Jin Li  李进
Jin Li 李进
Professor @Guangzhou University
Correu electrònic verificat a gzhu.edu.cn
TítolCitada perAny
Enabling public verifiability and data dynamics for storage security in cloud computing
Q Wang, C Wang, J Li, K Ren, W Lou
European symposium on research in computer security, 355-370, 2009
12462009
Enabling public auditability and data dynamics for storage security in cloud computing
Q Wang, C Wang, K Ren, W Lou, J Li
IEEE transactions on parallel and distributed systems 22 (5), 847-859, 2010
12102010
Enabling efficient fuzzy keyword search over encrypted data in cloud computing
J Li, Q Wang, C Wang, N Cao, K Ren, W Lou
Cryptology ePrint Archive, Report 2009 593, 16, 2009
1055*2009
Fuzzy keyword search over encrypted data in cloud computing
J Li, Q Wang, C Wang, N Cao, K Ren, W Lou
2010 Proceedings IEEE INFOCOM, 1-5, 2010
10252010
Secure ranked keyword search over encrypted cloud data
C Wang, N Cao, J Li, K Ren, W Lou
2010 IEEE 30th international conference on distributed computing systems …, 2010
8802010
Secure Deduplication with Efficient and Reliable Convergent Key Management
J Li, X Chen, M Li, J Li, P Lee, W Lou
IEEE Transactions on Parallel and Distributed Systems 25 (6), 1615-1625, 2014
5892014
Toward publicly auditable secure cloud data storage services
C Wang, K Ren, W Lou, J Li
IEEE network 24 (4), 19-24, 2010
5472010
A Hybrid Cloud Approach for Secure Authorized Deduplication
J Li, Y Li, X Chen, P Lee, W Lou
IEEE Transactions on Parallel and Distributed Systems, 2014
3952014
New Algorithms for Secure Outsourcing of Modular Exponentiations
X Chen, J Li, J Ma, Q Tang, W Lou
ESORICS, 2012
3802012
Securely outsourcing attribute-based encryption with checkability
J Li, X Huang, J Li, X Chen, Y Xiang
IEEE Transactions on Parallel and Distributed Systems 25 (8), 2201-2210, 2013
3722013
Identity-based encryption with outsourced revocation in cloud computing
J Li, J Li, X Chen, C Jia, W Lou
Ieee Transactions on computers 64 (2), 425-437, 2013
3322013
Attribute-based signature and its applications
J Li, MH Au, W Susilo, D Xie, K Ren
Proceedings of the 5th ACM Symposium on Information, Computer and …, 2010
2672010
Verifiable computation over large database with incremental updates
X Chen, J Li, J Weng, J Ma, W Lou
IEEE transactions on Computers 65 (10), 3184-3195, 2015
2342015
Privacy-aware attribute-based encryption with user accountability
J Li, K Ren, B Zhu, Z Wan
International Conference on Information Security, 347-362, 2009
1872009
New publicly verifiable databases with efficient updates
X Chen, J Li, X Huang, J Ma, W Lou
IEEE Transactions on Dependable and Secure Computing 12 (5), 546-556, 2014
1692014
Hidden attribute-based signatures without anonymity revocation
J Li, K Kim
Information Sciences 180 (9), 1681-1689, 2010
1642010
Fine-grained access control system based on outsourced attribute-based encryption
J Li, X Chen, J Li, C Jia, J Ma, W Lou
European Symposium on Research in Computer Security, 592-609, 2013
1612013
New algorithms for secure outsourcing of large-scale systems of linear equations
X Chen, X Huang, J Li, J Ma, W Lou, DS Wong
IEEE transactions on information forensics and security 10 (1), 69-78, 2014
1532014
Multi-authority ciphertext-policy attribute-based encryption with accountability
J Li, Q Huang, X Chen, SSM Chow, DS Wong, D Xie
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
1532011
Trusted data sharing over untrusted cloud storage providers
G Zhao, C Rong, J Li, F Zhang, Y Tang
2nd IEEE International Conference on Cloud Computing Technology and Science …, 2010
152*2010
En aquests moments el sistema no pot dur a terme l'operació. Torneu-ho a provar més tard.
Articles 1–20