×
Author ID: yu.jia Recent zbMATH articles by "Yu, Jia"
Published as: Yu, Jia
Documents Indexed: 43 Publications since 2006
Co-Authors: 74 Co-Authors with 42 Joint Publications
2,779 Co-Co-Authors

Publications by Year

Citations contained in zbMATH Open

23 Publications have been cited 126 times in 94 Documents Cited by Year
Efficient unicast in bijective connection networks with the restricted faulty node set. Zbl 1216.68056
Fan, Jianxi; Jia, Xiaohua; Liu, Xin; Zhang, Shukui; Yu, Jia
25
2011
An efficient fault-tolerant routing algorithm in bijective connection networks with restricted faulty edges. Zbl 1216.68055
Fan, Jianxi; Jia, Xiaohua; Cheng, Baolei; Yu, Jia
17
2011
Forward-secure identity-based signature: security notions and construction. Zbl 1204.94094
Yu, Jia; Hao, Rong; Kong, Fanyu; Cheng, Xiangguo; Fan, Jianxi; Chen, Yangkui
13
2011
A local construction of the Smith normal form of a matrix polynomial. Zbl 1206.65146
Wilkening, Jon; Yu, Jia
11
2011
Embedding meshes into twisted-cubes. Zbl 1218.68111
Wang, Xi; Fan, Jianxi; Jia, Xiaohua; Zhang, Shukui; Yu, Jia
10
2011
Improved generalized Atkin algorithm for computing square roots in finite fields. Zbl 1195.11166
Kong, Fanyu; Cai, Zhun; Yu, Jia; Li, Daxing
6
2006
Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data. Zbl 1429.68062
Jiang, Xiuxiu; Yu, Jia; Yan, Jingbo; Hao, Rong
5
2017
One forward-secure signature scheme using bilinear maps and its applications. Zbl 1354.94061
Yu, Jia; Kong, Fanyu; Cheng, Xiangguo; Hao, Rong; Li, Guowen
5
2014
IRIBE: intrusion-resilient identity-based encryption. Zbl 1390.68284
Yu, Jia; Hao, Rong; Zhao, Huawei; Shu, Minglei; Fan, Jianxi
5
2016
Forward-secure identity-based public-key encryption without random oracles. Zbl 1237.94102
Yu, Jia; Kong, Fanyu; Cheng, Xiangguo; Hao, Rong; Fan, Jianxi
4
2011
Component conditional fault tolerance of hierarchical folded cubic networks. Zbl 1517.68064
Sun, Xueli; Fan, Jianxi; Cheng, Baolei; Liu, Zhao; Yu, Jia
3
2021
Construction of yet another forward secure signature scheme using bilinear maps. Zbl 1204.94095
Yu, Jia; Kong, Fanyu; Cheng, Xiangguo; Hao, Rong; Li, Guowen
3
2008
Workflow scheduling algorithms for grid computing. Zbl 1153.68345
Yu, Jia; Buyya, Rajkumar; Ramamohanarao, Kotagiri
3
2008
The reliability analysis of \(k\)-ary \(n\)-cube networks. Zbl 1460.68021
Lv, Mengjie; Fan, Jianxi; Chen, Guo; Cheng, Baolei; Zhou, Jingya; Yu, Jia
3
2020
Cryptanalysis of Vo-Kim forward secure signature in ICISC 2005. Zbl 1204.94096
Yu, Jia; Kong, Fanyu; Cheng, Xiangguo; Hao, Rong; Li, Guowen
2
2008
Blockchain-based two-party fair contract signing scheme. Zbl 1462.94061
Zhang, Liang; Zhang, Hanlin; Yu, Jia; Xian, Hequn
2
2020
Lattice-based weak-key analysis on single-server outsourcing protocols of modular exponentiations and basic countermeasures. Zbl 1517.68107
Zheng, Yunhai; Tian, Chengliang; Zhang, Hanlin; Yu, Jia; Li, Fengjun
2
2021
Key-insulated aggregate signature. Zbl 1404.94135
Zhao, Huiyan; Yu, Jia; Duan, Shaoxia; Cheng, Xiangguo; Hao, Rong
2
2014
How to securely outsource the extended Euclidean algorithm for large-scale polynomials over finite fields. Zbl 1456.68016
Zhou, Qiang; Tian, Chengliang; Zhang, Hanlin; Yu, Jia; Li, Fengjun
1
2020
Connectivity and constructive algorithms of disjoint paths in dragonfly networks. Zbl 1535.68236
Wu, Suying; Fan, Jianxi; Cheng, Baolei; Yu, Jia; Wang, Yan
1
2022
Symmetric-key based proofs of retrievability supporting public verification. Zbl 1499.68092
Guan, Chaowen; Ren, Kui; Zhang, Fangguo; Kerschbaum, Florian; Yu, Jia
1
2015
Intrusion-resilient identity-based signatures: concrete scheme in the standard model and generic construction. Zbl 1440.94104
Yu, Jia; Hao, Rong; Xia, Hui; Zhang, Hanlin; Cheng, Xiangguo; Kong, Fanyu
1
2018
