Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Silvia Wen-Yu Lee
Daniel P. Kennedy
Roland Zumkeller
Maximilian Dürr
Dan Graur
Liangliang Shang
Chen Ma
Barbara Aquilani
K. A.S. Immink
Zhigang Yao
Home
/
Author
/
YU LONG
Author Info
Open Visualization
Name
Affiliation
Papers
YU LONG
Dept. of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240, PR China
28
Collaborators
Citations
PageRank
43
84
11.96
Referers
Referees
References
212
453
337
Search Limit
100
453
Publications (28 rows)
Collaborators (43 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Making Monero Hard-to-Trace and More Efficient
0
0.34
2019
Fork-free hybrid consensus with flexible Proof-of-Activity.
3
0.53
2019
A Secure and Practical Blockchain Scheme for IoT
0
0.34
2019
Z-Channel: Scalable and Efficient Scheme in Zerocash.
1
0.35
2018
Access control encryption with efficient verifiable sanitized decryption.
0
0.34
2018
A new randomized message-locked encryption in the standard model.
0
0.34
2018
An efficient pairing-free certificateless signature scheme for resource-limited systems.
2
0.38
2017
An Efficient and Provably Secure Pairing-Free Certificateless Signature Scheme Based on Variant of RSA.
0
0.34
2017
Fuzzy certificateless signature.
1
0.37
2016
Cryptanalysis of a certificateless aggregate signature scheme
0
0.34
2016
A Modified Efficient Certificateless Signature Scheme without Bilinear Pairings
2
0.38
2015
Attribute-based key-insulated signature and its applications.
5
0.43
2014
On the Security of a Lattice-Based Multi-party Concurrent Signature Scheme
0
0.34
2014
Accountable authority key policy attribute-based encryption
6
0.44
2012
A Novel Unidirectional Proxy Re-Signature Scheme And Its Application For Manets
2
0.42
2012
Identity-Based Key-Insulated Signcryption
7
0.45
2012
Key updating technique in identity-based encryption
7
0.66
2011
Restrictive partially blind signature for resource-constrained information systems
0
0.34
2011
Practical Certificateless Aggregate Signatures from Bilinear Maps
0
0.34
2010
Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism
7
0.50
2010
Provably Secure Identity-based Threshold Key Escrow from Pairing
1
0.39
2009
Certificateless threshold cryptosystem secure against chosen-ciphertext attack
13
0.67
2007
ID-based threshold decryption secure against adaptive chosen-ciphertext attack
6
0.49
2007
Efficient Partially Blind Signature from LFSR
2
0.36
2007
Two Certificateless Aggregate Signatures From Bilinear Maps
15
0.95
2007
Adaptive Chosen Ciphertext Secure Threshold Key Escrow Scheme from Pairing
1
0.35
2006
Construction of Dynamic Threshold Decryption Scheme from Pairing
1
0.37
2006
A dynamic threshold commercial key escrow scheme based on conic
2
0.43
2005
1