default search action
Yong Li 0021
Person information
- affiliation: Huawei Technologies Düsseldorf GmbH, Germany
- affiliation (PhD 2016): Ruhr University Bochum, Germany
Other persons with the same name
- Yong Li — disambiguation page
- Yong Li 0001 — Beijing University of Posts and Telecommunications (BUPT), Wireless Signal Processing and Network Laboratory, China
- Yong Li 0002 — Beijing Jiaotong University, School of Electronic and Information Engineering, China (and 1 more)
- Yong Li 0003 — Toyama University, Toyama-shi, Japan
- Yong Li 0004 — Zhejiang University, Hangzhou, China
- Yong Li 0005 — State Key Laboratory of Novel Software Technology, Nanjing, China
- Yong Li 0006 — National University of Defense Technology, China
- Yong Li 0007 — Chinese Academy of Sciences, Institute of Computing Technology, China
- Yong Li 0008 — Tsinghua University, Beijing National Research Center for Information Science and Technology (BNRist), China (and 1 more)
- Yong Li 0009 — University of Pittsburgh, Department of ECE, PA, USA
- Yong Li 0010 — Siemens Corporate Research, Princeton, NJ, USA
- Yong Li 0011 — Bielefeld University, Institute of Genome Research, Germany (and 1 more)
- Yong Li 0012 — King Abdullah University of Science and Technology (KAUST), Thuwal, Saudi Arabia (and 1 more)
- Yong Li 0013 — Shandong University, Geotechnical & Structural Engineering Research Center, Jinan, China
- Yong Li 0014 — Chinese Academy of Sciences, Key Laboratory of Spectral Imaging Technology, Xi'an, China
- Yong Li 0015 — University of Tennessee at Knoxville, Department of Electrical Engineering and Computer Science, TN, USA
- Yong Li 0016 — Hunan University, College of Electrical and Information Engineering, Changsha, China (and 1 more)
- Yong Li 0017 — Xi'an Jiaotong University, School of Aerospace, State Key Laboratory for Strength and Vibration of Mechanical Structures, China
- Yong Li 0018 — University of Pittsburgh, Department of Mathematics, PA, USA
- Yong Li 0019 — Nanjing University of Aeronautics and Astronautics, College of Computer Science and Technology, China
- Yong Li 0020 — Jiangsu University, Automotive Engineering Research Institute, Zhenjiang, China (and 1 more)
- Yong Li 0022 — Huazhong University of Science and Technology, Wuhan National Laboratory for Optoelectronics, China
- Yong Li 0023 — Chongqing University of Posts and Telecommunications, Chongqing Key Laboratory of Mobile Communications Technology, China (and 1 more)
- Yong Li 0024 — Chinese Academy of Sciences, Institute of Subtropical Agriculture, Changsha, China
- Yong Li 0025 — Beijing University of Posts and Telecommunications, School of Electronic Engineering, China (and 1 more)
- Yong Li 0026 — Hong Kong Polytechnic University, Department of Electrical Engineering, Hong Kong (and 1 more)
- Yong Li 0027 — Guangzhou Institute of Geography, Open Laboratory of Geo-Spatial Information Technology and Application of Guangdong Province, China
- Yong Li 0028 — Guangxi University, School of Electrical Engineering, Nanning, China (and 2 more)
- Yong Li 0029 — Zhejiang University, Hangzhou, China
- Yong Li 0030 — Chinese Academy of Forestry, Institute of Wetland Research, Beijing, China (and 1 more)
- Yong Li 0031 — Chinese Academy of Sciences, Science, Institute of Software, State Key Laboratory of Computer Science, Beijing, China
- Yong Li 0032 — Chinese Academy of Sciences, Institute of Computing Technology, Key Laboratory of Intelligent Information Processing, Beijing, China
- Yong Li 0033 — Shanghai Jiao Tong University, Department of Electronic Engineering, China
- Yong Li 0034 — JD.com, Intelligent Advertising Lab, China (and 1 more)
- Yong Li 0035 — Shenyang University of Technology, School of Electrical Engineering, China (and 1 more)
- Yong Li 0036 — Northwestern Polytechnical University, School of Electronics and Information, Xi'an, China
- Yong Li 0037 — Beijing University of Technology, School of Software Engineering, Faculty of Information Technology, China
- Yong Li 0038 — VIPSHOP, China (and 1 more)
- Yong Li 0039 — Northwestern Polytechnical University, School of Marine science and Technology, Xi'an, China
- Yong Li 0040 — ShanghaiTech University, School of Information Science and Technology, China
- Yong Li 0041 — Harbin Institute of Technology, Electrical Engineering Department, China
- Yong Li 0042 — East China University of Science and Technology, School of Mechanical and Power Engineering, Shanghai, China (and 1 more)
- Yong Li 0043 — Guangzhou Institute of Geography, Guangdong Academy of Sciences, Guangzhou, China (and 3 more)
- Yong Li 0044 — Nanjing University of Science and Technology, PCALab, Key Laboratory of Intelligent Perception and Systems for High-Dimensional Information, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c15]Yufan Jiang, Fei Mei, Tianxiang Dai, Yong Li:
SiGBDT: Large-Scale Gradient Boosting Decision Tree Training via Function Secret Sharing. AsiaCCS 2024 - [c14]Emanuele Di Giandomenico, Yong Li, Sven Schäge:
Protoss: Protocol for Tight Optimal Symmetric Security. CCS 2024: 4718-4731 - [i7]Emanuele Di Giandomenico, Yong Li, Sven Schäge:
Protoss Protocol for Tight Optimal Symmetric Security. IACR Cryptol. ePrint Arch. 2024: 1581 (2024) - 2023
- [j2]Li Duan, Yong Li, Lijun Liao:
Practical Certificate-Less Infrastructure with Application in TLS. Cryptogr. 7(4): 63 (2023) - [c13]Li Duan, Yong Li, Lijun Liao:
Efficient Forward Secrecy for TLS-PSK from Pure Symmetric Cryptography. ISC 2023: 415-434 - 2021
- [c12]Li Duan, Yong Li, Lijun Liao:
Perfect Anonymous Authentication and Secure Communication in Internet-of-Things. SecITC 2021: 190-209 - [c11]Li Duan, Yong Li, Lijun Liao:
Flexible Group Non-interactive Key Exchange in the Standard Model. SecITC 2021: 210-227 - 2020
- [j1]Li Duan, Yong Li, Lijun Liao:
Non-interactive certificate update protocol for efficient authentication in IoT. Future Gener. Comput. Syst. 113: 132-144 (2020) - [c10]Li Duan, Yong Li, Lijun Liao:
Lightweight key management system for inter-node communication in IoT. IOT 2020: 14:1-14:8
2010 – 2019
- 2019
- [c9]Li Duan, Yong Li, Lijun Liao:
Non-interactive Certificate Update Protocol for Efficient Authentication in IoT. IOT 2019: 8:1-8:8 - 2018
- [c8]Jian Liu, Li Duan, Yong Li, N. Asokan:
Secure Deduplication of Encrypted Data: Refined Model and New Constructions. CT-RSA 2018: 374-393 - [c7]Li Duan, Yong Li, Lijun Liao:
Flexible certificate revocation list for efficient authentication in IoT. IOT 2018: 7:1-7:8 - 2017
- [c6]Yong Li, Sven Schäge:
No-Match Attacks and Robust Partnering Definitions: Defining Trivial Attacks for Security Protocols is Not Trivial. CCS 2017: 1343-1360 - [i6]Yong Li, Sven Schäge:
No-Match Attacks and Robust Partnering Definitions - Defining Trivial Attacks for Security Protocols is Not Trivial. IACR Cryptol. ePrint Arch. 2017: 818 (2017) - [i5]Jian Liu, Li Duan, Yong Li, N. Asokan:
Secure Deduplication of Encrypted Data: Refined Model and New Constructions. IACR Cryptol. ePrint Arch. 2017: 1089 (2017) - 2016
- [b1]Yong Li:
Design and analysis of cryptographic protocols. Ruhr University Bochum, Germany, 2016 - [c5]Christoph Bader, Tibor Jager, Yong Li, Sven Schäge:
On the Impossibility of Tight Cryptographic Reductions. EUROCRYPT (2) 2016: 273-304 - 2015
- [c4]Christoph Bader, Dennis Hofheinz, Tibor Jager, Eike Kiltz, Yong Li:
Tightly-Secure Authenticated Key Exchange. TCC (1) 2015: 629-658 - [i4]Christoph Bader, Tibor Jager, Yong Li, Sven Schäge:
On the Impossibility of Tight Cryptographic Reductions. IACR Cryptol. ePrint Arch. 2015: 374 (2015) - 2014
- [c3]Yong Li, Sven Schäge, Zheng Yang, Christoph Bader, Jörg Schwenk:
New Modular Compilers for Authenticated Key Exchange. ACNS 2014: 1-18 - [c2]Yong Li, Sven Schäge, Zheng Yang, Florian Kohlar, Jörg Schwenk:
On the Security of the Pre-shared Key Ciphersuites of TLS. Public Key Cryptography 2014: 669-684 - [i3]Yong Li, Sven Schäge, Zheng Yang, Florian Kohlar, Jörg Schwenk:
On the Security of the Pre-Shared Key Ciphersuites of TLS. IACR Cryptol. ePrint Arch. 2014: 37 (2014) - [i2]Christoph Bader, Dennis Hofheinz, Tibor Jager, Eike Kiltz, Yong Li:
Tightly-Secure Authenticated Key Exchange. IACR Cryptol. ePrint Arch. 2014: 797 (2014) - 2013
- [c1]Yong Li, Zheng Yang:
Strongly Secure One-Round Group Authenticated Key Exchange in the Standard Model. CANS 2013: 122-138 - [i1]Yong Li, Zheng Yang:
Strongly Secure One-round Group Authenticated Key Exchange in the Standard Model. IACR Cryptol. ePrint Arch. 2013: 393 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-11 20:40 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint