


default search action
Fanyu Kong
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j63]Gaoli Mu, Hanlin Zhang
, Jie Lin, Fanyu Kong:
SMCD: Privacy-preserving deep learning based malicious code detection. Comput. Secur. 150: 104226 (2025) - [j62]Yaru Liu, Xiaodong Xiao, Fanyu Kong
, Hanlin Zhang, Jia Yu
:
Towards efficient privacy-preserving conjunctive keywords search over encrypted cloud data. Future Gener. Comput. Syst. 166: 107716 (2025) - [j61]Yanbin Li
, Yuxin Huang, Yikang Guo, Chunpeng Ge
, Fanyu Kong
, Yongjun Ren
:
Adaptive Chosen-Plaintext Deep-Learning-Based Side-Channel Analysis. IEEE Internet Things J. 12(1): 174-185 (2025) - [j60]Jiaxin Song, Cuixia Miao
, Fanyu Kong:
Scheduling with step learning and job rejection. Oper. Res. 25(1): 6 (2025) - 2024
- [j59]Meng Li, Guoyou He, Fanyu Kong, Ping Wang
, Cui Han, Qingbin Ding, Honghong Jiang, Suo Deng:
Unraveling the role of tissue colonized microbiome in ovarian cancer progression. Comput. Biol. Medicine 177: 108641 (2024) - [j58]Benxin Yin
, Hanlin Zhang
, Jie Lin, Fanyu Kong
, Leyun Yu:
PVFL: Verifiable federated learning and prediction with privacy-preserving. Comput. Secur. 139: 103700 (2024) - [j57]Guangshang Jiang, Hanlin Zhang
, Jie Lin, Fanyu Kong, Leyun Yu:
Optimized verifiable delegated private set intersection on outsourced private datasets. Comput. Secur. 141: 103822 (2024) - [j56]Yunting Tao
, Yuqun Li, Fanyu Kong
, Yuliang Shi, Ming Yang
, Jia Yu, Hanlin Zhang:
Privacy-preserving outsourcing scheme of face recognition based on locally linear embedding. Comput. Secur. 144: 103931 (2024) - [j55]Meng Li, Han Liu, Fanyu Kong
, Pengju Lv
:
DTRE: A model for predicting drug-target interactions of endometrial cancer based on heterogeneous graph. Future Gener. Comput. Syst. 161: 478-486 (2024) - [j54]Pengyu Cui
, Yunting Tao, Bin Zhen, Fanyu Kong
, Chunpeng Ge
, Chuan Ma
, Jia Yu
:
Accelerating Graph Embedding Through Secure Distributed Outsourcing Computation in Internet of Things. IEEE Internet Things J. 11(16): 27687-27699 (2024) - [j53]Xinrui Ge
, Jia Yu, Fanyu Kong
:
Privacy-preserving Boolean range query with verifiability and forward security over spatio-textual data. Inf. Sci. 677: 120929 (2024) - [j52]Xirong Ma, Chuan Li, Yuchang Hu, Yunting Tao, Yali Jiang, Yanbin Li, Fanyu Kong
, Chunpeng Ge:
Secure outsourced decryption for FHE-based privacy-preserving cloud computing. J. Inf. Secur. Appl. 86: 103893 (2024) - [j51]Bin Xia
, Jun Zhou
, Fanyu Kong
, Jiarui Yang
, Lin Lin, Xin Wu
, Qiong Xie
:
Edge Perception Temporal Data Anomaly Detection Method Based on BiLSTM-Attention in Smart City Big Data Environment. J. Circuits Syst. Comput. 33(12): 2450214:1-2450214:20 (2024) - [j50]Fanyu Kong, Cuixia Miao, Yujia Huo, Jiaxin Song:
Single-machine scheduling with coupled task and rejection. Math. Found. Comput. 7(3): 328-335 (2024) - [j49]Zhixiang Zhang
, Hanlin Zhang
, Xiangfu Song
, Jie Lin
, Fanyu Kong
:
Secure Outsourcing Evaluation for Sparse Decision Trees. IEEE Trans. Dependable Secur. Comput. 21(6): 5228-5241 (2024) - [j48]Chengdong Zheng, Yuliang Shi, Wu Lee, Lin Cheng, Xinjun Wang, Zhongmin Yan, Fanyu Kong
:
DPHM-Net:de-redundant multi-period hybrid modeling network for long-term series forecasting. World Wide Web (WWW) 27(4): 40 (2024) - [c45]Fanyu Kong
, Xiangyun Tang
, Yu Weng
, Tao Zhang
, Hongyang Du
, Jiawen Kang
, Chi Liu
:
DIsFU: Protecting Innocent Clients in Federated Unlearning. ICA3PP (4) 2024: 193-207 - [c44]Zihao Zhao, Sijia Cao, Hanlin Zhang, Jie Lin, Fanyu Kong, Leyun Yu:
Privacy-Preserving Group Closeness Maximization. ICCCN 2024: 1-6 - [c43]Xiaotong Zhao, Hanlin Zhang, Jie Lin, Fanyu Kong, Leyun Yu:
Privacy-Preserving Edge Assistance for Solving Matrix Eigenvalue Problem. ICCCN 2024: 1-6 - [c42]Hongjian Zhao, Yunting Tao, Fanyu Kong, Guoyan Zhang, Hanlin Zhang, Jia Yu:
Fast Distributed Polynomial Multiplication Algorithm for Lattice-based Cryptographic Decryption In Blockchain Systems. ISPA 2024: 2260-2263 - [c41]Guangmao Gao, Hanlin Zhang, Jie Lin, Hansong Xu, Fanyu Kong, Leyun Yu:
Privacy-preserving Deep Learning for Autism Spectrum Disorder Classification. SmartCloud 2024: 13-18 - [i1]Xirong Ma, Chuan Li, Yuchang Hu, Yunting Tao, Yali Jiang, Yanbin Li, Fanyu Kong, Chunpeng Ge:
Secure Outsourced Decryption for HE-based Privacy-preserving Cloud Computing System. CoRR abs/2406.19964 (2024) - 2023
- [j47]Cuixia Miao, Fanyu Kong, Juan Zou, Ran Ma, Yujia Huo:
Parallel-Machine Scheduling with Step-Deteriorating Jobs to Minimize the Total (Weighted) Completion Time. Asia Pac. J. Oper. Res. 40(1): 2240011:1-2240011:13 (2023) - [j46]Yali Jiang, Haoran Shi
, Zehua Sun, Jingyuan Ding, Fanyu Kong
:
Shortest path core-selection incentive for federated learning platform with medical applications. Comput. Biol. Medicine 165: 107394 (2023) - [j45]Yunting Tao
, Fanyu Kong
, Yuliang Shi, Jia Yu, Hanlin Zhang, Xiangyi Wang:
Efficient, secure and verifiable outsourcing scheme for SVD-based collaborative filtering recommender system. Future Gener. Comput. Syst. 149: 445-454 (2023) - [j44]Bo Li
, Yide Jin, Xiaojing Yu, Li Song, Jianjun Zhang, Hongfeng Sun, Hui Liu, Yuliang Shi, Fanyu Kong:
MVIRA: A model based on Missing Value Imputation and Reliability Assessment for mortality risk prediction. Int. J. Medical Informatics 178: 105191 (2023) - [j43]Wenjing Gao
, Jia Yu
, Rong Hao
, Fanyu Kong
, Xiaodong Liu:
Privacy-Preserving Face Recognition With Multi-Edge Assistance for Intelligent Security Systems. IEEE Internet Things J. 10(12): 10948-10958 (2023) - [j42]Fei Gao, Hanlin Zhang
, Jie Lin, Hansong Xu, Fanyu Kong, Guoqiang Yang:
A verifiable and privacy-preserving framework for federated recommendation system. J. Ambient Intell. Humaniz. Comput. 14(4): 4273-4287 (2023) - [j41]Yujia Huo, Cuixia Miao
, Fanyu Kong, Yuzhong Zhang:
Multitasking scheduling with alternate periods. J. Comb. Optim. 45(3): 92 (2023) - [j40]Jinsung Yoon
, Michel J. Mizrahi, Nahid Farhady Ghalaty, Thomas Jarvinen, Ashwin S. Ravi, Peter Brune, Fanyu Kong, Dave Anderson, George Lee, Arie Meir, Farhana Bandukwala, Elli Kanal, Sercan Ö. Arik
, Tomas Pfister:
EHR-Safe: generating high-fidelity and privacy-preserving synthetic electronic health records. npj Digit. Medicine 6 (2023) - [j39]Zhifeng Yang, Quanqing Xu, Shanyan Gao, Chuanhui Yang, Guoping Wang, Yuzhong Zhao, Fanyu Kong, Hao Liu, Wanhong Wang, Jinliang Xiao:
OceanBase Paetica: A Hybrid Shared-nothing/Shared-everything Database for Supporting Single Machine and Distributed Cluster. Proc. VLDB Endow. 16(12): 3728-3740 (2023) - [j38]Fangyuan Sun
, Jia Yu
, Rong Hao
, Ming Yang
, Fanyu Kong
:
Privacy-Preserving Shortest Distance Query for Dynamic Large-Scale Road Network. IEEE Syst. J. 17(2): 1729-1740 (2023) - [c40]Rui Xu, Yuliang Shi, Zhiyuan Su, Xinjun Wang, Zhongmin Yan, Fanyu Kong:
Test Case Level Predictive Mutation Testing Combining PIE and Natural Language Features. APSEC 2023: 21-30 - [c39]Nanfei Yang, Yuliang Shi, Zhiyuan Su, Xinjun Wang, Zhongmin Yan, Fanyu Kong:
FSFP: A Fine-Grained Online Service System Performance Fault Prediction Method Based on Cross-attention. APSEC 2023: 81-90 - [c38]Yourong Li, Yuliang Shi, Yide Jin, Xinjun Wang, Zhongmin Yan, Zhiyong Chen, Fanyu Kong:
A Collaborative Cross-Attention Drug Recommendation Model Based on Patient and Medical Relationship Representations. BIBM 2023: 2036-2039 - [c37]Haiyang Liu, Yuliang Shi, Zhiyuan Su, Kun Zhang, Xinjun Wang, Zhongmin Yan, Fanyu Kong:
FedADP: Communication-Efficient by Model Pruning for Federated Learning. GLOBECOM 2023: 3093-3098 - [c36]Sijia Cao, Hanlin Zhang, Yuhang Wang, Jie Lin, Fanyu Kong, Leyun Yu:
SecureGAN: Secure Three-Party GAN Training. ICCCN 2023: 1-7 - [c35]Zhenkun Yang, Chen Qian, Xuwang Teng, Fanyu Kong, Fusheng Han, Quanqing Xu:
LCL: A Lock Chain Length-based Distributed Algorithm for Deadlock Detection and Resolution. ICDE 2023: 151-163 - [c34]Yinlong Wang, Yunting Tao, Fanyu Kong
, Zhaoquan Gu, Jia Yu, Hanlin Zhang:
Secure parallel Outsourcing Scheme for Large-scale Matrix Multiplication on Distributed Cloud Servers. ICPADS 2023: 2531-2538 - [c33]Hu Liu, Yuliang Shi, Jianlin Zhang, Xinjun Wang, Hui Li, Fanyu Kong:
Multi-hop Relational Graph Attention Network for Text-to-SQL Parsing. IJCNN 2023: 1-8 - [c32]Yunting Tao, Fanyu Kong
, Yuliang Shi, Jia Yu, Hanlin Zhang, Huiyi Liu:
Efficient Privacy-Preserving Multi-Functional Data Aggregation Scheme for Multi-Tier IoT System. ISCC 2023: 857-863 - [c31]Jihu Wang
, Yuliang Shi
, Han Yu
, Xinjun Wang
, Zhongmin Yan
, Fanyu Kong
:
Mixed-Curvature Manifolds Interaction Learning for Knowledge Graph-aware Recommendation. SIGIR 2023: 372-382 - 2022
- [j37]Li Guo, Jia Yu, Ming Yang
, Fanyu Kong:
Privacy-Preserving Convolution Neural Network Inference with Edge-assistance. Comput. Secur. 123: 102910 (2022) - [j36]Hongjun Li
, Jia Yu
, Ming Yang, Fanyu Kong
:
Secure Outsourcing of Large-Scale Convex Optimization Problem in Internet of Things. IEEE Internet Things J. 9(11): 8737-8748 (2022) - [j35]Hongjun Li
, Fanyu Kong
, Jia Yu
:
Secure Outsourcing for Normalized Cuts of Large-Scale Dense Graph in Internet of Things. IEEE Internet Things J. 9(14): 12711-12722 (2022) - [c30]Hongjun Li, Fanyu Kong
, Jia Yu, Hanlin Zhang, Luhong Diao, Yunting Tao:
Privacy-Preserving and Verifiable Outsourcing Message Transmission and Authentication Protocol in IoT. TrustCom 2022: 556-564 - 2021
- [j34]Fangyuan Sun
, Jia Yu, Xinrui Ge
, Ming Yang
, Fanyu Kong:
Constrained top-k nearest fuzzy keyword queries on encrypted graph in road network. Comput. Secur. 111: 102456 (2021) - [j33]Peng Gao, Hanlin Zhang
, Jia Yu
, Jie Lin
, Xiaopeng Wang, Ming Yang, Fanyu Kong:
Secure Cloud-Aided Object Recognition on Hyperspectral Remote Sensing Images. IEEE Internet Things J. 8(5): 3287-3299 (2021) - [j32]Xinrui Ge
, Jia Yu
, Fei Chen
, Fanyu Kong, Huaqun Wang
:
Toward Verifiable Phrase Search Over Encrypted Cloud-Based IoT Data. IEEE Internet Things J. 8(16): 12902-12918 (2021) - [c29]Yunting Tao, Fanyu Kong, Jia Yu, Qiuliang Xu:
Modification and Performance Improvement of Paillier Homomorphic Cryptosystem. EUC 2021: 131-136 - 2020
- [j31]Bin Xia
, Fanyu Kong
, Jun Zhou
, Xiaosong Tang
, Hong Gong
:
A Delay-Tolerant Data Transmission Scheme for Internet of Vehicles Based on Software Defined Cloud-Fog Networks. IEEE Access 8: 65911-65922 (2020) - [j30]Qianqian Su, Rong Hao, Shaoxia Duan, Fanyu Kong, Xiaodong Liu, Jia Yu:
Secure Computation Outsourcing for Inversion in Finite Field. J. Internet Serv. Inf. Secur. 10(2): 35-48 (2020) - [j29]Fanyu Kong, Yufeng Zhou, Gang Chen:
Multimedia data fusion method based on wireless sensor network in intelligent transportation system. Multim. Tools Appl. 79(47): 35195-35207 (2020) - [j28]Jie Li, Lei Pang, Fuwei Cai, Xieyu Yuan, Fanyu Kong:
Adsorption Properties of Pd3-Modified Double-Vacancy Defect Graphene toward SF6 Decomposition Products. Sensors 20(15): 4188 (2020) - [c28]Guoqiang Yang, Fanyu Kong, Qiuliang Xu:
Optimized FPGA Implementation of Elliptic Curve Cryptosystem over Prime Fields. TrustCom 2020: 243-249
2010 – 2019
- 2019
- [j27]Fanyu Kong
, Yufeng Zhou
, Bin Xia
, Li Pan, Limin Zhu:
A Security Reputation Model for IoT Health Data Using S-AlexNet and Dynamic Game Theory in Cloud Computing Environment. IEEE Access 7: 161822-161830 (2019) - [j26]Fanyu Kong, Yufeng Zhou, Gang Chen:
基于时空特征挖掘的交通流量预测方法 (Traffic Flow Prediction Method Based on Spatio-Temporal Feature Mining). 计算机科学 46(7): 322-326 (2019) - [j25]Chengyu Hu, Rupeng Yang, Pengtao Liu, Tong Li, Fanyu Kong:
A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience. J. Supercomput. 75(6): 3099-3122 (2019) - [c27]Fanyu Kong, Guoqiang Yang, Huiyi Liu, Yali Jiang, Chengyu Hu, Dashui Zhou:
Fault-injection Attack and Improvement of a CRT-RSA Exponentiation Algorithm. ICCNS 2019: 123-127 - 2018
- [j24]Jia Yu, Rong Hao, Hui Xia, Hanlin Zhang, Xiangguo Cheng, Fanyu Kong:
Intrusion-resilient identity-based signatures: Concrete scheme in the standard model and generic construction. Inf. Sci. 442-443: 158-172 (2018) - [j23]Fanyu Kong, Yufeng Zhou, Xianzhong Li:
基于Space-P复杂网络模型的城市公交网络特性分析 (Characteristic Analysis of Urban Public Transport Networks Based on Space-P Complex Network Model). 计算机科学 45(8): 125-130 (2018) - [j22]Sheng Zhang
, Zhuzhong Qian
, Jie Wu, Fanyu Kong, Sanglu Lu:
Wireless Charger Placement and Power Allocation for Maximizing Charging Quality. IEEE Trans. Mob. Comput. 17(6): 1483-1496 (2018) - 2017
- [j21]Wenting Shen, Guangyang Yang, Jia Yu, Hanlin Zhang
, Fanyu Kong, Rong Hao:
Remote data possession checking with privacy-preserving authenticators for cloud storage. Future Gener. Comput. Syst. 76: 136-145 (2017) - [j20]Xiuxiu Jiang, Xinrui Ge, Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao:
An Efficient Symmetric Searchable Encryption Scheme for Cloud Storage. J. Internet Serv. Inf. Secur. 7(2): 1-18 (2017) - [j19]Sheng Zhang, Zhuzhong Qian, Jie Wu, Fanyu Kong, Sanglu Lu:
Optimizing Itinerary Selection and Charging Association for Mobile Chargers. IEEE Trans. Mob. Comput. 16(10): 2833-2846 (2017) - [c26]Fanyu Kong, Dashui Zhou, Yali Jiang, Jianwei Shang, Jia Yu:
Fault Attack on an Improved CRT-RSA Algorithm with the Modulus Chaining Method. CSE/EUC (1) 2017: 866-869 - [c25]Sheng Zhang, Yu Liang, Zhuzhong Qian, Mingjun Xiao, Jie Wu, Fanyu Kong, Sanglu Lu:
Modeling and Deploying Networklet. GLOBECOM 2017: 1-6 - [c24]Sheng Zhang, Yu Liang, Zhuzhong Qian, Mingjun Xiao, Jie Wu, Fanyu Kong, Sanglu Lu:
Networklet: Concept and Deployment. ICDCS 2017: 2624-2625 - 2016
- [j18]Hongsheng He, Fanyu Kong, Jindong Tan
:
DietCam: Multiview Food Recognition Using a Multikernel SVM. IEEE J. Biomed. Health Informatics 20(3): 848-855 (2016) - 2015
- [j17]Fanyu Kong, Hongsheng He, Hollie A. Raynor
, Jindong Tan
:
DietCam: Multi-view regular shape food recognition with a camera phone. Pervasive Mob. Comput. 19: 108-121 (2015) - [j16]Luhong Diao, Juan Peng, Junliang Dong, Fanyu Kong:
Moment invariants under similarity transformation. Pattern Recognit. 48(11): 3641-3651 (2015) - [c23]Xiuxiu Jiang, Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao:
A Novel Privacy Preserving Keyword Search Scheme over Encrypted Cloud Data. 3PGCIC 2015: 836-839 - [c22]Fanyu Kong, Jie Wang, Jia Yu, Xu An Wang
:
Analysis and Improvement of a Verifiable Phrase Search over Encrypted Data in a Single Phrase. 3PGCIC 2015: 840-843 - [c21]Sheng Zhang, Zhuzhong Qian, Fanyu Kong, Jie Wu, Sanglu Lu:
P3: Joint optimization of charger placement and power allocation for wireless power transfer. INFOCOM 2015: 2344-2352 - 2014
- [j15]Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Guowen Li:
One forward-secure signature scheme using bilinear maps and its applications. Inf. Sci. 279: 60-76 (2014) - 2012
- [j14]Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Jianxi Fan:
Erratum to the paper: Forward-Secure Identity-Based Public-Key Encryption without Random Oracles. Fundam. Informaticae 114(1): 103 (2012) - [j13]Jia Yu, Fanyu Kong, Huawei Zhao, Xiangguo Cheng, Rong Hao, Xiang-Fa Guo:
Non-Interactive Forward-Secure Threshold Signature without Random Oracles. J. Inf. Sci. Eng. 28(3): 571-586 (2012) - [j12]Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Jianxi Fan:
Intrusion-resilient identity-based signature: Security definition and construction. J. Syst. Softw. 85(2): 382-391 (2012) - [j11]Fanyu Kong, Jindong Tan
:
DietCam: Automatic dietary assessment with mobile camera phones. Pervasive Mob. Comput. 8(1): 147-163 (2012) - 2011
- [j10]Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Jianxi Fan:
Forward-Secure Identity-Based Public-Key Encryption without Random Oracles. Fundam. Informaticae 111(2): 241-256 (2011) - [j9]Jia Yu, Rong Hao, Fanyu Kong, Xiangguo Cheng, Jianxi Fan, Yangkui Chen:
Forward-secure identity-based signature: Security notions and construction. Inf. Sci. 181(3): 648-660 (2011) - [j8]Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Jianxi Fan:
New Forward-Secure Signature Scheme with Untrusted Update. J. Inf. Sci. Eng. 27(4): 1435-1448 (2011) - [c20]Fanyu Kong, Jindong Tan
:
DietCam: Regular Shape Food Recognition with a Camera Phone. BSN 2011: 127-132 - [c19]Fanyu Kong, Jia Yu, Lei Wu:
Security Analysis of an RSA Key Generation Algorithm with a Large Private Key. ISC 2011: 95-101 - [c18]Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao:
Two Protocols for Member Revocation in Secret Sharing Schemes. PAISI 2011: 64-70 - 2010
- [j7]Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Yangkui Chen, Xuliang Li, Guowen Li:
Forward-Secure Multisignature, Threshold Signature and Blind Signature Schemes. J. Networks 5(6): 634-641 (2010) - [c17]Yali Jiang, Fanyu Kong, Xiuling Ju:
Lattice-Based Proxy Signature. CIS 2010: 382-385
2000 – 2009
- 2009
- [j6]Baodong Qin, Ming Li, Fanyu Kong, Daxing Li:
New left-to-right minimal weight signed-digit radix-r representation. Comput. Electr. Eng. 35(1): 150-158 (2009) - [j5]Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao:
A Forward Secure Threshold Signature Scheme Based on the Structure of Binary Tree. J. Softw. 4(1): 73-80 (2009) - [c16]Fanyu Kong, Jia Yu:
Number-Theoretic Attack on Lyuu-Wu's Multi-proxy Multi-signature Scheme. IAS 2009: 666-668 - [c15]Fanyu Kong, Jindong Tan
:
A 3D object model for wireless camera networks with network constraints. ICDSC 2009: 1-8 - [c14]Chunming Gao, Fanyu Kong, Jindong Tan
:
HealthAware: Tackling obesity with health aware smart phone systems. ROBIO 2009: 1549-1554 - 2008
- [j4]Jia Yu, Fanyu Kong, Rong Hao, Dexiang Zhang, Guowen Li:
How to Construct Forward Secure Single-Server, Multi-Server and Threshold-Server Assisted Signature Schemes Using Bellare-Miner Scheme. J. Commun. 3(7): 28-35 (2008) - [j3]Jia Yu, Fanyu Kong, Rong Hao, Xuliang Li, Guowen Li:
Publicly Verifiable Secret Sharing Member-join Protocol For Threshold Signatures. J. Commun. 3(7): 36-43 (2008) - [j2]Baodong Qin, Ming Li, Fanyu Kong:
Cryptanalysis of a Type of CRT-Based RSA Algorithms. J. Comput. Sci. Technol. 23(2): 214-221 (2008) - [c13]Jia Yu, Fanyu Kong, Rong Hao, Dexiang Zhang:
Construction of Server-assisted Forward Secure Signature Using Bellare-Miner Scheme. ISECS 2008: 558-561 - [c12]Jia Yu, Fanyu Kong, Rong Hao, Xuliang Li:
How to Publicly Verifiably Expand a Member without Changing Old Shares in a Secret Sharing Scheme. ISI Workshops 2008: 138-148 - [c11]Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Guowen Li:
Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps. ProvSec 2008: 83-97 - [c10]Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Guowen Li:
Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005. ProvSec 2008: 176-184 - [c9]Jia Yu, Fanyu Kong, Rong Hao, Zhen Cheng:
A Publicly Verifiable Dynamic Sharing Protocol for Data Secure Storage. WAIM 2008: 471-472 - 2007
- [c8]Fanyu Kong, Jia Yu, Baodong Qin, Daxing Li:
Cryptanalysis of Server-Aided RSA Key Generation Protocols at MADNES 2005. ATC 2007: 52-60 - [c7]Ming Li, Baodong Qin, Fanyu Kong, Daxing Li:
Wide-w-NAF Method for Scalar Multiplication on Köblitz Curves. SNPD (2) 2007: 143-148 - [c6]Jia Yu, Fanyu Kong, Rong Hao:
Publicly Verifiable Secret Sharing with Enrollment Ability. SNPD (3) 2007: 194-199 - [c5]Baodong Qin, Ming Li, Fanyu Kong, Daxing Li:
Security Analysis of wrNAF and SPA Resistant Scalar Multiplication. SNPD (3) 2007: 279-284 - [c4]Fanyu Kong, Jia Yu, Baodong Qin, Ming Li, Daxing Li:
Security Analysis and Improvement of a ($t, n$) Threshold Proxy Signature Scheme. SNPD (3) 2007: 923-926 - [c3]Fanyu Kong, Jia Yu, Zhun Cai, Daxing Li:
New Left-to-Right Radix- r Signed-Digit Recoding Algorithm for Pairing-Based Cryptosystems. TAMC 2007: 189-198 - 2006
- [j1]Fanyu Kong, Zhun Cai, Jia Yu, Daxing Li:
Improved generalized Atkin algorithm for computing square roots in finite fields. Inf. Process. Lett. 98(1): 1-5 (2006) - [c2]Jia Yu, Fanyu Kong, Rong Hao:
Forward Secure Threshold Signature Scheme from Bilinear Pairings. CIS 2006: 587-597 - 2005
- [c1]Fanyu Kong, Daxing Li:
A Note on Signed Binary Window Algorithm for Elliptic Curve Cryptosystems. CANS 2005: 223-235
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-13 21:26 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint