Jin Li

From MaRDI portal
(Redirected from Person:476849)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Thermodynamic phase transition of AdS black holes in massive gravity on free energy landscape
International Journal of Theoretical Physics
2024-08-19Paper
Public key based searchable encryption with fine-grained sender permission control2023-04-13Paper
Efficient and secure outsourcing of differentially private data publication2022-08-25Paper
Lattice-based unidirectional infinite-use proxy re-signatures with private re-signature key
Journal of Computer and System Sciences
2021-06-30Paper
Multilevel similarity model for high-resolution remote sensing image registration
Information Sciences
2021-03-16Paper
Privacy-preserving naive Bayes classifiers secure against the substitution-then-comparison attack
Information Sciences
2020-09-08Paper
Differentially private naive Bayes learning over multiple data sources
Information Sciences
2020-09-08Paper
Insight of the protection for data security under selective opening attacks
Information Sciences
2020-07-02Paper
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
Information Sciences
2020-02-06Paper
Simulation-based selective opening security for receivers under chosen-ciphertext attacks
Designs, Codes and Cryptography
2019-05-24Paper
Hedged nonce-based public-key encryption: adaptive security under randomness failures2018-05-16Paper
Design and theoretical analysis of virtual machine placement algorithm based on peak workload characteristics
Soft Computing
2018-02-27Paper
Model approach to grammatical evolution: deep-structured analyzing of model and representation
Soft Computing
2018-02-27Paper
Privacy-preserving outsourcing of image feature extraction in cloud computing
Soft Computing
2018-02-27Paper
CDPS: a cryptographic data publishing system
Journal of Computer and System Sciences
2017-09-07Paper
Verifiable Computation over Large Database with Incremental Updates
IEEE Transactions on Computers
2017-05-16Paper
Secure Auditing and Deduplicating Data in Cloud
IEEE Transactions on Computers
2017-05-16Paper
Secure Distributed Deduplication Systems with Improved Reliability
IEEE Transactions on Computers
2017-05-16Paper
Identity-Based Encryption with Outsourced Revocation in Cloud Computing
IEEE Transactions on Computers
2017-05-16Paper
Verifiable searchable encryption with aggregate keys for data sharing in outsourcing storage
Information Security and Privacy
2016-09-02Paper
Accountable large-universe attribute-based encryption supporting any monotone access structures
Information Security and Privacy
2016-08-31Paper
N-Mobishare: new privacy-preserving location-sharing system for mobile online social networks
International Journal of Computer Mathematics
2016-05-06Paper
Identity-based chameleon hashing and signatures without key exposure
Information Sciences
2016-01-14Paper
A short non-delegatable strong designated verifier signature
Frontiers of Computer Science
2015-11-20Paper
Survey on the searchable encryption2015-10-28Paper
Computationally efficient ciphertext-policy attribute-based encryption with constant-size ciphertexts
Provable Security
2015-09-29Paper
Secure deduplication storage systems supporting keyword search
Journal of Computer and System Sciences
2015-08-31Paper
Verifiable computation over large database with incremental updates
Computer Security - ESORICS 2014
2015-07-24Paper
Efficient algorithms for secure outsourcing of bilinear pairings
Theoretical Computer Science
2014-12-02Paper
TMDS: thin-model data sharing scheme supporting keyword search in cloud storage
Information Security and Privacy
2014-07-24Paper
New algorithms for secure outsourcing of modular exponentiations
Computer Security – ESORICS 2012
2013-10-23Paper
Generic security-amplifying methods of ordinary digital signatures
Information Sciences
2012-10-17Paper
A short non-delegatable strong designated verifier signature
Information Security and Privacy
2012-09-07Paper
Identity-based trapdoor mercurial commitments and applications
Theoretical Computer Science
2011-10-10Paper
Hidden attribute-based signatures without anonymity revocation
Information Sciences
2010-06-11Paper
Defending against key abuse attacks in KP-ABE enabled broadcast systems
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
2010-04-24Paper
Privacy-Aware Attribute-Based Encryption with User Accountability
Lecture Notes in Computer Science
2009-09-29Paper
Generic Security-Amplifying Methods of Ordinary Digital Signatures
Applied Cryptography and Network Security
2008-06-13Paper
Practical Threshold Signatures Without Random Oracles
Provable Security
2008-06-10Paper
Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature
Provable Security
2008-06-10Paper


Research outcomes over time


This page was built for person: Jin Li