NOTES

Photo Gallery

VIDEOS

You are now here Home > Academics > Professors >

CS:Yong Yu

published: 2015-12-09 21:22:49       hits: 

name : Yong Yu Sex: male phone: 13548104240
email: yuyong@uestc.edu.cn office-address: Main Building B1-209, QingShui Campus
PH.D  Supervisor: No Master Supervisor Yes
major: Information Security
research interst: Public Cryptography, Digital Signature, Public Encryption, Cloud Security
Biography: Dr. Yong Yu received his Ph.D. degree fromXidian University in 2008, M.S. degree from Xi'an University of Technology in 2005. He joined Univeirsity of Electronic Science and Technology of China as a lecturer in 2008 and was promoted as an associate professor in 2010.  He joined Centre for Computer and Information Security Research, University of Wollongong as a visiting scholar in 2011. He has published more than 30 papers in referred internal journals and conferences. 
Education experience: Ph. D. Degree: School of Communications, Xidian University
Research Topic: Study on digital signature and signcryption schemes with additional properties
Date: Mar. 2008 (Mar. 2005 – Mar. 2008)
M. Sc. Degree: School of Applied Mathematics, Xi'an University of Technology
Thesis: Study on XML Security
Date: Mar. 2005 (Sep. 2002 – Mar. 2005)
B.Sc. Degree: School of Applied Mathematics, Xi'an University of Technology
Thesis: Study on RSA signature and its varients
Date: July 2002 (Sep. 1998 – July 2002)
Selected Publications: (1) Yong Yu, Yi Mu, Willy Susilo, Man Ho Au, Security pitfalls of an efficient threshold proxy signature scheme for mobile agents, Information Processing Letters, 114(1-2): 5-8, 2014.
(2) Jianbing Ni, Yong Yu, Yi Mu, Qi Xia, On the Security of an Efficient Dynamic Auditing Protocol in Cloud Storage, IEEE Transactions on the Transactions on Parallel and Distributed Systems, (accepted, 26 July 2013) http://doi.ieeecomputersociety.org/10.1109/TPDS.2013.199
(3) Yong Yu, Jianbing Ni, Haomiao Yang, Yi Mu, and Willy Susilo, Efficient public key encryption with revocable keyword search, Security and Communication Networks, Wiley, DOI: 10.1002/sec.790 (accepted, 17 March 20113)
(4) Yong Yu, Lei Niu, Guomin Yang, Yi Mu and Willy Susilo, On the security of auditing mechanisms for secure cloud storage, Future Generation Computer Systems, http://dx.doi.org/10.1016/j.future.2013.05.005 (accepted, 18 May 2013)
(5) Yong Yu, Jianbing Ni, Ying Sun. Security analysis of a distributed reprogramming protocol for wireless sensor networks. IEICE Transactions 96-D(8): 1875-1877, 2013.
(6) Yong Yu, Yi Mu, Guilin Wang, Qi Xia, and Bo Yang. An Improved Certificateless Signature Scheme Provably Secure in the Standard Model. IET Proceeedings Information Security, 6(2): 102-110, 2012.
(7) Yong Yu, Yi Mu, Willy Susilo, Ying Sun, Yafu Ji. Provably secure proxy signature scheme from factorization. Mathematical and Computer Modelling, 55: 1160-1168, 2012.
(8) Yong Yu, Yi Mu, Guilin Wang, Ying Sun. Cryptanalysis of an Off-Line Electronic Cash Scheme Based on Proxy Blind Signature. The Computer Journal, 54(10): 1645-1651, 2011.
(9) Yong Yu, Chunxiang Xu, Xiaosong Zhang, Yongjian Liao, Designated verifier proxy signature scheme without random oracles. Computers & Mathematics with Applications 57(8): 1352-1364, 2009.
(10) Yong Yu, Bo Yang, Ying Sun, Shenglin Zhu: Identity based signcryption scheme without random oracles. Computer Standards & Interfaces 31(1): 56-62, 2009.
(11) Yong Yu, Chunxiang Xu, Xinyi Huang, Yi Mu, An efficient anonymous proxy signature scheme with provable security. Computer Standards & Interfaces 31(2): 348-353, 2009.
Books: [1] Chunxiang Xu, Fagen Li, Xuyun Nie, Yong Yu. Modern Cryptography. Press of University of Electronic Science and Technology of China, 2008