default search action
Yanwei Zhou
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j47]Kui Ma, Guoji Song, Yanwei Zhou, Ran Xu, Bo Yang:
An efficient identity authentication protocol with revocation, tracking and fine-grained access control for electronic medical system. Comput. Stand. Interfaces 88: 103784 (2024) - [j46]Zirui Qiao, Kui Ma, Yanwei Zhou, Qiliang Yang, Zhe Xia, Bo Yang, Mingwu Zhang:
An Anonymous and Efficient Certificate-Based Identity Authentication Protocol for VANET. IEEE Internet Things J. 11(7): 11232-11245 (2024) - [j45]Yu Han, Yanwei Zhou, Bo Yang, Zhe Xia, Mingwu Zhang:
An Efficient and Secure Lightweight Certificateless Hybrid Signcryption Scheme. IEEE Internet Things J. 11(7): 12252-12265 (2024) - [j44]Ran Xu, Yanwei Zhou, Qiliang Yang, Kunwei Yang, Yu Han, Bo Yang, Zhe Xia:
An efficient and secure certificateless aggregate signature scheme. J. Syst. Archit. 147: 103030 (2024) - [j43]Yanwei Zhou, Lei Cao, Zirui Qiao, Ran Xu, Yu Han, Junsheng Xing, Bo Yang, Zhe Xia, Mingwu Zhang:
A Novel Cloud-Assisted Authentication Key Agreement Protocol for VANET. IEEE Trans. Veh. Technol. 73(9): 13526-13541 (2024) - [c7]Zirui Qiao, Ran Xu, Yonghui Lu, Yanwei Zhou, Bo Yang:
A New Construction of Leakage-Resilient Identity-Based Encryption Scheme. ISPEC 2024: 133-150 - 2023
- [j42]Yanwei Zhou, Zhaolong Wang, Zirui Qiao, Ying Wang, Bo Yang, Yi Mu, Mingwu Zhang:
Identity-Based Encryption With Continuous Leakage-Resilient CCA Security From Static Complexity Assumption. Comput. J. 66(4): 924-940 (2023) - [j41]Zirui Qiao, Qiliang Yang, Yanwei Zhou, Bo Yang, Mingwu Zhang:
A Novel Construction Of Certificateless Aggregate Signature Scheme For Healthcare Wireless Medical Sensor Networks. Comput. J. 66(11): 2810-2824 (2023) - [j40]Yanwei Zhou, Lei Cao, Bo Yang, Zhe Xia, Chunxiang Gu, Mingwu Zhang:
A direct construction of continuous leakage-resilient (H)IBE scheme with CCA security from dual system encryption. Comput. Stand. Interfaces 83: 103668 (2023) - [j39]Yanwei Zhou, Bo Yang, Zirui Qiao, Zhe Xia, Mingwu Zhang, Yi Mu:
Leakage-resilient identity-based cryptography from minimal assumptions. Des. Codes Cryptogr. 91(11): 3757-3801 (2023) - [j38]Zhaolong Wang, Yanwei Zhou, Zirui Qiao, Bo Yang, Chunxiang Gu, Yuan Xu, Mingwu Zhang:
An Anonymous and Revocable Authentication Protocol for Vehicle-to-Vehicle Communications. IEEE Internet Things J. 10(6, March 15): 5114-5127 (2023) - [j37]Yanwei Zhou, Lei Cao, Zirui Qiao, Zhe Xia, Bo Yang, Mingwu Zhang, Wenzheng Zhang:
An Efficient Identity Authentication Scheme With Dynamic Anonymity for VANETs. IEEE Internet Things J. 10(11): 10052-10065 (2023) - [j36]Yanwei Zhou, Zhaolong Wang, Zirui Qiao, Bo Yang, Mingwu Zhang:
An Efficient and Provably Secure Identity Authentication Scheme for VANET. IEEE Internet Things J. 10(19): 17170-17183 (2023) - [j35]Yanwei Zhou, Ran Xu, Zirui Qiao, Bo Yang, Zhe Xia, Mingwu Zhang:
An Anonymous and Efficient Multimessage and Multireceiver Certificateless Signcryption Scheme for VANET. IEEE Internet Things J. 10(24): 22823-22835 (2023) - [j34]Yanwei Zhou, Ran Xu, Wenzheng Zhang, Zhe Xia, Bo Yang, Chunxiang Gu, Meijuan Huang:
Public-key encryption scheme with optimal continuous leakage resilience. Inf. Process. Lett. 180: 106318 (2023) - [j33]Zirui Qiao, Qiliang Yang, Yanwei Zhou, Bo Yang, Mingwu Zhang:
A redesigned secure and efficient data transaction protocol for mobile payment system. J. Syst. Archit. 143: 102964 (2023) - [j32]Zirui Qiao, Qiliang Yang, Yanwei Zhou, Bo Yang, Zhe Xia, Mingwu Zhang, Tao Wang:
An Efficient Certificate-Based Aggregate Signature Scheme With Provable Security for Industrial Internet of Things. IEEE Syst. J. 17(1): 72-82 (2023) - [j31]Yuan Xu, Yanwei Zhou, Bo Yang, Zirui Qiao, Zhaolong Wang, Zhe Xia, Mingwu Zhang:
An Efficient Identity Authentication Scheme With Provable Security and Anonymity for Mobile Edge Computing. IEEE Syst. J. 17(1): 1012-1023 (2023) - [j30]Kui Ma, Yanwei Zhou, Ying Wang, Chunsheng Dong, Zhe Xia, Bo Yang, Mingwu Zhang:
An Efficient Certificateless Signature Scheme With Provably Security and Its Applications. IEEE Syst. J. 17(4): 5636-5647 (2023) - [c6]Ran Xu, Yanwei Zhou, Yu Han, Bo Yang:
A Certificateless Aggregate Signature Scheme with Better Security. ProvSec 2023: 157-165 - 2022
- [j29]Meijuan Huang, Bo Yang, Yanwei Zhou, Xuewei Hu:
Continual Leakage-Resilient Hedged Public-Key Encryption. Comput. J. 65(6): 1574-1585 (2022) - [j28]Wenzheng Zhang, Zirui Qiao, Bo Yang, Yanwei Zhou, Mingwu Zhang:
Continuous Leakage-Amplified Public-Key Encryption With CCA Security. Comput. J. 65(7): 1760-1775 (2022) - [j27]Zirui Qiao, Qiliang Yang, Yanwei Zhou, Mingwu Zhang:
Improved Secure Transaction Scheme With Certificateless Cryptographic Primitives for IoT-Based Mobile Payments. IEEE Syst. J. 16(2): 1842-1850 (2022) - [j26]Zirui Qiao, Yanwei Zhou, Bo Yang, Mingwu Zhang, Tao Wang, Zhe Xia:
Secure and Efficient Certificate-Based Proxy Signature Schemes for Industrial Internet of Things. IEEE Syst. J. 16(3): 4719-4730 (2022) - 2021
- [j25]Zirui Qiao, Qiliang Yang, Yanwei Zhou, Zhe Xia, Mingwu Zhang:
Novel Public-Key Encryption with Continuous Leakage Amplification. Comput. J. 64(8): 1163-1177 (2021) - [j24]Yanwei Zhou, Bo Yang, Zhe Xia, Mingwu Zhang, Yi Mu:
Novel generic construction of leakage-resilient PKE scheme with CCA security. Des. Codes Cryptogr. 89(7): 1575-1614 (2021) - [j23]Yanwei Zhou, Yuan Xu, Zirui Qiao, Bo Yang, Mingwu Zhang:
Continuous leakage-resilient certificate-based signcryption scheme and application in cloud computing. Theor. Comput. Sci. 860: 1-22 (2021) - 2020
- [j22]Yanwei Zhou, Bo Yang, Tao Wang, Zhe Xia, Hong-xia Hou:
Continuous Leakage-Resilient Certificate-Based Encryption Scheme Without Bilinear Pairings. Comput. J. 63(4): 508-524 (2020) - [j21]Yanwei Zhou, Bo Yang:
Practical continuous leakage-resilient CCA secure identity-based encryption. Frontiers Comput. Sci. 14(4): 144804 (2020) - [j20]Meijuan Huang, Bo Yang, Yi Zhao, Xin Wang, Yanwei Zhou, Zhe Xia:
A generic construction of CCA-secure deterministic encryption. Inf. Process. Lett. 154 (2020) - [j19]Hong-xia Hou, Bo Yang, Mingrui Zhang, Yanwei Zhou, Meijuan Huang:
Fully secure wicked identity-based encryption resilient to continual auxiliary- inputs leakage. J. Inf. Secur. Appl. 53: 102521 (2020) - [j18]Yanwei Zhou, Bo Yang, Tao Wang, Yi Mu:
Novel updatable identity-based hash proof system and its applications. Theor. Comput. Sci. 804: 1-28 (2020) - [j17]Yanwei Zhou, Bo Yang, Zhe Xia, Mingwu Zhang, Yi Mu:
Identity-based encryption with leakage-amplified chosen-ciphertext attacks security. Theor. Comput. Sci. 809: 277-295 (2020) - [c5]Zhe Xia, Bo Yang, Yanwei Zhou, Mingwu Zhang, Yi Mu:
Improvement of Attribute-Based Encryption Using Blakley Secret Sharing. ACISP 2020: 631-641
2010 – 2019
- 2019
- [j16]Yanwei Zhou, Bo Yang, Hong-xia Hou, Lina Zhang, Tao Wang, Mingxiao Hu:
Continuous Leakage-Resilient Identity-Based Encryption with Tight Security. Comput. J. 62(8): 1092-1105 (2019) - [j15]Yanwei Zhou, Bo Yang, Yi Mu:
Continuous leakage-resilient identity-based encryption with leakage amplification. Des. Codes Cryptogr. 87(9): 2061-2090 (2019) - [j14]Yanwei Zhou, Bo Yang, Yi Mu, Tao Wang, Xin Wang:
Identity-based encryption resilient to continuous key leakage. IET Inf. Secur. 13(5): 426-434 (2019) - [j13]Tao Wang, Bo Yang, Guoyong Qiu, Lina Zhang, Yong Yu, Yanwei Zhou, Juncai Guo:
An Approach Enabling Various Queries on Encrypted Industrial Data Stream. Secur. Commun. Networks 2019: 6293970:1-6293970:12 (2019) - [j12]Yanwei Zhou, Bo Yang, Zhe Xia, Yi Mu, Tao Wang:
Anonymous and Updatable Identity-Based Hash Proof System. IEEE Syst. J. 13(3): 2818-2829 (2019) - [j11]Yanwei Zhou, Bo Yang, Yi Mu:
The generic construction of continuous leakage-resilient identity-based cryptosystems. Theor. Comput. Sci. 772: 1-45 (2019) - [c4]Qiliang Yang, Yanwei Zhou, Yong Yu:
Leakage-Resilient Certificateless Signcryption Scheme. GLOBECOM Workshops 2019: 1-6 - [c3]Zhe Xia, Bo Yang, Yanwei Zhou, Mingwu Zhang, Hua Shen, Yi Mu:
Provably Secure Proactive Secret Sharing Without the Adjacent Assumption. ProvSec 2019: 247-264 - 2018
- [j10]Yanwei Zhou, Bo Yang, Yi Mu, Zhe Xia:
Continuous leakage-resilient access control for wireless sensor networks. Ad Hoc Networks 80: 41-53 (2018) - [j9]Yanwei Zhou, Bo Yang, Yi Mu:
Continuous Leakage-Resilient Identity-Based Encryption without Random Oracles. Comput. J. 61(4): 586-600 (2018) - [j8]Yanwei Zhou, Bo Yang:
Leakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairing. Inf. Process. Lett. 130: 16-24 (2018) - [j7]Qiqi Lai, Bo Yang, Yong Yu, Zhe Xia, Yanwei Zhou, Yuan Chen:
Updatable Identity-Based Hash Proof System Based on Lattices and Its Application to Leakage-Resilient Public-Key Encryption Schemes. J. Comput. Sci. Technol. 33(6): 1243-1260 (2018) - [j6]Yanwei Zhou, Bo Yang, Hao Cheng, Qing-long Wang:
Aleakage-resilient certificateless public key encryption scheme with CCA2 security. Frontiers Inf. Technol. Electron. Eng. 19(4): 481-493 (2018) - [c2]Zhe Xia, Liuying Sun, Bo Yang, Yanwei Zhou, Mingwu Zhang:
Verifiable Secret Sharing Based on Hyperplane Geometry with Its Applications to Optimal Resilient Proactive Cryptosystems. ACISP 2018: 83-100 - 2017
- [j5]Yanwei Zhou, Bo Yang:
Continuous Leakage-Resilient Public-Key Encryption Scheme with CCA Security. Comput. J. 60(8): 1161-1172 (2017) - [j4]Yanwei Zhou, Bo Yang:
Continuous leakage-resilient certificateless public key encryption with CCA security. Knowl. Based Syst. 136: 27-36 (2017) - [c1]Ru Meng, Yanwei Zhou, Jianting Ning, Kaitai Liang, Jinguang Han, Willy Susilo:
An Efficient Key-Policy Attribute-Based Searchable Encryption in Prime-Order Groups. ProvSec 2017: 39-56 - 2016
- [j3]Yanwei Zhou, Bo Yang, Wenzheng Zhang:
Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing. Discret. Appl. Math. 204: 185-202 (2016) - [j2]Yanwei Zhou, Bo Yang, Wenzheng Zhang, Yi Mu:
CCA2 secure public-key encryption scheme tolerating continual leakage attacks. Secur. Commun. Networks 9(17): 4505-4519 (2016)
2000 – 2009
- 2009
- [j1]Zhe Jin, Yanwei Zhou, Zhihuan Song:
Behavioral Modeling of RF Power amplifiers Using Modified Volterra Series. J. Circuits Syst. Comput. 18(2): 351-359 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 20:17 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint