2009 |
41 | EE | Jia Yu,
Fanyu Kong,
Xiangguo Cheng,
Rong Hao:
A Forward Secure Threshold Signature Scheme Based on the Structure of Binary Tree.
JSW 4(1): 73-80 (2009) |
2008 |
40 | EE | Chengzhi Liu,
Caihong Sun,
Jia Yu:
A Hybrid Recommendation Architecture for Mobile Commerce System.
CSSE (2) 2008: 520-526 |
39 | EE | Jia Yu,
Fanyu Kong,
Rong Hao,
Dexiang Zhang:
Construction of Server-assisted Forward Secure Signature Using Bellare-Miner Scheme.
ISECS 2008: 558-561 |
38 | EE | Jia Yu,
Fanyu Kong,
Rong Hao,
Xuliang Li:
How to Publicly Verifiably Expand a Member without Changing Old Shares in a Secret Sharing Scheme.
ISI Workshops 2008: 138-148 |
37 | EE | Jia Yu,
Fanyu Kong,
Xiangguo Cheng,
Rong Hao,
Guowen Li:
Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005.
ProvSec 2008: 176-184 |
36 | EE | Jia Yu,
Fanyu Kong,
Xiangguo Cheng,
Rong Hao,
Guowen Li:
Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps.
ProvSec 2008: 83-97 |
35 | EE | Jia Yu,
Fanyu Kong,
Rong Hao,
Zhen Cheng:
A Publicly Verifiable Dynamic Sharing Protocol for Data Secure Storage.
WAIM 2008: 471-472 |
34 | EE | Jon Wilkening,
Jia Yu:
A local construction of the Smith normal form of a matrix polynomial
CoRR abs/0809.2978: (2008) |
33 | EE | Jia Yu,
Fanyu Kong,
Rong Hao,
Dexiang Zhang,
Guowen Li:
How to Construct Forward Secure Single-Server, Multi-Server and Threshold-Server Assisted Signature Schemes Using Bellare-Miner Scheme.
JCM 3(7): 28-35 (2008) |
32 | EE | Jia Yu,
Fanyu Kong,
Rong Hao,
Xuliang Li,
Guowen Li:
Publicly Verifiable Secret Sharing Member-join Protocol For Threshold Signatures.
JCM 3(7): 36-43 (2008) |
2007 |
31 | EE | Fanyu Kong,
Jia Yu,
Baodong Qin,
Daxing Li:
Cryptanalysis of Server-Aided RSA Key Generation Protocols at MADNES 2005.
ATC 2007: 52-60 |
30 | EE | Jia Yu,
Jingnan Yao,
Laxmi N. Bhuyan,
Jun Yang:
Program Mapping onto Network Processors by Recursive Bipartitioning and Refining.
DAC 2007: 805-810 |
29 | EE | Jia Yu,
Michael Kirley,
Rajkumar Buyya:
Multi-objective planning for workflow execution on Grids.
GRID 2007: 10-17 |
28 | EE | Guowen Li,
Jia Yu,
Rupeng Li,
Daxing Li:
Two Threshold Multisignature Schemes from Bilinear Pairings.
MUE 2007: 1041-1045 |
27 | EE | Rupeng Li,
Jia Yu,
Guowen Li,
Daxing Li:
A New Identity-Based Blind Signature Scheme with Batch Verifications.
MUE 2007: 1051-1056 |
26 | EE | Rupeng Li,
Xianghua Du,
Guowen Li,
Jia Yu,
Daxing Li:
Key-Insulated Group Signature Scheme with Selective Revocation.
MUE 2007: 1057-1063 |
25 | EE | Guowen Li,
Jia Yu,
Rupeng Li,
Daxing Li:
An Approach to Convert Any Threshold Signature into a Threshold Group Signature.
SNPD (2) 2007: 723-726 |
24 | EE | Jia Yu,
Fanyu Kong,
Rong Hao:
Publicly Verifiable Secret Sharing with Enrollment Ability.
SNPD (3) 2007: 194-199 |
23 | EE | Rupeng Li,
Jia Yu,
Jin Wang,
Guowen Li,
Daxing Li:
Key-Insulated Group Signature Scheme with Verifier-Local Revocation.
SNPD (3) 2007: 273-278 |
22 | EE | Fanyu Kong,
Jia Yu,
Baodong Qin,
Ming Li,
Daxing Li:
Security Analysis and Improvement of a ($t, n$) Threshold Proxy Signature Scheme.
SNPD (3) 2007: 923-926 |
21 | EE | Jin Wang,
Xi Bai,
Jia Yu,
Daxing Li:
Protecting Against Key Escrow and Key Exposure in Identity-Based Cryptosystem.
TAMC 2007: 148-158 |
20 | EE | Fanyu Kong,
Jia Yu,
Zhun Cai,
Daxing Li:
New Left-to-Right Radix- r Signed-Digit Recoding Algorithm for Pairing-Based Cryptosystems.
TAMC 2007: 189-198 |
19 | EE | Jia Yu,
Wei Wu,
Xi Chen,
Harry Hsieh,
Jun Yang,
Felice Balarin:
Assertion-Based Design Exploration of DVS in Network Processor Architectures
CoRR abs/0710.4714: (2007) |
18 | EE | Yan Luo,
Jia Yu,
Jun Yang,
Laxmi N. Bhuyan:
Conserving network processor power consumption by exploiting traffic variability.
TACO 4(1): (2007) |
2006 |
17 | EE | Jia Yu,
Fanyu Kong,
Rong Hao:
Forward Secure Threshold Signature Scheme from Bilinear Pairings.
CIS 2006: 587-597 |
16 | EE | Jin Wang,
Jia Yu,
Daxing Li,
Xi Bai,
Zhongtian Jia:
Combining User Authentication with Role-Based Authorazition Based on Identity-Based Signature.
CIS 2006: 847-857 |
15 | EE | Chee Shin Yeo,
Marcos Dias de Assunção,
Jia Yu,
Anthony Sulistio,
Srikumar Venugopal,
Martin Placek,
Rajkumar Buyya:
Utility Computing and Global Grids
CoRR abs/cs/0605056: (2006) |
14 | EE | Fanyu Kong,
Zhun Cai,
Jia Yu,
Daxing Li:
Improved generalized Atkin algorithm for computing square roots in finite fields.
Inf. Process. Lett. 98(1): 1-5 (2006) |
13 | EE | Jia Yu,
Rajkumar Buyya:
Scheduling scientific workflow applications with deadline and budget constraints using genetic algorithms.
Scientific Programming 14(3-4): 217-230 (2006) |
12 | EE | Jia Yu,
Srikumar Venugopal,
Rajkumar Buyya:
A Market-Oriented Grid Directory Service for Publication and Discovery of Grid Service Providers and their Services.
The Journal of Supercomputing 36(1): 17-31 (2006) |
2005 |
11 | EE | Yan Luo,
Jia Yu,
Jun Yang,
Laxmi N. Bhuyan:
Low power network processor design using clock gating.
DAC 2005: 712-715 |
10 | EE | Jia Yu,
Wei Wu,
Xi Chen,
Harry Hsieh,
Jun Yang,
Felice Balarin:
Assertion-Based Design Exploration of DVS in Network Processor Architectures.
DATE 2005: 92-97 |
9 | EE | Jia Yu,
Jun Yang,
Shaojie Chen,
Yan Luo,
Laxmi N. Bhuyan:
Enhancing Network Processor Simulation Speed with Statistical Input Sampling.
HiPEAC 2005: 68-83 |
8 | EE | Jia Yu,
Rajkumar Buyya,
Chen-Khong Tham:
Cost-Based Scheduling of Scientific Workflow Application on Utility Grids.
e-Science 2005: 140-147 |
7 | EE | Jia Yu,
Rajkumar Buyya:
A Taxonomy of Workflow Management Systems for Grid Computing
CoRR abs/cs/0503025: (2005) |
6 | EE | Jia Yu,
Rajkumar Buyya:
A Taxonomy of Workflow Management Systems for Grid Computing.
J. Grid Comput. 3(3-4): 171-200 (2005) |
5 | EE | Jun Yang,
Jia Yu,
Youtao Zhang:
A low energy cache design for multimedia applications exploiting set access locality.
Journal of Systems Architecture 51(10-11): 653-664 (2005) |
4 | EE | Jia Yu,
Rajkumar Buyya:
A taxonomy of scientific workflow systems for grid computing.
SIGMOD Record 34(3): 44-49 (2005) |
2004 |
3 | EE | Jia Yu,
Rajkumar Buyya:
A Novel Architecture for Realizing Grid Workflow using Tuple Spaces.
GRID 2004: 119-128 |
2003 |
2 | EE | Jia Yu,
Jan Newmarch,
Michael Geisler:
JINI/J2EE Bridge for Large-scale IP Phone Services.
APSEC 2003: 302-309 |
1 | EE | Jia Yu,
Srikumar Venugopal,
Rajkumar Buyya:
Grid Market Directory: A Web Services based Grid Service Publication Directory
CoRR cs.DC/0302006: (2003) |