Reliability evaluation for a class of recursive match networks. Zbl 07808917
Zhou, Qianru; Cheng, Baolei; Zhou, Jingya; Yu, Jia; Wang, Yan; Fan, Jianxi
1
2024
Reliability evaluation for a class of recursive match networks. Zbl 07808917
Zhou, Qianru; Cheng, Baolei; Zhou, Jingya; Yu, Jia; Wang, Yan; Fan, Jianxi
1
2024
Connectivity and constructive algorithms of disjoint paths in dragonfly networks. Zbl 1535.68236
Wu, Suying; Fan, Jianxi; Cheng, Baolei; Yu, Jia; Wang, Yan
1
2022
Component conditional fault tolerance of hierarchical folded cubic networks. Zbl 1517.68064
Sun, Xueli; Fan, Jianxi; Cheng, Baolei; Liu, Zhao; Yu, Jia
3
2021
Lattice-based weak-key analysis on single-server outsourcing protocols of modular exponentiations and basic countermeasures. Zbl 1517.68107
Zheng, Yunhai; Tian, Chengliang; Zhang, Hanlin; Yu, Jia; Li, Fengjun
2
2021
The reliability analysis of \(k\)-ary \(n\)-cube networks. Zbl 1460.68021
Lv, Mengjie; Fan, Jianxi; Chen, Guo; Cheng, Baolei; Zhou, Jingya; Yu, Jia
3
2020
Blockchain-based two-party fair contract signing scheme. Zbl 1462.94061
Zhang, Liang; Zhang, Hanlin; Yu, Jia; Xian, Hequn
2
2020
How to securely outsource the extended Euclidean algorithm for large-scale polynomials over finite fields. Zbl 1456.68016
Zhou, Qiang; Tian, Chengliang; Zhang, Hanlin; Yu, Jia; Li, Fengjun
1
2020
Intrusion-resilient identity-based signatures: concrete scheme in the standard model and generic construction. Zbl 1440.94104
Yu, Jia; Hao, Rong; Xia, Hui; Zhang, Hanlin; Cheng, Xiangguo; Kong, Fanyu
1
2018
Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data. Zbl 1429.68062
Jiang, Xiuxiu; Yu, Jia; Yan, Jingbo; Hao, Rong
5
2017
IRIBE: intrusion-resilient identity-based encryption. Zbl 1390.68284
Yu, Jia; Hao, Rong; Zhao, Huawei; Shu, Minglei; Fan, Jianxi
5
2016
Symmetric-key based proofs of retrievability supporting public verification. Zbl 1499.68092
Guan, Chaowen; Ren, Kui; Zhang, Fangguo; Kerschbaum, Florian; Yu, Jia
1
2015
One forward-secure signature scheme using bilinear maps and its applications. Zbl 1354.94061
Yu, Jia; Kong, Fanyu; Cheng, Xiangguo; Hao, Rong; Li, Guowen
5
2014
Key-insulated aggregate signature. Zbl 1404.94135
Zhao, Huiyan; Yu, Jia; Duan, Shaoxia; Cheng, Xiangguo; Hao, Rong
2
2014
Efficient unicast in bijective connection networks with the restricted faulty node set. Zbl 1216.68056
Fan, Jianxi; Jia, Xiaohua; Liu, Xin; Zhang, Shukui; Yu, Jia
25
2011
An efficient fault-tolerant routing algorithm in bijective connection networks with restricted faulty edges. Zbl 1216.68055
Fan, Jianxi; Jia, Xiaohua; Cheng, Baolei; Yu, Jia
17
2011
Forward-secure identity-based signature: security notions and construction. Zbl 1204.94094
Yu, Jia; Hao, Rong; Kong, Fanyu; Cheng, Xiangguo; Fan, Jianxi; Chen, Yangkui
13
2011
A local construction of the Smith normal form of a matrix polynomial. Zbl 1206.65146
Wilkening, Jon; Yu, Jia
11
2011
Embedding meshes into twisted-cubes. Zbl 1218.68111
Wang, Xi; Fan, Jianxi; Jia, Xiaohua; Zhang, Shukui; Yu, Jia
10
2011
Forward-secure identity-based public-key encryption without random oracles. Zbl 1237.94102
Yu, Jia; Kong, Fanyu; Cheng, Xiangguo; Hao, Rong; Fan, Jianxi
4
2011
Construction of yet another forward secure signature scheme using bilinear maps. Zbl 1204.94095
Yu, Jia; Kong, Fanyu; Cheng, Xiangguo; Hao, Rong; Li, Guowen
3
2008
Workflow scheduling algorithms for grid computing. Zbl 1153.68345
Yu, Jia; Buyya, Rajkumar; Ramamohanarao, Kotagiri
3
2008
Cryptanalysis of Vo-Kim forward secure signature in ICISC 2005. Zbl 1204.94096
Yu, Jia; Kong, Fanyu; Cheng, Xiangguo; Hao, Rong; Li, Guowen
2
2008
Improved generalized Atkin algorithm for computing square roots in finite fields. Zbl 1195.11166
Kong, Fanyu; Cai, Zhun; Yu, Jia; Li, Daxing
6
2006
all top 5

Cited by 224 Authors

19 Fan, Jianxi
12 Yu, Jia
8 Jia, Xiaohua
7 Hao, Rong
6 Cheng, Baolei
5 Cheng, Xiangguo
5 Kong, Fanyu
5 Wang, Xi
5 Wang, Yan
3 Cho, Gook Hwa
3 Franchi, Massimo
3 Han, Yuejuan
3 Koo, Namhun
3 Kwon, Soonhak
3 Lin, Cheng-Kuan
3 Zhang, Shukui
2 Chang, Jou-Ming
2 Hadizadeh, Mahmoud
2 He, Li
2 Hu, Xuexian
2 Huang, Qiong
2 Kim, Hee-Chul
2 Li, Guowen
2 Li, Jiguo
2 Liang, Jiarong
2 Lim, Hyeong-Seok
2 Liu, Wenfen
2 Lu, Yang
2 Park, Jung-Heum
2 Paruolo, Paolo
2 Shayanfar, Nikta
2 Sun, Xueli
2 Tian, Chengliang
2 Wei, Jianghong
2 Wong, Duncan S.
2 Xu, Xirong
2 Yang, Xiaofan
2 Yang, Yuansheng
2 You, Lantao
2 Yu, Cui
2 Zhang, Fangguo
2 Zhang, Hanlin
2 Zhang, Huifeng
2 Zhang, Jing
2 Zhou, Jingya
1 Antoniou, Efstathios N.
1 Bagherinezhad, Hessam
1 Ben Belgacem, M.
1 Bona-Casas, Carles
1 Borgdorff, Joris
1 Chang, Yu-Huei
1 Chen, Lanxiang
1 Chen, Rongmao
1 Chen, Shan
1 Chen, Xiaofeng
1 Chen, Yangkui
1 Chen, Yu
1 Chen, Zhenchao
1 Cheng, Dongqin
1 Cheng, Rong
1 Cherepnev, Mikhail A.
1 Chopard, Bastien
1 Coveney, Peter V.
1 Cui, Jie
1 Deng, Hua
1 Ding, Ran
1 Doliskani, Javad
1 Domingo-Ferrer, Josep
1 Dong, Qiang
1 Dong, Qingkuan
1 Du, Leilei
1 Duan, Shaoxia
1 Dubitzky, Werner
1 Egecioglu, Omer
1 Elsheikh, Mustafa
1 Fan, Weibei
1 Fazendeiro, Luis M.
1 Feng, Kai
1 Fulek, Radoslav
1 Ge, Xinrui
1 Giesbrecht, Mark W.
1 Go, Byeonghwan
1 Groen, D.
1 Guo, Lili
1 Guo, Shanqing
1 Guo, Yuyan
1 Gupta, Somit
1 Ha, Eunhye
1 Hoekstra, Alfons G.
1 Hoenen, O.
1 Hsu, Hong-Chun
1 Hu, Chengyu
1 Huang, Xinyi
1 Huang, Xiu-Ju
1 Jiang, Xiuxiu
1 Jin, Renjie
1 Karampetakis, Nicholas P.
1 Ke, Zhende
1 Khazaei, Shahram
1 Kim, Chang Heon
...and 124 more Authors

Citations by Year