhe Xia, Bo Yang, Mingwu Zhang:
An Efficient Certificateless Signature Scheme With Provably Security and Its Applications. IEEE Syst. J. 17(4): 5636-5647 (2023) - [j97]Yanping Li, Zirui Li, Bo Yang, Yong Ding:
Algebraic Signature-Based Public Data Integrity Batch Verification for Cloud-IoT. IEEE Trans. Cloud Comput. 11(3): 3184-3196 (2023) - [j96]Mengge Li, Miao Ma, Liang Wang, Bo Yang, Tao Wang, Jinqiu Sun:
Multitask-Oriented Collaborative Crowdsensing Based on Reinforcement Learning and Blockchain for Intelligent Transportation System. IEEE Trans. Ind. Informatics 19(9): 9503-9514 (2023) - [j95]Jiani Li, Tao Wang, Bo Yang, Qiliang Yang, Wenzheng Zhang, Keyong Hong:
ABCrowdMed: A Fine-Grained Worker Selection Scheme for Crowdsourcing Healthcare With Privacy-Preserving. IEEE Trans. Serv. Comput. 16(5): 3182-3195 (2023) - [c33]Ran Xu, Yanwei Zhou, Yu Han, Bo Yang:
A Certificateless Aggregate Signature Scheme with Better Security. ProvSec 2023: 157-165 - 2022
- [j94]Liping Qiao, Yanping Li, Feng Wang, Bo Yang:
Lightweight integrity auditing of edge data for distributed edge computing scenarios. Ad Hoc Networks 133: 102906 (2022) - [j93]Meijuan Huang, Bo Yang, Yanwei Zhou, Xuewei Hu:
Continual Leakage-Resilient Hedged Public-Key Encryption. Comput. J. 65(6): 1574-1585 (2022) - [j92]Wenzheng Zhang, Zirui Qiao, Bo Yang, Yanwei Zhou, Mingwu Zhang:
Continuous Leakage-Amplified Public-Key Encryption With CCA Security. Comput. J. 65(7): 1760-1775 (2022) - [j91]Lina Zhang, Xiangqin Zheng, Keping Yu, Wenjuan Li, Tao Wang, Xuan Dang, Bo Yang:
Modular-based secret image sharing in Internet of Things: A global progressive-enabled approach. Concurr. Comput. Pract. Exp. 34(16) (2022) - [j90]Xuewei Hu, Bo Yang, Jing Zhang, Meijuan Huang:
Constructing totally disjoint spectra plateaued functions and searching five-value spectrum functions in odd variables. Discret. Appl. Math. 311: 110-128 (2022) - [j89]Yi Zhao, Kaitai Liang, Yanqi Zhao, Bo Yang, Yang Ming, Emmanouil Panaousis:
Practical algorithm substitution attack on extractable signatures. Des. Codes Cryptogr. 90(4): 921-937 (2022) - [j88]Tao Wang, Jingyi Wang, Qiliang Yang, Bo Yang, Haiyu Li, Fei Xu, Zirui Qiao:
An Efficient Verifiable Searchable Encryption Scheme With Aggregating Authorization for Blockchain-Enabled IoT. IEEE Internet Things J. 9(20): 20666-20680 (2022) - [j87]Xuewei Hu, Bo Yang, Jing Zhang, Meijuan Huang:
Constructions of non-basic totally disjoint spectra plateaued functions for cryptographic applications. J. Inf. Secur. Appl. 71: 103380 (2022) - [j86]Zirui Qiao, Yanwei Zhou, Bo Yang, Mingwu Zhang, Tao Wang, Zhe Xia:
Secure and Efficient Certificate-Based Proxy Signature Schemes for Industrial Internet of Things. IEEE Syst. J. 16(3): 4719-4730 (2022) - [j85]Yuan Su, Yanping Li, Bo Yang, Yong Ding:
Decentralized Self-Auditing Scheme With Errors Localization for Multi-Cloud Storage. IEEE Trans. Dependable Secur. Comput. 19(4): 2838-2850 (2022) - [c32]Shijin Chen, Mingwu Zhang, Bo Yang:
