Follow
Yongquan Cai
Yongquan Cai
Professor of Computer Science, Beijing University of Technology
Verified email at bjut.edu.cn
Title
Cited by
Cited by
Year
Optimal parameter settings for bat algorithm
F Xue, Y Cai, Y Cao, Z Cui, F Li
International Journal of Bio-Inspired Computation 7 (2), 125-128, 2015
792015
A survey on quantum image processing
Y Cai, X Lu, N Jiang
Chinese Journal of Electronics 27 (4), 718-727, 2018
442018
A novel quantum image compression method based on JPEG
N Jiang, X Lu, H Hu, Y Dang, Y Cai
International Journal of Theoretical Physics 57, 611-636, 2018
352018
Information hiding: Arabic text steganography by using Unicode characters to hide secret data
A Ditta, C Yongquan, M Azeem, KG Rana, H Yu, MQ Memon
International Journal of Electronic Security and Digital Forensics 10 (1), 61-78, 2018
232018
Efficient and secure identity-based public auditing for dynamic outsourced data with proxy
H Yu, Y Cai, S Kong, Z Ning, F Xue, H Zhong
KSII Transactions on Internet and Information Systems (TIIS) 11 (10), 5039-5061, 2017
192017
Secure self-healing group key distribution scheme with constant storage for SCADA systems in smart grid
TJ Tsitaitse, Y Cai, A Ditta
Wireless Personal Communications 101, 1749-1763, 2018
122018
Public-key cryptosystem based on conic curve in finite field GF (2 (n)).
YQ Cai, L Zhao, YY Jin
Dianzi Xuebao(Acta Electronica Sinica) 34 (8), 1464-1468, 2006
112006
Rational secret sharing protocol with fairness
Y Cai, X Peng
Chinese Journal of Electronics 21 (1), 149-152, 2012
102012
A novel identity-based threshold signature
Y Cai, XD Zhang, N Jiang
Acta Electronica Sinica 37 (4S1), 102-105, 2009
102009
Identity-based conference key distribution protocol with user anonymity
C Yongquan, W Yali
Chinese Journal of Electronics 16 (1), 179-181, 2007
102007
A new rational secret sharing
E Zhang, YQ Cai
China Communications 7 (4), 18-22, 2010
92010
ID‐based dynamic replicated data auditing for the cloud
H Yu, Y Cai, RO Sinnott, Z Yang
Concurrency and Computation: Practice and Experience 31 (11), e5051, 2019
82019
A verifiable rational secret sharing scheme based on bilinear pairing
E ZHANG, Y CAI
Acta Electronica Sinica 40 (5), 1050-1054, 2012
82012
A cheat-proof rational secret sharing scheme
Y Cai, X Ren
Journal of Computational Information Systems 7 (1), 88-96, 2011
82011
The banknote anti-forgery system based on digital signature algorithms
S Su, Y Cai, C Shen
Intelligence and Security Informatics: IEEE ISI 2008 International Workshops …, 2008
82008
Research on parallelisation of collaborative filtering recommendation algorithm based on Spark
Y Yang, Z Ning, Y Cai, P Liang, H Liu
International Journal of Wireless and Mobile Computing 14 (4), 312-319, 2018
72018
Using different techniques of steganography deducting null cipher in plain text
A Ditta, C Yongquan, KG Rana, K Shanshan, M Azeem, T Jean
International Journal of Wireless and Mobile Computing 9 (4), 317-324, 2015
72015
Rational multi-secret sharing scheme in standard point-to-point communication networks
E Zhang, Y Cai
International Journal of Foundations of Computer Science 24 (06), 879-897, 2013
72013
Rational secure two-party computation protocol
E ZHANG, YQ CAI
Journal of Computer Research and Development 50 (7), 1409-1417, 2013
72013
Wireless ad hoc network: detection of malicious node by using neighbour-based authentication approach
KG Rana, C Yongquan, M Azeem, A Ditta, H Yu, SA Khuhro
International Journal of Wireless and Mobile Computing 14 (1), 16-24, 2018
62018
The system can't perform the operation now. Try again later.
Articles 1–20