Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Shutang Yang is active.

Publication


Featured researches published by Shutang Yang.


information security practice and experience | 2006

Security protocol analysis with improved authentication tests

Xiehua Li; Shutang Yang; Jianhua Li; Hongwen Zhu

This paper proposes the improved authentication tests in order to find the potential attacks on security protocols. It is based on the authentication tests theory and enhances the original methods by introducing the notion of message type. Formalized definition of replay attacks have been integrated into the original theoretical models for further verification of security protocols. The thoroughly proof of initial and subsequent authentications in Neuman-Stubblebine protocol shows that the improved authentication tests can find flaws of the protocol more efficiently than the original ones.


Wuhan University Journal of Natural Sciences | 2008

Efficient and Secure Multi-Signature Scheme Based on Trusted Computing

Liming Hao; Shutang Yang; Songnian Lu; Gongliang Chen

A new multi-signature scheme was proposed with the extension of the direct anonymous attestation (DAA) protocol supported by trusted computing (TC) technology. Analysis and simulation results show that the signer’s privacy is well protected with dynamic anonymity, the public key and signatures have length independent of the number of signature members, new signers are allowed to join the signature without modifying the public key, and attacks caused by secret key dumping or leaking can be avoided.


international conference on wireless communications, networking and mobile computing | 2006

Fast Authentication Public Key Infrastructure for Mobile Ad Hoc Networks Based on Trusted Computing

Liming Hao; Xiehua Li; Shutang Yang; Songnian Lu


IACR Cryptology ePrint Archive | 2008

Identity-Based Directed Signature Scheme from Bilinear Pairings

Xun Sun; Jianhua Li; Gongliang Chen; Shutang Yang


International Journal of Distributed Sensor Networks | 2009

An Efficient and Robust Self-Storage P2P Reputation System

Liming Hao; Songnian Lu; Junhua Tang; Shutang Yang


global communications conference | 2007

A Dynamic Anonymous P2P Reputation System Based on Trusted Computing Technology

Liming Hao; Shutang Yang; Songnian Lu; Gongliang Chen


Archive | 2007

Distributed access control method in multistage securities

Shutang Yang; Songnian Lu; Jianhua Li; Rong Lei; Gongliang Chen; Li Jun


Archive | 2006

Method for detecting and monitoring gusty abnormal network flow

Shutang Yang; Songnian Lu; Jianhua Li; Jin Ma; Mingchun Zhou


Archive | 2006

Method for implementing experimental system of firewall under multiple user's remote concurrency control in large scale

Shutang Yang; Jianhua Li; Duofeng Li; Jin Ma; Songnian Lu


Journal of Zhejiang University Science | 2008

Non-interactive identity-based threshold signature scheme without random oracles

Xun Sun; Jianhua Li; Shutang Yang; Gongliang Chen

Collaboration


Dive into the Shutang Yang's collaboration.

Top Co-Authors

Avatar

Jianhua Li

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Songnian Lu

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Gongliang Chen

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Liming Hao

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Xiehua Li

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Xun Sun

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Hongwen Zhu

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Jin Ma

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Junhua Tang

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Ning Liu

Shanghai Jiao Tong University

View shared research outputs
Researchain Logo
Decentralizing Knowledge