Jin Li

From MaRDI portal
Revision as of 01:10, 12 December 2023 by AuthorDisambiguator (talk | contribs) (AuthorDisambiguator moved page Jin Li to Jin Li: Duplicate)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Person:476849

Available identifiers

zbMath Open li.jin.1MaRDI QIDQ476849

List of research outcomes





PublicationDate of PublicationType
Thermodynamic phase transition of AdS black holes in massive gravity on free energy landscape2024-08-19Paper
Public key based searchable encryption with fine-grained sender permission control2023-04-13Paper
Efficient and secure outsourcing of differentially private data publication2022-08-25Paper
Lattice-based unidirectional infinite-use proxy re-signatures with private re-signature key2021-06-30Paper
Multilevel similarity model for high-resolution remote sensing image registration2021-03-16Paper
Privacy-preserving naive Bayes classifiers secure against the substitution-then-comparison attack2020-09-08Paper
Differentially private naive Bayes learning over multiple data sources2020-09-08Paper
Insight of the protection for data security under selective opening attacks2020-07-02Paper
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing2020-02-06Paper
Simulation-based selective opening security for receivers under chosen-ciphertext attacks2019-05-24Paper
Hedged nonce-based public-key encryption: adaptive security under randomness failures2018-05-16Paper
Design and theoretical analysis of virtual machine placement algorithm based on peak workload characteristics2018-02-27Paper
Privacy-preserving outsourcing of image feature extraction in cloud computing2018-02-27Paper
Model approach to grammatical evolution: deep-structured analyzing of model and representation2018-02-27Paper
CDPS: a cryptographic data publishing system2017-09-07Paper
Identity-Based Encryption with Outsourced Revocation in Cloud Computing2017-05-16Paper
Verifiable Computation over Large Database with Incremental Updates2017-05-16Paper
Secure Auditing and Deduplicating Data in Cloud2017-05-16Paper
Secure Distributed Deduplication Systems with Improved Reliability2017-05-16Paper
Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage2016-09-02Paper
Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures2016-08-31Paper
N-Mobishare: new privacy-preserving location-sharing system for mobile online social networks2016-05-06Paper
Identity-based chameleon hashing and signatures without key exposure2016-01-14Paper
A short non-delegatable strong designated verifier signature2015-11-20Paper
https://portal.mardi4nfdi.de/entity/Q31936282015-10-28Paper
Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts2015-09-29Paper
Secure deduplication storage systems supporting keyword search2015-08-31Paper
Verifiable Computation over Large Database with Incremental Updates2015-07-24Paper
Efficient algorithms for secure outsourcing of bilinear pairings2014-12-02Paper
TMDS: Thin-Model Data Sharing Scheme Supporting Keyword Search in Cloud Storage2014-07-24Paper
New Algorithms for Secure Outsourcing of Modular Exponentiations2013-10-23Paper
Generic security-amplifying methods of ordinary digital signatures2012-10-17Paper
A Short Non-delegatable Strong Designated Verifier Signature2012-09-07Paper
Identity-based trapdoor mercurial commitments and applications2011-10-10Paper
Hidden attribute-based signatures without anonymity revocation2010-06-11Paper
Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems2010-04-24Paper
Privacy-Aware Attribute-Based Encryption with User Accountability2009-09-29Paper
Generic Security-Amplifying Methods of Ordinary Digital Signatures2008-06-13Paper
Practical Threshold Signatures Without Random Oracles2008-06-10Paper
Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature2008-06-10Paper

Research outcomes over time

This page was built for person: Jin Li