default search action
Yiliang Han
Person information
- unicode name: 韩益亮
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j16]Su Cui, Yiliang Han, Yifei Duan, Yu Li, Shuaishuai Zhu, Chaoyue Song:
A Two-Stage Voting-Boosting Technique for Ensemble Learning in Social Network Sentiment Classification. Entropy 25(4): 555 (2023) - [j15]Xiaoliang Che, Longfei Liu, Baocang Wang, Yiliang Han, Xu An Wang, Xiaoyuan Yang, Tanping Zhou:
Multi-key homomorphic encryption with tightened RGSW ciphertexts without relinearization for ciphertexts product. J. King Saud Univ. Comput. Inf. Sci. 35(10): 101794 (2023) - [j14]Yao Liu, Tanping Zhou, Zelun Yue, Wenchao Liu, Yiliang Han, Qi Li, Xiaoyuan Yang:
Secure and Efficient Online Fingerprint Authentication Scheme Based On Cloud Computing. IEEE Trans. Cloud Comput. 11(1): 564-578 (2023) - 2022
- [j13]Liqiang Wu, Yiliang Han, Xiaoyuan Yang, Minqing Zhang:
Identity-based threshold proxy re-encryption scheme from lattices and its applications. Frontiers Inf. Technol. Electron. Eng. 23(2): 258-277 (2022) - [c28]Riming Wu, Yiliang Han, Kaiyang Guo, Kai Liu:
Information dissemination model of recommendation platform based on network community. DSC 2022: 633-641 - [i9]Yan Ke, Minqing Zhang, Xinpeng Zhang, Yiliang Han, Jia Liu:
Reversible Data hiding in Encrypted Domain with Public Key Embedding Mechanism. CoRR abs/2208.14510 (2022) - 2021
- [j12]Tanping Zhou, Ningbo Li, Qiqi Lai, Xiaoyuan Yang, Yiliang Han, Wenchao Liu:
Efficient multi-key fully homomorphic encryption over prime cyclotomic rings with fewer relinearisations. IET Inf. Secur. 15(6): 472-486 (2021) - [c27]Xu Chen, Feng Pan, Yiliang Han, Riming Wu:
Research on COVID-19 Internet Derived Public Opinions Prediction Based on the Event Evolution Graph. ICPCSEE (2) 2021: 44-54 - [c26]Xiaowei Duan, Yiliang Han, Chao Wang, Xinliang Bi:
Research on Plaintext Resilient Encrypted Communication Based on Generative Adversarial Network. ICPCSEE (2) 2021: 151-165 - [c25]Huanhuan Ni, Yiliang Han, Xiaowei Duan, Guohui Yang:
An Improved LeNet-5 Model Based on Encrypted Data. ICPCSEE (2) 2021: 166-178 - [c24]Chao Wang, Yiliang Han, Xiaowei Duan, Kaiyang Guo:
Hierarchical Identity-Based Conditional Proxy Re-encryption Scheme Based RLWE and NTRU Variant. ICPCSEE (2) 2021: 240-259 - 2020
- [j11]Yiliang Han, Yu Li, Zhe Li, Shuaishuai Zhu:
An Improved Method to Evaluate the Synchronization in Neural Key Exchange Protocol. Secur. Commun. Networks 2020: 8869688:1-8869688:10 (2020) - [c23]Zhe Li, Yiliang Han, Yu Li:
Application of Polar Code-Based Scheme in Cloud Secure Storage. ICPCSEE (1) 2020: 676-689 - [c22]Shuaishuai Zhu, Yiliang Han, Xiaoyuan Yang, Xuguang Wu:
Efficient and Evolvable Key Reconciliation Mechanism in Multi-party Networks Based on Automatic Learning Structure. SPDE 2020: 91-99 - [c21]Shuaishuai Zhu, Yiliang Han:
Analysis Toward RLWE-Based Key Exchange Protocol Based on Automatic Learning Structure. SPDE 2020: 625-639
2010 – 2019
- 2019
