Name
Affiliation
Papers
YU LONG
Dept. of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240, PR China
28
Collaborators
Citations 
PageRank 
43
84
11.96
Referers 
Referees 
References 
212
453
337
Search Limit
100453
Title
Citations
PageRank
Year
Making Monero Hard-to-Trace and More Efficient00.342019
Fork-free hybrid consensus with flexible Proof-of-Activity.30.532019
A Secure and Practical Blockchain Scheme for IoT00.342019
Z-Channel: Scalable and Efficient Scheme in Zerocash.10.352018
Access control encryption with efficient verifiable sanitized decryption.00.342018
A new randomized message-locked encryption in the standard model.00.342018
An efficient pairing-free certificateless signature scheme for resource-limited systems.20.382017
An Efficient and Provably Secure Pairing-Free Certificateless Signature Scheme Based on Variant of RSA.00.342017
Fuzzy certificateless signature.10.372016
Cryptanalysis of a certificateless aggregate signature scheme00.342016
A Modified Efficient Certificateless Signature Scheme without Bilinear Pairings20.382015
Attribute-based key-insulated signature and its applications.50.432014
On the Security of a Lattice-Based Multi-party Concurrent Signature Scheme00.342014
Accountable authority key policy attribute-based encryption60.442012
A Novel Unidirectional Proxy Re-Signature Scheme And Its Application For Manets20.422012
Identity-Based Key-Insulated Signcryption70.452012
Key updating technique in identity-based encryption70.662011
Restrictive partially blind signature for resource-constrained information systems00.342011
Practical Certificateless Aggregate Signatures from Bilinear Maps00.342010
Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism70.502010
Provably Secure Identity-based Threshold Key Escrow from Pairing10.392009
Certificateless threshold cryptosystem secure against chosen-ciphertext attack130.672007
ID-based threshold decryption secure against adaptive chosen-ciphertext attack60.492007
Efficient Partially Blind Signature from LFSR20.362007
Two Certificateless Aggregate Signatures From Bilinear Maps150.952007
Adaptive Chosen Ciphertext Secure Threshold Key Escrow Scheme from Pairing10.352006
Construction of Dynamic Threshold Decryption Scheme from Pairing10.372006
A dynamic threshold commercial key escrow scheme based on conic20.432005