What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Yuan Zhang
Google Scholar
ORCID:
0000-0002-7909-9845
16
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
What Makes a Good Exchange? Privacy-Preserving and Fair Contract Agreement in Data Trading.
Xinyu He
Yuan Zhang
Yaqing Song
Weidong Qiu
Hongwei Li
Qiang Tang
2025
journals/popets
EpiOracle: Privacy-Preserving Cross-Facility Early Warning for Unknown Epidemics.
Shiyu Li
Yuan Zhang
Yaqing Song
Fan Wu
Feng Lyu
Kan Yang
Qiang Tang
2025
journals/istr
A general framework for high-dimension data secure aggregation with resilience to dropouts.
Chao Huang
Yanqing Yao
Xiaojun Zhang
Yuan Zhang
Zhoujun Li
2024
journals/istr
Fine-grained encrypted data aggregation mechanism with fault tolerance in edge-assisted smart grids.
Xiaojun Zhang
Xudong Deng
Haiyang Zhang
Yuan Zhang
Jingting Xue
2024
journals/tifs
Beyond Security: Achieving Fairness in Mailmen-Assisted Timed Data Delivery.
Shiyu Li
Yuan Zhang
Yaqing Song
Hongbo Liu
Nan Cheng
Dahai Tao
Hongwei Li
Kan Yang
2024
journals/tifs
Hardening Password-Based Credential Databases.
Yaqing Song
Chunxiang Xu
Yuan Zhang
Shiyu Li
2024
journals/tifs
PrivSSO: Practical Single-Sign-On Authentication Against Subscription/Access Pattern Leakage.
Ge Gao
Yuan Zhang
Yaqing Song
Shiyu Li
2024
conf/uss
Instruction Backdoor Attacks Against Customized LLMs.
Rui Zhang
Hongwei Li
Rui Wen
Wenbo Jiang
Yuan Zhang
Michael Backes
Yun Shen
Yang Zhang
2024
conf/uss
Scalable Zero-knowledge Proofs for Non-linear Functions in Machine Learning.
Meng Hao
Hanxiao Chen
Hongwei Li
Chenkai Weng
Yuan Zhang
Haomiao Yang
Tianwei Zhang
2022
journals/tifs
A Secure Two-Factor Authentication Scheme From Password-Protected Hardware Tokens.
Shanshan Li
Chunxiang Xu
Yuan Zhang
Jianying Zhou
2021
journals/tifs
Cryptoanalysis of an Authenticated Data Structure Scheme With Public Privacy-Preserving Auditing.
Shiyu Li
Yuan Zhang
Chunxiang Xu
Kefei Chen
2019
journals/istr
CSED: Client-Side encrypted deduplication scheme based on proofs of ownership for cloud storage.
Shanshan Li
Chunxiang Xu
Yuan Zhang
2018
journals/istr
A dynamic and non-interactive boolean searchable symmetric encryption in multi-client setting.
Lixue Sun
Chunxiang Xu
Yuan Zhang
2018
conf/icics
Blockchain-Based Secure Data Provenance for Cloud Storage.
Yuan Zhang
Xiaodong Lin
Chunxiang Xu
2017
journals/tifs
Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation.
Yuan Zhang
Chunxiang Xu
Xiaohui Liang
Hongwei Li
Yi Mu
Xiaojun Zhang
2015
journals/istr
Cryptanalysis of an integrity checking scheme for cloud data sharing.
Yuan Zhang
Chunxiang Xu
Jining Zhao
Xiaojun Zhang
Junwei Wen
Coauthors
Chao Huang
(1)
Chenkai Weng
(1)
Chunxiang Xu
(8)
Dahai Tao
(1)
Fan Wu
(1)
Feng Lyu
(1)
Ge Gao
(1)
Haiyang Zhang
(1)
Hanxiao Chen
(1)
Haomiao Yang
(1)
Hongbo Liu
(1)
Hongwei Li
(5)
Jianying Zhou
(1)
Jingting Xue
(1)
Jining Zhao
(1)
Junwei Wen
(1)
Kan Yang
(2)
Kefei Chen
(1)
Lixue Sun
(1)
Meng Hao
(1)
Michael Backes
(1)
Nan Cheng
(1)
Qiang Tang
(2)
Rui Wen
(1)
Rui Zhang
(1)
Shanshan Li
(2)
Shiyu Li
(5)
Tianwei Zhang
(1)
Weidong Qiu
(1)
Wenbo Jiang
(1)
Xiaodong Lin
(1)
Xiaohui Liang
(1)
Xiaojun Zhang
(4)
Xinyu He
(1)
Xudong Deng
(1)
Yang Zhang
(1)
Yanqing Yao
(1)
Yaqing Song
(5)
Yi Mu
(1)
Yuan Zhang
(16)
Yun Shen
(1)
Zhoujun Li
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to