The following pages link to Jin Li (Q476849):
Displaying 34 items.
- Efficient algorithms for secure outsourcing of bilinear pairings (Q476851) (← links)
- (Q494048) (redirect page) (← links)
- Secure deduplication storage systems supporting keyword search (Q494049) (← links)
- Generic security-amplifying methods of ordinary digital signatures (Q712706) (← links)
- Identity-based trapdoor mercurial commitments and applications (Q719291) (← links)
- Insight of the protection for data security under selective opening attacks (Q778391) (← links)
- A short non-delegatable strong designated verifier signature (Q893866) (← links)
- Identity-based chameleon hashing and signatures without key exposure (Q903661) (← links)
- Hidden attribute-based signatures without anonymity revocation (Q975862) (← links)
- Design and theoretical analysis of virtual machine placement algorithm based on peak workload characteristics (Q1701633) (← links)
- Privacy-preserving outsourcing of image feature extraction in cloud computing (Q1701922) (← links)
- Model approach to grammatical evolution: deep-structured analyzing of model and representation (Q1701981) (← links)
- Hedged nonce-based public-key encryption: adaptive security under randomness failures (Q1749284) (← links)
- Lattice-based unidirectional infinite-use proxy re-signatures with private re-signature key (Q2037197) (← links)
- Efficient and secure outsourcing of differentially private data publication (Q2167751) (← links)
- Privacy-preserving naive Bayes classifiers secure against the substitution-then-comparison attack (Q2195311) (← links)
- Differentially private naive Bayes learning over multiple data sources (Q2195313) (← links)
- Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing (Q2292920) (← links)
- CDPS: a cryptographic data publishing system (Q2402351) (← links)
- Simulation-based selective opening security for receivers under chosen-ciphertext attacks (Q2416939) (← links)
- Multilevel similarity model for high-resolution remote sensing image registration (Q2656753) (← links)
- Public key based searchable encryption with fine-grained sender permission control (Q2697904) (← links)
- N-Mobishare: new privacy-preserving location-sharing system for mobile online social networks (Q2804899) (← links)
- Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures (Q2817489) (← links)
- Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage (Q2817810) (← links)
- New Algorithms for Secure Outsourcing of Modular Exponentiations (Q2856093) (← links)
- A Short Non-delegatable Strong Designated Verifier Signature (Q2907377) (← links)
- Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts (Q2948155) (← links)
- Identity-Based Encryption with Outsourced Revocation in Cloud Computing (Q2982392) (← links)
- Verifiable Computation over Large Database with Incremental Updates (Q2985269) (← links)
- Secure Auditing and Deduplicating Data in Cloud (Q2985334) (← links)
- Secure Distributed Deduplication Systems with Improved Reliability (Q2985743) (← links)
- (Q3193628) (← links)
- Privacy-Aware Attribute-Based Encryption with User Accountability (Q3399216) (← links)