


default search action
Yang Ming 0001
Person information
- affiliation: Chang'an University, School of Information Engineering, Xi'an, China
- affiliation (PhD 2008): Xidian University, Xi'an, China
Other persons with the same name
- Yang Ming — disambiguation page
- Yang Ming 0002 — CCCC Second Highway Consultants Co., Institute of Surveying and Mapping, Wuhan, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j34]Chenhao Wang, Yang Ming, Hang Liu, Yutong Deng, Yi Zhao, Songnian Zhang:
Security-Enhanced Data Transmission With Fine-Grained and Flexible Revocation for DTWNs. IEEE Trans. Inf. Forensics Secur. 20: 1237-1250 (2025) - 2024
- [j33]Hang Liu
, Yang Ming
, Chenhao Wang
, Yi Zhao, Songnian Zhang, Rongxing Lu
:
Blockchain-assisted verifiable certificate-based searchable encryption against untrusted cloud server for Industrial Internet of Things. Future Gener. Comput. Syst. 153: 97-112 (2024) - [j32]Yang Ming
, Shan Wang, Chenhao Wang, Hang Liu, Yutong Deng, Yi Zhao, Jie Feng:
VCSA: Verifiable and collusion-resistant secure aggregation for federated learning using symmetric homomorphic encryption. J. Syst. Archit. 156: 103279 (2024) - [j31]Yang Ming
, Hang Liu
, Chenhao Wang
, Yi Zhao
:
Generic Construction: Cryptographic Reverse Firewalls for Public Key Encryption With Keyword Search in Cloud Storage. IEEE Trans. Cloud Comput. 12(2): 405-418 (2024) - [j30]Hang Liu
, Yang Ming
, Chenhao Wang
, Yi Zhao
, Yabin Li
:
Comments on "Enabling Verifiable Privacy-Preserving Multi-Type Data Aggregation in Smart Grids". IEEE Trans. Dependable Secur. Comput. 21(6): 5308-5310 (2024) - [j29]Hang Liu
, Yang Ming
, Chenhao Wang
, Yi Zhao
:
Flexible Selective Data Sharing With Fine-Grained Erasure in VANETs. IEEE Trans. Inf. Forensics Secur. 19: 9582-9597 (2024) - [j28]Chenhao Wang
, Yang Ming
, Hang Liu
, Jie Feng
, Ning Zhang:
Secure and Flexible Data Sharing With Dual Privacy Protection in Vehicular Digital Twin Networks. IEEE Trans. Intell. Transp. Syst. 25(9): 12407-12420 (2024) - [j27]Hang Liu
, Yang Ming
, Chenhao Wang
, Yi Zhao
, Songnian Zhang
, Rongxing Lu
:
Server-Assisted Data Sharing System Supporting Conjunctive Keyword Search for Vehicular Social Networks. IEEE Trans. Serv. Comput. 17(6): 4281-4295 (2024) - [j26]Chenhao Wang
, Yang Ming
, Hang Liu
, Songnian Zhang
, Rongxing Lu
:
Towards Synchronized Privacy-Preserving Authentication for MDTEN-Driven VANETs. IEEE Trans. Veh. Technol. 73(3): 4107-4120 (2024) - 2023
- [j25]Yang Ming
, Weixin Zhang, Hang Liu
, Chenhao Wang:
Certificateless public auditing scheme with sensitive information hiding for data sharing in cloud storage. J. Syst. Archit. 143: 102965 (2023) - [j24]Yang Ming
, Pengfei Yang, Hassan Mahdikhani
, Rongxing Lu
:
A Secure One-to-Many Authentication and Key Agreement Scheme for Industrial IoT. IEEE Syst. J. 17(2): 2225-2236 (2023) - [c5]Hang Liu
, Yang Ming
, Chenhao Wang
, Yi Zhao
:
Identity-Based Proxy Re-encryption Based on SM9. Inscrypt (1) 2023: 320-339 - 2022
- [j23]Yi Zhao, Kaitai Liang, Yanqi Zhao, Bo Yang, Yang Ming, Emmanouil Panaousis:
Practical algorithm substitution attack on extractable signatures. Des. Codes Cryptogr. 90(4): 921-937 (2022) - [j22]Yang Ming
, Chenhao Wang
, Hang Liu
, Yi Zhao, Jie Feng
, Ning Zhang
, Weisong Shi
:
Blockchain-Enabled Efficient Dynamic Cross-Domain Deduplication in Edge Computing. IEEE Internet Things J. 9(17): 15639-15656 (2022) - [j21]Yang Ming
, Yabin Li, Yi Zhao, Pengfei Yang:
Efficient Privacy-Preserving Data Aggregation Scheme with Fault Tolerance in Smart Grid. Secur. Commun. Networks 2022: 5895176:1-5895176:18 (2022) - 2021
- [j20]Yang Ming
, Baokang He, Chenhao Wang
:
Efficient Revocable Multi-Authority Attribute-Based Encryption for Cloud Storage. IEEE Access 9: 42593-42603 (2021) - [j19]Lei Liu
, Jie Feng
, Qingqi Pei
, Chen Chen
, Yang Ming
, Bodong Shang
, Mianxiong Dong
:
Blockchain-Enabled Secure Data Sharing Scheme in Mobile-Edge Computing: An Asynchronous Advantage Actor-Critic Learning Approach. IEEE Internet Things J. 8(4): 2342-2353 (2021) - [j18]Chunlei Xie
, Yu Sun, Yang Ming
:
Constructions of Optimal Binary Z-Complementary Sequence Sets With Large Zero Correlation Zone. IEEE Signal Process. Lett. 28: 1694-1698 (2021) - 2020
- [j17]Yang Ming
, Xiaopeng Yu
, Xiaoqin Shen
:
Efficient Anonymous Certificate-Based Multi- Message and Multi-Receiver Signcryption Scheme for Healthcare Internet of Things. IEEE Access 8: 153561-153576 (2020) - [j16]Yang Ming
, Xiaopeng Yu
:
Efficient Privacy-Preserving Data Sharing for Fog-Assisted Vehicular Sensor Networks. Sensors 20(2): 514 (2020)
2010 – 2019
- 2019
- [j15]Yang Ming
, Xuanyi Zhang, Xiaoqin Shen:
Efficient Privacy-Preserving Multi-Dimensional Data Aggregation Scheme in Smart Grid. IEEE Access 7: 32907-32921 (2019) - [j14]Yang Ming
, Wenchang Shi:
Efficient Privacy-Preserving Certificateless Provable Data Possession Scheme for Cloud Storage. IEEE Access 7: 122091-122105 (2019) - [j13]Yang Ming
, Hongliang Cheng:
Efficient Certificateless Conditional Privacy-Preserving Authentication Scheme in VANETs. Mob. Inf. Syst. 2019: 7593138:1-7593138:19 (2019) - [j12]Yang Ming
, Erxiu Wang:
Identity-Based Encryption with Filtered Equality Test for Smart City Applications. Sensors 19(14): 3046 (2019) - 2018
- [j11]Yang Ming, Yumin Wang:
Certificateless Proxy Signature Scheme in the Standard Model. Fundam. Informaticae 160(4): 409-445 (2018) - [j10]Yang Ming
, Xiaoqin Shen
:
PCPA: A Practical Certificateless Conditional Privacy Preserving Authentication Scheme for Vehicular Ad Hoc Networks. Sensors 18(5): 1573 (2018) - [j9]Yang Ming
, Tingting Zhang
:
Efficient Privacy-Preserving Access Control Scheme in Electronic Health Records System. Sensors 18(10): 3520 (2018) - 2017
- [j8]Xiaoqin Shen
, Yang Ming
, Jie Feng:
Identity Based Generalized Signcryption Scheme in the Standard Model. Entropy 19(3): 121 (2017) - 2016
- [j7]Yang Ming, Yumin Wang:
Identity based broadcast encryption with group of prime order. Int. Arab J. Inf. Technol. 13(5): 531-541 (2016) - [j6]Yang Ming, Yumin Wang:
Cryptanalysis of an Identity Based Signcryption Scheme in the Standard Model. Int. J. Netw. Secur. 18(1): 165-171 (2016) - 2015
- [j5]Yang Ming, Yumin Wang:
On the Security of Three Public Auditing Schemes in Cloud Computing. Int. J. Netw. Secur. 17(6): 795-802 (2015) - [j4]Yang Ming, Yumin Wang:
Proxy signcryption scheme in the standard model. Secur. Commun. Networks 8(8): 1431-1446 (2015) - 2011
- [j3]Yang Ming, Xiaoqin Shen, Yamian Peng:
Provably Security Identity-based Sanitizable Signature Scheme Without Random Oracles. J. Softw. 6(10): 1890-1897 (2011) - [c4]Yang Ming, Xiangmo Zhao, Yumin Wang:
Multi-receiver Identity-Based Signcryption Scheme in the Standard Model. ICICA (LNCS) 2011: 487-494 - 2010
- [c3]Yang Ming, Xiaoqin Shen, Yamian Peng:
Identity-Based Sanitizable Signature Scheme in the Standard Model. ICICA (1) 2010: 9-16 - [c2]Yang Ming, Yumin Wang:
Improved Identity Based Online/Offline Signature Scheme. UIC/ATC Workshops 2010: 126-131
2000 – 2009
- 2009
- [j2]Yang Ming, Yumin Wang:
An Efficient Verifiably Encrypted Signature Scheme without Random Oracles. Int. J. Netw. Secur. 8(2): 125-130 (2009) - [c1]Yang Ming, Yumin Wang:
Efficient Certificate-Based Signature Scheme. IAS 2009: 87-90 - 2008
- [j1]Haibo Tian, Willy Susilo
, Yang Ming, Yumin Wang:
A Provable Secure ID-Based Explicit Authenticated Key Agreement Protocol Without Random Oracles. J. Comput. Sci. Technol. 23(5): 832-842 (2008)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-25 23:50 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint