-
1دورية أكاديمية
المؤلفون: Yinhao Jiang, Mir Ali Rezazadeh Baee, Leonie Ruth Simpson, Praveen Gauravaram, Josef Pieprzyk, Tanveer Zia, Zhen Zhao, Zung Le
المصدر: Cryptography, Vol 8, Iss 1, p 5 (2024)
مصطلحات موضوعية: user privacy, web privacy protection, local differential privacy, wearable device access control, lightweight encryption, location privacy, Technology
وصف الملف: electronic resource
-
2دورية أكاديمية
المؤلفون: Seyed Ramin Ghorashi, Tanveer Zia, Michael Bewong, Yinhao Jiang
المصدر: Applied Sciences, Vol 13, Iss 23, p 12727 (2023)
مصطلحات موضوعية: privacy regulation, privacy frameworks, data sharing, organisations, third-party entities, Facebook, Technology, Engineering (General). Civil engineering (General), TA1-2040, Biology (General), QH301-705.5, Physics, QC1-999, Chemistry, QD1-999
وصف الملف: electronic resource
-
3دورية أكاديمية
المؤلفون: Yinhao Jiang, Ziying Yang, Lianbo Shao, Han Shen, Xiaomei Teng, Yihuan Chen, Yinglong Ding, Jiaming Fan, You Yu, Zhenya Shen
المصدر: Cell Transplantation, Vol 32 (2023)
مصطلحات موضوعية: Medicine
وصف الملف: electronic resource
Relation: https://doaj.org/toc/1555-3892
-
4دورية أكاديمية
المؤلفون: Seyed Ramin Ghorashi, Tanveer Zia, Yinhao Jiang, Michael Bewong
المصدر: Journal of Information Security and Cybercrimes Research, Vol 4, Iss 2, Pp 159-172 (2021)
مصطلحات موضوعية: information security, internet of things (iot), klein block cipher, wireless sensor networks (wsn), lightweight cryptography, software optimization, Criminal law and procedure, K5000-5582, Cybernetics, Q300-390
وصف الملف: electronic resource
-
5
المؤلفون: Willy Susilo, Fuchun Guo, Zhen Zhao, Yinhao Jiang, Chunpeng Ge
المصدر: IEEE Transactions on Services Computing. :1-12
مصطلحات موضوعية: Information Systems and Management, Computer Networks and Communications, Hardware and Architecture, Computer Science Applications
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::7eec3f581031f3eb41d9b84a9388a166
https://doi.org/10.1109/tsc.2023.3262805 -
6
المؤلفون: Fu-Yin Cherng, Jingchao Fang, Yinhao Jiang, Xin Chen, Taejun Choi, Hao-Chuan Wang
المصدر: CHI Conference on Human Factors in Computing Systems.
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::a3b36afff2b743aa6933b037c10fadf1
https://doi.org/10.1145/3491102.3517726 -
7
المؤلفون: Tanveer A. Zia, Yinhao Jiang, Seyed Ramin Ghorashi
المصدر: PerCom Workshops
مصطلحات موضوعية: 021110 strategic, defence & security studies, S-box, Smart objects, business.industry, Computer science, 0211 other engineering and technologies, Cryptography, 02 engineering and technology, Encryption, 020202 computer hardware & architecture, law.invention, law, 0202 electrical engineering, electronic engineering, information engineering, Key management, business, Cryptanalysis, Wireless sensor network, Computer network, Block cipher
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::a9c73d8bcdc4833bc52055f3f6917565
https://doi.org/10.1109/percomworkshops48775.2020.9156189 -
8
المؤلفون: Yinhao Jiang, Yi Mu, Fuchun Guo, Willy Susilo
المصدر: Future Generation Computer Systems. 78:720-729
مصطلحات موضوعية: Authentication, Delegation, Computer Networks and Communications, business.industry, Computer science, media_common.quotation_subject, Authorization, 020206 networking & telecommunications, Access control, Data_CODINGANDINFORMATIONTHEORY, 02 engineering and technology, Encryption, Computer security, computer.software_genre, Public-key cryptography, Hardware and Architecture, Traitor tracing, Ciphertext, 0202 electrical engineering, electronic engineering, information engineering, 020201 artificial intelligence & image processing, Attribute-based encryption, business, computer, Software, media_common
-
9
المؤلفون: Yinhao Jiang, Yi Mu, Fuchun Guo, Willy Susilo
المصدر: International Journal of Information Security. 17:533-548
مصطلحات موضوعية: Revocation, Computer Networks and Communications, Computer science, business.industry, 020206 networking & telecommunications, Access control, Cryptography, Data_CODINGANDINFORMATIONTHEORY, 02 engineering and technology, Extension (predicate logic), Construct (python library), Computer security, computer.software_genre, Encryption, Ciphertext, 0202 electrical engineering, electronic engineering, information engineering, 020201 artificial intelligence & image processing, Attribute-based encryption, Safety, Risk, Reliability and Quality, business, computer, Software, Information Systems
-
10
المؤلفون: Yi Mu, Fuchun Guo, Yinhao Jiang, Willy Susilo
المصدر: International Journal of Information Security. 17:463-475
مصطلحات موضوعية: 0301 basic medicine, Theoretical computer science, Computer Networks and Communications, Computer science, Cryptography, Data_CODINGANDINFORMATIONTHEORY, 02 engineering and technology, Encryption, Computer security, computer.software_genre, Public-key cryptography, 03 medical and health sciences, Ciphertext, 0202 electrical engineering, electronic engineering, information engineering, Safety, Risk, Reliability and Quality, Standard model (cryptography), Cryptographic primitive, business.industry, Plaintext, 030104 developmental biology, 020201 artificial intelligence & image processing, Attribute-based encryption, business, computer, Software, Information Systems