- [j10]Ningbo Li, Tanping Zhou, Xiaoyuan Yang, Yiliang Han, Wenchao Liu, Guangsheng Tu:
Efficient Multi-Key FHE With Short Extended Ciphertexts and Directed Decryption Protocol. IEEE Access 7: 56724-56732 (2019) - [j9]Zhen Liu, Yiliang Han, Xiaoyuan Yang:
A compressive sensing-based adaptable secure data collection scheme for distributed wireless sensor networks. Int. J. Distributed Sens. Networks 15(6) (2019) - [j8]Xiangxin Liu, Xiaoyuan Yang, Yiliang Han, Xu An Wang:
A Secure and Efficient Code-Based Signature Scheme. Int. J. Found. Comput. Sci. 30(4): 635-645 (2019) - [j7]JingJing Wang, Yiliang Han, Xiaoyuan Yang, Tanping Zhou, Jiayong Chen:
A New Group Location Privacy-Preserving Method Based on Distributed Architecture in LBS. Secur. Commun. Networks 2019: 2414687:1-2414687:14 (2019) - [j6]Yiliang Han:
Attribute-based encryption with adaptive policy. Soft Comput. 23(12): 4009-4017 (2019) - [c20]Zhong Wang, Yiliang Han:
Anti-quantum Cryptography Scheme Based on the Improvement of Cubic Simple Matrix and LRPC Code. ICPCSEE (1) 2019: 373-385 - [c19]Zhen Liu, Yiliang Han, Xiao-Yuan Yang:
A Signcryption Scheme Based Learning with Errors over Rings Without Trapdoor. NCTCS 2019: 168-180 - 2018
- [j5]Shuaishuai Zhu, Yiliang Han:
Secure data outsourcing scheme in cloud computing with attribute-based encryption. Int. J. High Perform. Comput. Netw. 12(2): 128-136 (2018) - [c18]Deyang Zhang, Yiliang Han, Xiaolong Li:
Dynamic Detection Method of Micro-blog Topic Based on Time Series. ICPCSEE (2) 2018: 192-200 - [c17]Xiaolong Li, Yiliang Han, Deyang Zhang, Xuguang Wu:
An Evaluation Algorithm for Importance of Dynamic Nodes in Social Networks Based on Three-Dimensional Grey Relational Degree. ICPCSEE (2) 2018: 201-212 - [i8]Jia Liu, Yan Ke, Yu Lei, Yaojie Wang, Yiliang Han, Minqing Zhang, Xiaoyuan Yang:
The Reincarnation of Grille Cipher. CoRR abs/1804.06514 (2018) - [i7]Tanping Zhou, Ningbo Li, Xiaoyuan Yang, Yiliang Han, Wenchao Liu:
Efficient Multi-key FHE with short extended ciphertexts and less public parameters. IACR Cryptol. ePrint Arch. 2018: 1054 (2018) - [i6]Ningbo Li, Tanping Zhou, Xiaoyuan Yang, Yiliang Han, Longfei Liu, Wenchao Liu:
Two round multiparty computation via Multi-key fully homomorphic encryption with faster homomorphic evaluations. IACR Cryptol. ePrint Arch. 2018: 1249 (2018) - 2017
- [c16]Xuguang Wu, Yiliang Han, Minqing Zhang, Shuaishuai Zhu:
Parallel Long Messages Encryption Scheme Based on Certificateless Cryptosystem for Big Data. Inscrypt 2017: 211-222 - [c15]Xi Lin, Yiliang Han:
Hierarchical Access Control Scheme of Private Data Based on Attribute Encryption. ICPCSEE (1) 2017: 220-230 - 2016
- [j4]Di Jiang, Yiliang Han:
适用于移动网络的属性基在线/离线签密方案 (Attribute-based Online/Offline Signcryption for Mobile Network). 计算机科学 43(11): 221-225 (2016) - [c14]Fei Chen, Yiliang Han, Di Jiang, Xiaoce Li, Xiaoyuan Yang:
Outsourcing the Unsigncryption of Compact Attribute-Based Signcryption for General Circuits. ICYCSEE (1) 2016: 533-545 - [c13]Tanping Zhou, Xiaoyuan Yang, Xu An Wang, Yiliang Han:
Some Practical Properties of AP14. INCoS 2016: 527-531 - [c12]Yiliang Han:
The Encryption Scheme with Data Compression Based on QC-LDPC. SpaCCS 2016: 156-163 - [c11]Xi Lin, Yiliang Han, Yan Ke, Xiaoyuan Yang:
Location Privacy Preserving Scheme Based on Attribute Encryption. SpaCCS 2016: 164-177 - 2015
- [c10]Yiliang Han, Fei Chen:
The Multilinear Maps Based Certificateless Aggregate Signcryption Scheme. CyberC 2015: 92-99 - [c9]Yiliang Han, Yincheng Bai, Dingyi Fang, Xiaoyuan Yang:
The New Attribute-Based Generalized Signcryption Scheme. ICYCSEE 2015: 353-360 - [c8]Shuaishuai Zhu, Yiliang Han, Yuechuan Wei:
Controlling Outsourcing Data in Cloud Computing with Attribute-Based Encryption. INCoS 2015: 257-261 - [c7]Yiliang Han, Di Jiang, Xiaoyuan Yang:
The Revocable Attribute Based Encryption Scheme for Social Networks. SocialSec 2015: 44-51 - [i5]Tanping Zhou, Longfei Liu, Xiaoyuan Yang, Yiliang Han:
Extend FHEW to General Case. IACR Cryptol. ePrint Arch. 2015: 1232 (2015) - 2014
- [c6]Yiliang Han, Dingyi Fang, Zelun Yue, Jian Zhang:
SCHAP: The Aggregate SignCryption Based Hybrid Authentication Protocol for VANET. IOV 2014: 218-226 - 2013
- [c5]Yiliang Han, Wanyi Lu, Xiaoyuan Yang:
Attribute-Based Signcryption Scheme with Non-monotonic Access Structure. INCoS 2013: 796-802 - 2011
- [j3]Yiliang Han, Xiaolin Gui, Xuguang Wu, Xiaoyuan Yang:
Proxy encryption based secure multicast in wireless mesh networks. J. Netw. Comput. Appl. 34(2): 469-477 (2011)
2000 – 2009
- 2009
- [j2]Yiliang Han, Xiaolin Gui:
Adaptive secure multicast in wireless networks. Int. J. Commun. Syst. 22(9): 1213-1239 (2009) - [c4]Yiliang Han, Xiaolin Gui:
BPGSC: Bilinear Paring Based Genearlized SignCryption Scheme. GCC 2009: 76-82 - 2008
- [c3]Xiaoyuan Yang, Maotang Li, Lixian Wei, Yiliang Han:
New ECDSA-Verifiable Multi-receiver Generalization Signcryption. HPCC 2008: 1042-1047 - [i4]Xu An Wang, Xiaoyuan Yang, Yiliang Han:
On Security Notions for Verifiable Encrypted Signature. IACR Cryptol. ePrint Arch. 2008: 98 (2008) - [i3]Yiliang Han, Xiaolin Gui, Xu An Wang:
Multi-Recipient Signcryption for Secure Wireless Group Communication. IACR Cryptol. ePrint Arch. 2008: 253 (2008) - 2007
- [j1]Yiliang Han:
Generalization of signcryption for resources-constrained environments. Wirel. Commun. Mob. Comput. 7(7): 919-931 (2007) - [i2]Xu An Wang, Xiaoyuan Yang, Yiliang Han:
Provable Secure Generalized Signcryption. IACR Cryptol. ePrint Arch. 2007: 173 (2007) - 2006
- [c2]Yiliang Han, Xiaoyuan Yang, Ping Wei, Yuming Wang, Yupu Hu:
ECGSC: Elliptic Curve Based Generalized Signcryption. UIC 2006: 956-965 - [i1]Yiliang Han, Xiaoyuan Yang:
ECGSC: Elliptic Curve based Generalized Signcryption Scheme. IACR Cryptol. ePrint Arch. 2006: 126 (2006) - 2004
- [c1]Yiliang Han, Xiaoyuan Yang, Yupu Hu:
Signcryption based on elliptic curve and its multi-party schemes. InfoSecu 2004: 216-217
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint