دنبال کردن
Shao-Jun Yang
Shao-Jun Yang
ایمیل تأیید شده در fjnu.edu.cn
عنوان
نقل شده توسط
نقل شده توسط
سال
An algorithm for minimizing a linear objective function subject to the fuzzy relation inequalities with addition–min composition
SJ Yang
Fuzzy Sets and Systems 255, 41-51, 2014
1052014
Fuzzy relation inequalities about the data transmission mechanism in BitTorrent-like Peer-to-Peer file sharing systems
JX Li, SJ Yang
2012 9th International Conference on Fuzzy Systems and Knowledge Discovery …, 2012
892012
Some results of the fuzzy relation inequalities with addition–min composition
SJ Yang
IEEE Transactions on Fuzzy Systems 26 (1), 239-245, 2018
282018
A new design of online/offline signatures based on lattice
M Zheng, SJ Yang, W Wu, J Shao, X Huang
Information Security Practice and Experience: 14th International Conference …, 2018
112018
The relationship between L-subuniverses and L-convexities
Y Zhong, SJ Yang, FG Shi
Journal of Intelligent and Fuzzy Systems 33 (6), 3363-3372, 2017
112017
M-fuzzifying independence spaces
SJ Yang, FG Shi
Journal of Intelligent and Fuzzy Systems 34 (1), 11-21, 2018
102018
M-fuzzifying matroids induced by M-fuzzifying closure operators
X Xin, SJ Yang
Iranian Journal of Fuzzy Systems 14 (3), 139-149, 2017
82017
Linearly homomorphic signatures from lattices
CJ Lin, R Xue, SJ Yang, X Huang, S Li
The Computer Journal 63 (12), 1871-1885, 2020
72020
Universal product learning with errors: A new variant of LWE for lattice-based cryptography
S Yang, X Huang
Theoretical Computer Science 915, 90-100, 2022
62022
Bases and circuits of fuzzifying matroids
SJ Yang, FG Shi
Iranian Journal of Fuzzy Systems 15 (2), 41-52, 2018
6*2018
Lattice-equivalence of convex spaces
C Shen, SJ Yang, D Zhao, FG Shi
Algebra universalis 80 (3), 26, 2019
52019
Linearly homomorphic signatures with designated entities
CJ Lin, X Huang, S Li, W Wu, SJ Yang
Information Security Practice and Experience: 13th International Conference …, 2017
52017
Certain types ofM-fuzzifying matroids: A fundamental look at the security protocols in RFID and IoT
SJ Yang, X Huang
Future Generation Computer Systems 86, 582-590, 2018
42018
Inner product encryption from ring learning with errors
S Fang, S Yang, Y Zhang
Cybersecurity 3, 1-11, 2020
32020
A lattice-based redactable signature scheme using cryptographic accumulators for trees
Y Zhao, S Yang, W Wu, X Huang
The Computer Journal 66 (12), 2961-2973, 2023
22023
Ring trapdoor redactable signatures from lattice
S Yang, X Huang, M Zheng, J Ma
Information Security Practice and Experience: 16th International Conference …, 2021
22021
Inner product encryption from middle-product learning with errors
N Yang, S Yang, Y Zhao, W Wu
International Symposium on Security and Privacy in Social Networks and Big …, 2022
12022
Lattice-based dynamic universal accumulator: Design and application
Y Zhao, S Yang, X Huang
Computer Standards & Interfaces 89, 103807, 2024
2024
New tag-based signatures and their applications on linearly homomorphic signatures
C Lin, R Xue, X Huang, S Yang
Computer Standards & Interfaces 88, 103804, 2024
2024
A Traceable Universal Designated Verifier Transitive Signature Scheme
S Hou, C Lin, S Yang
Information 15 (1), 43, 2024
2024
سیستم در حال حاضر قادر به انجام عملکرد نیست. بعداً دوباره امتحان کنید.
مقاله‌ها 1–20