• 386 Citations
  • 12 h-Index
20082019

Research output per year

If you made any changes in Pure these will be visible here soon.

Fingerprint Dive into the research topics where Yuzhe Tang is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 0 Similar Profiles

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Projects

Research Output

  • 386 Citations
  • 12 h-Index
  • 24 Conference contribution
  • 10 Article
  • 2 Paper
  • 2 Conference article

Authenticated LSM Trees with Minimal Trust

Tang, Y., Li, K. & Chen, J., 2019, Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Proceedings. Chen, S., Choo, K-K. R., Fu, X., Lou, W. & Mohaisen, A. (eds.). Springer, p. 454-471 18 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 305 LNICST).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Computing node clustering coefficients securely

    Areekijseree, K., Tang, Y. & Soundarajan, S., Aug 27 2019, Proceedings of the 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2019. Spezzano, F., Chen, W. & Xiao, X. (eds.). Association for Computing Machinery, Inc, p. 532-533 2 p. (Proceedings of the 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • GEM 2-tree: A gas-efficient structure for authenticated range queries in blockchain

    Zhang, C., Xu, C., Xu, J., Tang, Y. & Choi, B., Jun 6 2019, Proceedings - 2019 IEEE 35th International Conference on Data Engineering, ICDE 2019. IEEE Computer Society, p. 842-853 12 p. 8731412. (Proceedings - International Conference on Data Engineering; vol. 2019-April).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 12 Scopus citations

    Lightweight blockchain logging for data-intensive applications

    Tang, Y., Xing, Z., Xu, C., Chen, J. & Xu, J., Jan 1 2019, Financial Cryptography and Data Security - FC 2018 International Workshops, BITCOIN, VOTING, and WTSC, Revised Selected Papers. Bracciali, A., Zohar, A., Clark, J., Sala, M., Eyal, I., Teague, V. & Pintore, F. (eds.). Springer Verlag, p. 308-324 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10958 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Secure consistency verification for untrusted cloud storage by public blockchains

    Li, K., Tang, Y., Kim, B. H. B. & Xu, J., Jan 1 2019, Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Proceedings. Chen, S., Choo, K-K. R., Fu, X., Lou, W. & Mohaisen, A. (eds.). Springer, p. 39-62 24 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 304 LNICST).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Press and Media