The SCEAS System
Navigation Menu

Search the dblp DataBase


Yu Yu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yu Yu, Jussipekka Leiwo, Benjamin Premkumar
    Hiding Circuit Topology from Unbounded Reverse Engineers. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:171-182 [Conf]
  2. Yu Yu, Jussipekka Leiwo, Benjamin Premkumar
    Private stateful circuits secure against probing attacks. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:63-69 [Conf]
  3. Yu Yu, Jussipekka Leiwo, Benjamin Premkumar
    An Improved Secure Two-Party Computation Protocol. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:221-232 [Conf]
  4. Yu Yu, Jussipekka Leiwo, Benjamin Premkumar
    Securely Utilizing External Computing Power. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:762-767 [Conf]
  5. Yi Wang, Jussipekka Leiwo, Thambipillai Srikanthan, Yu Yu
    FPGA based DPA-resistant Unified Architecture for Signcryption. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:571-572 [Conf]
  6. Yu Yu, Jussipekka Leiwo, Benjamin Premkumar
    A Study on the Security of Privacy Homomorphism. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:470-475 [Conf]
  7. Yibo Fan, Xiaoyang Zeng, Yu Yu, Gang Wang, Qianling Zhang
    A modified high-radix scalable Montgomery multiplier. [Citation Graph (0, 0)][DBLP]
    ISCAS, 2006, pp:- [Conf]

  8. Hierarchical structure based service semantic relationship discovery. [Citation Graph (, )][DBLP]

Search in 0.011secs, Finished in 0.012secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002