Bilateral Privacy-Preserving Task Assignment with Personalized Participant Selection for Mobile Crowdsensing. ISC 2022: 473-490 - 2021
- [j84]Jiaojiao Wu, Yanping Li, Fang Ren, Bo Yang:
Robust and auditable distributed data storage with scalability in edge computing. Ad Hoc Networks 117: 102494 (2021) - [j83]Yanwei Zhou, Bo Yang, Zhe Xia, Mingwu Zhang, Yi Mu:
Novel generic construction of leakage-resilient PKE scheme with CCA security. Des. Codes Cryptogr. 89(7): 1575-1614 (2021) - [j82]Jinhui Liu, Yong Yu, Bo Yang, Jianwei Jia, Qiqi Lai:
Cryptanalysis of Cramer-Shoup Like Cryptosystems Based on Index Exchangeable Family. Int. J. Found. Comput. Sci. 32(1): 73-91 (2021) - [j81]Yuan Su, Yanping Li, Kai Zhang, Bo Yang:
A privacy-preserving public integrity check scheme for outsourced EHRs. Inf. Sci. 542: 112-130 (2021) - [j80]Haiyu Li, Tao Wang, Zirui Qiao, Bo Yang, Yueyang Gong, Jingyi Wang, Guoyong Qiu:
Blockchain-based searchable encryption with efficient result verification and fair payment. J. Inf. Secur. Appl. 58: 102791 (2021) - [j79]Yanwei Zhou, Yuan Xu, Zirui Qiao, Bo Yang, Mingwu Zhang:
Continuous leakage-resilient certificate-based signcryption scheme and application in cloud computing. Theor. Comput. Sci. 860: 1-22 (2021) - [j78]Kang Yang, Liqun Chen, Zhenfeng Zhang, Christopher J. P. Newton, Bo Yang, Li Xi:
Direct Anonymous Attestation With Optimal TPM Signing Efficiency. IEEE Trans. Inf. Forensics Secur. 16: 2260-2275 (2021) - [j77]Qiliang Yang, Tao Wang, Wenbo Zhang, Bo Yang, Yong Yu, Haiyu Li, Jingyi Wang, Zirui Qiao:
PrivCrowd: A Secure Blockchain-Based Crowdsourcing Framework with Fine-Grained Worker Selection. Wirel. Commun. Mob. Comput. 2021: 3758782:1-3758782:17 (2021) - 2020
- [j76]Yanwei Zhou, Bo Yang, Tao Wang, Zhe Xia, Hong-xia Hou:
Continuous Leakage-Resilient Certificate-Based Encryption Scheme Without Bilinear Pairings. Comput. J. 63(4): 508-524 (2020) - [j75]Meijuan Huang, Bo Yang, Mingwu Zhang, Lina Zhang, Hong-xia Hou:
Updatable Lossy Trapdoor Functions Under Consecutive Leakage. Comput. J. 63(4): 648-656 (2020) - [j74]Yi Zhao, Jianting Ning, Kaitai Liang, Yanqi Zhao, Liqun Chen, Bo Yang:
Privacy preserving search services against online attack. Comput. Secur. 95: 101836 (2020) - [j73]Xuewei Hu, Bo Yang, Meijuan Huang:
A construction of highly nonlinear Boolean functions with optimal algebraic immunity and low hardware implementation cost. Discret. Appl. Math. 285: 407-422 (2020) - [j72]Yanwei Zhou, Bo Yang:
Practical continuous leakage-resilient CCA secure identity-based encryption. Frontiers Comput. Sci. 14(4): 144804 (2020) - [j71]Meijuan Huang, Bo Yang, Yi Zhao, Xin Wang, Yanwei Zhou, Zhe Xia:
A generic construction of CCA-secure deterministic encryption. Inf. Process. Lett. 154 (2020) - [j70]Hong-xia Hou, Bo Yang, Mingrui Zhang, Yanwei Zhou, Meijuan Huang:
Fully secure wicked identity-based encryption resilient to continual auxiliary- inputs leakage. J. Inf. Secur. Appl. 53: 102521 (2020) - [j69]Yanwei Zhou, Bo Yang, Tao Wang, Yi Mu:
Novel updatable identity-based hash proof system and its applications. Theor. Comput. Sci. 804: 1-28 (2020) - [j68]Yanwei Zhou, Bo Yang, Zhe Xia, Mingwu Zhang, Yi Mu:
Identity-based encryption with leakage-amplified chosen-ciphertext attacks security. Theor. Comput. Sci. 809: 277-295 (2020) - [j67]Yong Yu, Yannan Li, Bo Yang, Willy Susilo, Guomin Yang, Jian Bai:
Attribute-Based Cloud Data Integrity Auditing for Secure Outsourced Storage. IEEE Trans. Emerg. Top. Comput. 8(2): 377-390 (2020) - [c31]Zhe Xia, Bo Yang, Yanwei Zhou, Mingwu Zhang, Yi Mu:
Improvement of Attribute-Based Encryption Using Blakley Secret Sharing. ACISP 2020: 631-641
2010 – 2019
- 2019
- [j66]Yi Zhao, Yong Yu, Bo Yang:
Leakage Resilient CCA Security in Stronger Model: Branch Hidden ABO-LTFs and Their Applications. Comput. J. 62(4): 631-640 (2019) - [j65]Yanwei Zhou, Bo Yang, Hong-xia Hou, Lina Zhang, Tao Wang, Mingxiao Hu:
Continuous Leakage-Resilient Identity-Based Encryption with Tight Security. Comput. J. 62(8): 1092-1105 (2019) - [j64]Yanwei Zhou, Bo Yang, Yi Mu:
Continuous leakage-resilient identity-based encryption with leakage amplification. Des. Codes Cryptogr. 87(9): 2061-2090 (2019) - [j63]Yanwei Zhou, Bo Yang, Yi Mu, Tao Wang, Xin Wang:
Identity-based encryption resilient to continuous key leakage. IET Inf. Secur. 13(5): 426-434 (2019) - [j62]Qiqi Lai, Bo Yang, Zhe Xia, Yannan Li, Yuan Chen, Zhenlong Li:
Novel Identity-Based Hash Proof System with Compact Master Public Key from Lattices in the Standard Model. Int. J. Found. Comput. Sci. 30(4): 589-606 (2019) - [j61]Liang Xue, Yong Yu, Yannan Li, Man Ho Au, Xiaojiang Du, Bo Yang:
Efficient attribute-based encryption with attribute revocation for assured data deletion. Inf. Sci. 479: 640-650 (2019) - [j60]Meijuan Huang, Bo Yang, Yi Zhao, Kaitai Liang, Liang Xue, Xiaoyi Yang:
CCA-Secure Deterministic Identity-Based Encryption Scheme. J. Univers. Comput. Sci. 25(3): 245-269 (2019) - [j59]Xin Wang, Bo Yang, Zhe Xia, Hong-xia Hou:
A secure data sharing scheme with cheating detection based on Chaum-Pedersen protocol for cloud storage. Frontiers Inf. Technol. Electron. Eng. 20(6): 787-800 (2019) - [j58]Tao Wang, Bo Yang, Guoyong Qiu, Lina Zhang, Yong Yu, Yanwei Zhou, Juncai Guo:
An Approach Enabling Various Queries on Encrypted Industrial Data Stream. Secur. Commun. Networks 2019: 6293970:1-6293970:12 (2019) - [j57]Yi Zhao, Kaitai Liang, Bo Yang, Liqun Chen:
CCA Secure Public Key Encryption against After-the-Fact Leakage without NIZK Proofs. Secur. Commun. Networks 2019: 8357241:1-8357241:8 (2019) - [j56]Yanwei Zhou, Bo Yang, Zhe Xia, Yi Mu, Tao Wang:
Anonymous and Updatable Identity-Based Hash Proof System. IEEE Syst. J. 13(3): 2818-2829 (2019) - [j55]Tao Wang, Bo Yang, Hongyu Liu, Yong Yu, Guoyong Qiu, Zhe Xia:
An alternative approach to public cloud data auditing supporting data dynamics. Soft Comput. 23(13): 4939-4953 (2019) - [j54]Yanwei Zhou, Bo Yang, Yi Mu:
The generic construction of continuous leakage-resilient identity-based cryptosystems. Theor. Comput. Sci. 772: 1-45 (2019) - [c30]Zhe Xia, Lein Harn, Bo Yang, Mingwu Zhang, Yi Mu, Willy Susilo, Weizhi Meng:
Provably Secure Group Authentication in the Asynchronous Communication Model. ICICS 2019: 324-340 - [c29]Zhe Xia, Bo Yang, Yanwei Zhou, Mingwu Zhang, Hua Shen, Yi Mu:
Provably Secure Proactive Secret Sharing Without the Adjacent Assumption. ProvSec 2019: 247-264 - 2018
- [j53]Yanqi Zhao, Yannan Li, Qilin Mu, Bo Yang, Yong Yu:
Secure Pub-Sub: Blockchain-Based Fair Payment With Reputation for Reliable Cyber Physical Systems. IEEE Access 6: 12295-12303 (2018) - [j52]Yanwei Zhou, Bo Yang, Yi Mu, Zhe Xia:
Continuous leakage-resilient access control for wireless sensor networks. Ad Hoc Networks 80: 41-53 (2018) - [j51]Qiqi Lai, Bo Yang, Yong Yu, Yuan Chen, Jian Bai:
Novel Smooth Hash Proof Systems Based on Lattices. Comput. J. 61(4): 561-574 (2018) - [j50]Yanwei Zhou, Bo Yang, Yi Mu:
Continuous Leakage-Resilient Identity-Based Encryption without Random Oracles. Comput. J. 61(4): 586-600 (2018) - [j49]Jinhui Liu, Yong Yu, Bo Yang, Jianwei Jia, Shijia Wang, Houzhen Wang:
Structural Key Recovery of Simple Matrix Encryption Scheme Family. Comput. J. 61(12): 1880-1896 (2018) - [j48]Yong Yu, Yannan Li, Xiaojiang Du, Ruonan Chen, Bo Yang:
Content Protection in Named Data Networking: Challenges and Potential Solutions. IEEE Commun. Mag. 56(11): 82-87 (2018) - [j47]Yannan Li, Yong Yu, Bo Yang, Geyong Min, Huai Wu:
Privacy preserving cloud data auditing with efficient key update. Future Gener. Comput. Syst. 78: 789-798 (2018) - [j46]Yanwei Zhou, Bo Yang:
Leakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairing. Inf. Process. Lett. 130: 16-24 (2018) - [j45]Sha Ma, Yi Mu, Willy Susilo, Bo Yang:
Witness-based searchable encryption. Inf. Sci. 453: 364-378 (2018) - [j44]Linming Gong, Bo Yang, Tao Xue, Jinguang Chen, Wei Wang:
Secure rational numbers equivalence test based on threshold cryptosystem with rational numbers. Inf. Sci. 466: 44-54 (2018) - [j43]Qiqi Lai, Bo Yang, Yong Yu, Zhe Xia, Yanwei Zhou, Yuan Chen:
Updatable Identity-Based Hash Proof System Based on Lattices and Its Application to Leakage-Resilient Public-Key Encryption Schemes. J. Comput. Sci. Technol. 33(6): 1243-1260 (2018) - [j42]Yanwei Zhou, Bo Yang, Hao Cheng, Qing-long Wang:
Aleakage-resilient certificateless public key encryption scheme with CCA2 security. Frontiers Inf. Technol. Electron. Eng. 19(4): 481-493 (2018) - [j41]Xin Wang, Bo Yang, Zhe Xia, Yanqi Zhao, Huifang Yu:
A Cheating Detectable Privacy-Preserving Data Sharing Scheme for Cloud Computing. Secur. Commun. Networks 2018: 6174830:1-6174830:13 (2018) - [j40]Yong Yu, Liang Xue, Yannan Li, Xiaojiang Du, Mohsen Guizani, Bo Yang:
Assured Data Deletion With Fine-Grained Access Control for Fog-Based Industrial Applications. IEEE Trans. Ind. Informatics 14(10): 4538-4547 (2018) - [c28]Zhe Xia, Liuying Sun, Bo Yang, Yanwei Zhou, Mingwu Zhang:
Verifiable Secret Sharing Based on Hyperplane Geometry with Its Applications to Optimal Resilient Proactive Cryptosystems. ACISP 2018: 83-100 - [c27]Qiqi Lai, Bo Yang, Yong Yu, Yuan Chen, Liju Dong:
Anonymous Identity-Based Hash Proof System from Lattices in the Standard Model. ACISP 2018: 539-557 - [c26]Zhe Xia, Bo Yang, Mingwu Zhang, Yi Mu:
An Efficient and Provably Secure Private Polynomial Evaluation Scheme. ISPEC 2018: 595-609 - [i7]Yong Yu, Liang Xue, Yannan Li, Xiaojiang Du, Mohsen Guizani, Bo Yang:
Assured Data Deletion with Fine-grained Access Control for Fog-based Industrial Applications. CoRR abs/1804.02834 (2018) - [i6]Yong Yu, Yannan Li, Xiaojiang Du, Ruonan Chen, Bo Yang:
Content Protection in Named Data Networking: Challenges and Potential Solutions. CoRR abs/1810.11179 (2018) - [i5]Kang Yang, Liqun Chen, Zhenfeng Zhang, Chris Newton, Bo Yang, Li Xi:
Direct Anonymous Attestation with Optimal TPM Signing Efficiency. IACR Cryptol. ePrint Arch. 2018: 1128 (2018) - 2017
- [j39]Yi Zhao, Bo Yang:
Direct constructions and proofs for CCA secure (LR)IBE with dual system encryption. Sci. China Inf. Sci. 60(11): 119104:1-119104:3 (2017) - [j38]Yanwei Zhou, Bo Yang:
Continuous Leakage-Resilient Public-Key Encryption Scheme with CCA Security. Comput. J. 60(8): 1161-1172 (2017) - [j37]Huifang Yu, Bo Yang:
Pairing-Free and Secure Certificateless Signcryption Scheme. Comput. J. 60(8): 1187-1196 (2017) - [j36]Hui-fang Yu, Bo Yang:
Low-computation certificateless hybrid signcryption scheme. Frontiers Inf. Technol. Electron. Eng. 18(7): 928-940 (2017) - [j35]Yanwei Zhou, Bo Yang:
Continuous leakage-resilient certificateless public key encryption with CCA security. Knowl. Based Syst. 136: 27-36 (2017) - 2016
- [j34]Bo Yang, Mingwu Zhang, Jun-Qiang Du:
An error-tolerant keyword search scheme based on public-key encryption in secure cloud computing. Concurr. Comput. Pract. Exp. 28(4): 1083-1093 (2016) - [j33]Yanwei Zhou, Bo Yang, Wenzheng Zhang:
Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing. Discret. Appl. Math. 204: 185-202 (2016) - [j32]Mingwu Zhang, Bo Yang:
Continual key leakage tolerant encryption from extensible set delegation. Secur. Commun. Networks 9(12): 1638-1649 (2016) - [j31]Yanwei Zhou, Bo Yang, Wenzheng Zhang, Yi Mu:
CCA2 secure public-key encryption scheme tolerating continual leakage attacks. Secur. Commun. Networks 9(17): 4505-4519 (2016) - [c25]Bo Yang, Kang Yang, Zhenfeng Zhang, Yu Qin, Dengguo Feng:
AEP-M: Practical Anonymous E-Payment for Mobile Devices Using ARM TrustZone and Divisible E-Cash. ISC 2016: 130-146 - [i4]Bo Yang, Kang Yang, Zhenfeng Zhang, Yu Qin, Dengguo Feng:
AEP-M: Practical Anonymous E-Payment for Mobile Devices using ARM TrustZone and Divisible E-Cash (Full Version). IACR Cryptol. ePrint Arch. 2016: 494 (2016) - 2015
- [j30]Sha Ma, Mingwu Zhang, Qiong Huang, Bo Yang:
Public Key Encryption with Delegated Equality Test in a Multi-User Setting. Comput. J. 58(4): 986-1002 (2015) - [j29]Zhi-Yi Shao, Bo Yang:
Proof of retrievability with efficient verification. Int. J. Embed. Syst. 7(3/4): 203-215 (2015) - [j28]Yi Zhao, Qiliang Yang, Bo Yang:
Provably Secure Partially Blind Signature Scheme Based on Quadratic Residue. Int. J. Netw. Secur. 17(2): 217-223 (2015) - [j27]Zhi-Yi Shao, Bo Yang:
On security against the server in designated tester public key encryption with keyword search. Inf. Process. Lett. 115(12): 957-961 (2015) - [j26]Zhi-Yi Shao, Bo Yang:
Private set intersection via public key encryption with keywords search. Secur. Commun. Networks 8(3): 396-402 (2015) - [j25]Sha Ma, Qiong Huang, Mingwu Zhang, Bo Yang:
Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization. IEEE Trans. Inf. Forensics Secur. 10(3): 458-470 (2015) - [c24]Bo Yang, Kang Yang, Yu Qin, Zhenfeng Zhang, Dengguo Feng:
DAA-TZ: An Efficient DAA Scheme for Mobile Devices Using ARM TrustZone. TRUST 2015: 209-227 - [i3]Bo Yang, Kang Yang, Yu Qin, Zhenfeng Zhang, Dengguo Feng:
DAA-TZ: An Efficient DAA Scheme for Mobile Devices using ARM TrustZone. IACR Cryptol. ePrint Arch. 2015: 654 (2015) - 2014
- [j24]Mingwu Zhang, Takashi Nishide, Bo Yang, Tsuyoshi Takagi:
Anonymous encryption with partial-order subset delegation and its application in privacy email systems. IET Inf. Secur. 8(4): 240-249 (2014) - [j23]Mingwu Zhang, Chunzhi Wang, Bo Yang, Tsuyoshi Takagi:
Fully secure constructions of spatial encryption with vector privacy. Int. J. Commun. Syst. 27(12): 4307-4327 (2014) - [j22]Min Zhou, Mingwu Zhang, Chunzhi Wang, Bo Yang:
CCLAS: A Practical and Compact Certificateless Aggregate Signature with Share Extraction. Int. J. Netw. Secur. 16(2): 157-164 (2014) - [j21]Mingwu Zhang, Bo Yang, Tsuyoshi Takagi:
Anonymous spatial encryption under affine space delegation functionality with full security. Inf. Sci. 277: 715-730 (2014) - [j20]Bo Yang, Xiaoqiong Pang, Jun-Qiang Du, Dan Xie:
Effective Error-Tolerant Keyword Search for Secure Cloud Computing. J. Comput. Sci. Technol. 29(1): 81-89 (2014) - [j19]Sha Ma, Bo Yang, Mingwu Zhang:
PPGJ: A privacy-preserving general join for outsourced encrypted database. Secur. Commun. Networks 7(8): 1232-1244 (2014) - [j18]Mingwu Zhang, Bo Yang, Chunzhi Wang, Tsuyoshi Takagi:
Unbounded anonymous hierarchical IBE with continual-key-leakage tolerance. Secur. Commun. Networks 7(11): 1974-1987 (2014) - 2013
- [j17]Mingwu Zhang, Bo Yang, Tsuyoshi Takagi:
Bounded Leakage-Resilient Functional Encryption with Hidden Vector Predicate. Comput. J. 56(4): 464-477 (2013) - [j16]Bo Yang, Yong Yu, Ying Sun:
A novel construction of SDVS with secure disavowability. Clust. Comput. 16(4): 807-815 (2013) - [j15]Bo Yang, Chung-Huang Yang, Yong Yu, Dan Xie:
A Secure Scalar Product Protocol and Its Applications to Computational Geometry. J. Comput. 8(8): 2018-2026 (2013) - [j14]Bo Yang, Yong Yu, Chung-Huang Yang:
A Secure Scalar Product Protocol Against Malicious Adversaries. J. Comput. Sci. Technol. 28(1): 152-158 (2013) - [j13]Mingwu Zhang, Bo Yang, Zhenhua Chen, Tsuyoshi Takagi:
Efficient and adaptively secure broadcast encryption systems. Secur. Commun. Networks 6(8): 1044-1052 (2013) - [j12]Jing Liu, Qiong Huang, Bo Yang, Yang Zhang:
Efficient Multicast Key Distribution Using HOWP-Based Dynamic Group Access Structures. IEEE Trans. Computers 62(8): 1656-1672 (2013) - [c23]Zhiyi Shao, Bo Yang, Yong Yu:
Private Set Intersection via Public Key Encryption with Multiple Keywords Search. INCoS 2013: 323-328 - 2012
- [j11]Mingwu Zhang, Tsuyoshi Takagi, Bo Yang, Fagen Li:
Cryptanalysis of Strong Designated Verifier Signature Scheme with Non-delegatability and Non-transferability. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 259-262 (2012) - [j10]Yong Yu, Yi Mu, Guilin Wang, Qi Xia, Bo Yang:
Improved certificateless signature scheme provably secure in the standard model. IET Inf. Secur. 6(2): 102-110 (2012) - [j9]Mingwu Zhang, Bo Yang, Tsuyoshi Takagi:
Reconciling and improving of multi-receiver signcryption protocols with threshold decryption. Secur. Commun. Networks 5(12): 1430-1440 (2012) - [c22]Xiaoqiong Pang, Bo Yang, Qiong Huang:
Privacy-Preserving Noisy Keyword Search in Cloud Computing. ICICS 2012: 154-166 - [c21]Bo Yang, Ying Sun, Yong Yu, Qi Xia:
A Strong Designated Verifier Signature Scheme with Secure Disavowability. INCoS 2012: 286-291 - [c20]Weiwei Sun, Bo Yang, Qiong Huang, Sha Ma, Ximing Li:
Multi-Committer Threshold Commitment Scheme from Lattice. PAISI 2012: 162-175 - [c19]Bo Yang, Mingwu Zhang:
LR-UESDE: A Continual-Leakage Resilient Encryption with Unbounded Extensible Set Delegation. ProvSec 2012: 125-142 - 2011
- [j8]Ying Sun, Chunxiang Xu, Yong Yu, Bo Yang:
Improvement of a proxy multi-signature scheme without random oracles. Comput. Commun. 34(3): 257-263 (2011) - [j7]Mingwu Zhang, Bo Yang, Wenzheng Zhang, Tsuyoshi Takagi:
Multibiometric Based Secure Encryption, Authentication Scheme with Fuzzy Extractor. Int. J. Netw. Secur. 12(1): 50-57 (2011) - [j6]Mingwu Zhang, Bo Yang, Yusheng Zhong, Pengcheng Li, Tsuyoshi Takagi:
Cryptanalysis and Fixed of Short Signature Scheme without Random Oracle from Bilinear Parings. Int. J. Netw. Secur. 12(3): 130-136 (2011) - [j5]Mingwu Zhang, Bo Yang, Tsuyoshi Takagi:
Group-oriented setting's multisigncryption scheme with threshold designcryption. Inf. Sci. 181(18): 4041-4050 (2011) - [c18]Qiong Huang, Duncan S. Wong, Willy Susilo, Bo Yang:
An Efficient Construction of Time-Selective Convertible Undeniable Signatures. ISC 2011: 355-371 - [c17]Mingwu Zhang, Tsuyoshi Takagi, Bo Yang:
Dual-Verifiers DVS with Message Recovery for Tolerant Routing in Wireless Sensor Networks. PAISI 2011: 71-84 - [c16]Mingwu Zhang, Takashi Nishide, Bo Yang, Tsuyoshi Takagi:
Anonymous Encryption with Partial-Order Subset Delegation Functionality. ProvSec 2011: 154-169 - [i2]Jing Liu, Qiong Huang, Bo Yang:
Efficient Multicast Key Distribution Using HOWF-based Access Control Structures. IACR Cryptol. ePrint Arch. 2011: 576 (2011) - 2010
- [j4]Yajun Jiang, Bo Yang, Mingwu Zhang:
A Classified Credential Selection Scheme with Disclosure-minimizing Privacy. J. Digit. Content Technol. its Appl. 4(9): 201-211 (2010) - [c15]Mingwu Zhang, Bo Yang, Tsuyoshi Takagi, Yanping Shen, Wenzheng Zhang:
Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model. PAISI 2010: 77-87 - [c14]Mingwu Zhang, Pengcheng Li, Bo Yang, Hao Wang, Tsuyoshi Takagi:
Towards Confidentiality of ID-Based Signcryption Schemes under without Random Oracle Model. PAISI 2010: 98-104
2000 – 2009
- 2009
- [j3]Yong Yu, Bo Yang, Ying Sun, Shenglin Zhu:
Identity based signcryption scheme without random oracles. Comput. Stand. Interfaces 31(1): 56-62 (2009) - [j2]Mingwu Zhang, Bo Yang, Shenglin Zhu, Wenzheng Zhang:
Ordered Semiring-based Trust Establish Model with Risk Evaluating. Int. J. Netw. Secur. 8(2): 101-106 (2009) - [c13]Ximing Li, Bo Yang, Yubin Guo:
Fuzzy Identity Based Encryption Scheme with Some Assigned Attributes. IAS 2009: 133-136 - [c12]Mingwu Zhang, Yusheng Zhong, Bo Yang, Wenzheng Zhang:
Analysis and Improvement of an ID-Based Anonymous Signcryption Model. ICIC (1) 2009: 433-442 - [i1]Mingwu Zhang, Yusheng Zhong, Pengcheng Li, Bo Yang:
Analysis and Enhance of Anonymous Signcryption Scheme. IACR Cryptol. ePrint Arch. 2009: 194 (2009) - 2008
- [c11]Mingwu Zhang, Bo Yang, Shenglin Zhu, Wenzheng Zhang:
Assertions Signcryption Scheme in Decentralized Autonomous Trust Environments. ATC 2008: 516-526 - [c10]Mingwu Zhang, Bo Yang, Shenglin Zhu, Wenzheng Zhang:
Efficient Secret Authenticatable Anonymous Signcryption Scheme with Identity Privacy. ISI Workshops 2008: 126-137 - [c9]Huawei Huang, Bo Yang, Shenglin Zhu, Guozhen Xiao:
Generalized ElGamal Public Key Cryptosystem Based on a New Diffie-Hellman Problem. ProvSec 2008: 1-21 - 2007
- [j1]Bo Yang, Hua Ma, Shenglin Zhu:
A Traitor Tracing Scheme Based on the RSA System. Int. J. Netw. Secur. 5(2): 182-186 (2007) - [c8]Yong Yu, Bo Yang, Xinyi Huang, Mingwu Zhang:
Efficient Identity-Based Signcryption Scheme for Multiple Receivers. ATC 2007: 13-21 - [c7]Bo Yang, Yong Yu, Fagen Li, Ying Sun:
Provably Secure Identity-Based Threshold Unsigncryption Scheme. ATC 2007: 114-122 - [c6]Mingwu Zhang, Bo Yang, Shenglin Zhu, Wenzheng Zhang:
Trust-based Distributed Authentication Middleware in Ubiquitous Mobile Environments. ICNC (5) 2007: 814-818 - [c5]Mingwu Zhang, Bo Yang, Yu Qi, Wenzheng Zhang:
Using Trust Metric to Detect Malicious Behaviors in WSNs. SNPD (3) 2007: 104-108 - [c4]Yong Yu, Bo Yang, Ying Sun:
ID-based threshold signature and mediated signature schemes. SNPD (1) 2007: 473-478 - [c3]Yong Yu, Bo Yang, Ying Sun:
A provably secure ID-based mediated signcryption scheme. SNPD (3) 2007: 647-652 - 2006
- [c2]Bo Yang, Lin Piyuan, Zhang Wenzheng:
An Efficient Anonymous Fingerprinting Protocol. CIS 2006: 824-832 - 2003
- [c1]Jane Mao, Bo Yang:
Anonymous and dynamic conference-key distribution system. PIMRC 2003: 2784-2788
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-18 02:06 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint