Anjia Yang
Anjia Yang
Jinan University
Email verificata su my.cityu.edu.hk - Home page
Titolo
Citata da
Citata da
Anno
Crowdbc: A blockchain-based decentralized framework for crowdsourcing
M Li, J Weng, A Yang, W Lu, Y Zhang, L Hou, JN Liu, Y Xiang, RH Deng
IEEE Transactions on Parallel and Distributed Systems 30 (6), 1251-1266, 2018
1752018
A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing
K Liang, MH Au, JK Liu, W Susilo, DS Wong, G Yang, Y Yu, A Yang
Future Generation Computer Systems 52, 95-108, 2015
1192015
A new ADS-B authentication framework based on efficient hierarchical identity-based signature with batch verification
A Yang, X Tan, J Baek, DS Wong
IEEE Transactions on Services Computing 10 (2), 165-175, 2015
472015
Lightweight and privacy-preserving delegatable proofs of storage with data dynamics in cloud storage
A Yang, J Xu, J Weng, J Zhou, DS Wong
IEEE Transactions on Cloud Computing, 2018
272018
An efficient single-slow-phase mutually authenticated RFID distance bounding protocol with tag privacy
A Yang, Y Zhuang, DS Wong
International Conference on Information and Communications Security, 285-292, 2012
192012
Toward Blockchain-Based Fair and Anonymous Ad Dissemination in Vehicular Networks
M Li, J Weng, A Yang, JN Liu, X Lin
IEEE Transactions on Vehicular Technology 68 (11), 11248-11259, 2019
162019
Two-hop distance-bounding protocols: Keep your friends close
A Yang, E Pagnin, A Mitrokotsa, GP Hancke, DS Wong
IEEE Transactions on Mobile Computing 17 (7), 1723-1736, 2017
162017
Deqos attack: Degrading quality of service in vanets and its mitigation
A Yang, J Weng, N Cheng, J Ni, X Lin, X Shen
IEEE Transactions on Vehicular Technology 68 (5), 4834-4845, 2019
152019
HB+ DB: Distance bounding meets human based authentication
E Pagnin, A Yang, Q Hu, G Hancke, A Mitrokotsa
Future Generation Computer Systems 80, 627-639, 2018
152018
Security analysis of some diffusion mechanisms used in chaotic ciphers
LY Zhang, Y Zhang, Y Liu, A Yang, G Chen
International Journal of Bifurcation and Chaos 27 (10), 1750155, 2017
152017
A highly efficient RFID distance bounding protocol without real-time PRF evaluation
Y Zhuang, A Yang, DS Wong, G Yang, Q Xie
International Conference on Network and System Security, 451-464, 2013
122013
HB+ DB, mitigating man-in-the-middle attacks against HB+ with distance bounding
E Pagnin, A Yang, G Hancke, A Mitrokotsa
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and…, 2015
102015
Lightweight delegatable proofs of storage
J Xu, A Yang, J Zhou, DS Wong
European Symposium on Research in Computer Security, 324-343, 2016
92016
Enabling Efficient and Privacy-Preserving Aggregation Communication and Function Query for Fog Computing-Based Smart Grid
JN Liu, J Weng, A Yang, Y Chen, X Lin
IEEE Transactions on Smart Grid 11 (1), 247-257, 2019
82019
Notes on a provably-secure certificate-based encryption against malicious CA attacks
W Yang, J Weng, A Yang, C Xie, Y Yang
Information Sciences 463, 86-91, 2018
72018
Remt: A real-time end-to-end media data transmission mechanism in uav-aided networks
J Zhang, J Weng, W Luo, JN Liu, A Yang, J Lin, Z Zhang, H Li
IEEE Network 32 (5), 118-123, 2018
72018
Practical limitation of co-operative RFID jamming methods in environments without accurate signal synchronization
Q Hu, LM Dinca, A Yang, G Hancke
Computer Networks 105, 224-236, 2016
72016
A new unpredictability-based RFID privacy model
A Yang, Y Zhuang, DS Wong, G Yang
International Conference on Network and System Security, 479-492, 2013
72013
Preventing overshadowing attacks in self-jamming audio channels
HU Qiao, Y Liu, A Yang, G Hancke
IEEE Transactions on Dependable and Secure Computing, 2018
52018
Strongly unforgeable certificateless signature resisting attacks from malicious-but-passive KGC
W Yang, J Weng, W Luo, A Yang
Security and Communication Networks 2017, 2017
52017
Il sistema al momento non pu eseguire l'operazione. Riprova pi tardi.
Articoli 1–20