jun ye
jun ye
Verified email at suse.edu.cn
Cited by
Cited by
Secure outsourcing of modular exponentiations under single untrusted programme model
Y Ding, Z Xu, J Ye, KKR Choo
Journal of Computer and System Sciences 90, 1-13, 2017
Controllable keyword search scheme supporting multiple users
J Ye, Y Ding
Future Generation Computer Systems 81, 433-442, 2018
Fine-grained searchable encryption in multi-user setting
J Ye, J Wang, J Zhao, J Shen, KC Li
Soft Computing 21 (20), 6201-6212, 2017
Efficient and secure encrypted image search in mobile cloud computing
Q Zou, J Wang, J Ye, J Shen, X Chen
Soft Computing 21 (11), 2959-2969, 2017
Verifiable delegation of polynomials.
J Ye, H Zhang, C Fu
IJ Network Security 18 (2), 283-290, 2016
An improved algorithm for secure outsourcing of modular exponentiations
J Ye, X Chen, J Ma
2015 IEEE 29th International Conference on Advanced Information Networking …, 2015
Efficient request-based comparable encryption scheme based on sliding window method
P Chen, J Ye, X Chen
Soft Computing 20 (11), 4589-4596, 2016
Secure and efficient fine-grained data access control scheme in cloud computing1
C Yang, J Ye
Journal of High Speed Networks 21 (4), 259-271, 2015
Attribute-based fine-grained access control with user revocation
J Ye, W Zhang, S Wu, Y Gao, J Qiu
Information and Communication Technology-EurAsia Conference, 586-595, 2014
Image search scheme over encrypted database
J Ye, Z Xu, Y Ding
Future Generation Computer Systems 87, 251-258, 2018
A Homomorphic Universal Re-encryptor for Identity-based Encryption.
L Liu, J Ye
IJ Network Security 19 (1), 11-19, 2017
Secure Outsourcing Algorithm of Polynomials in Cloud Computing.
X Zhou, Y Ding, Z Wang, X Li, J Ye, Z Xu
SEKE, 46-51, 2016
Secure outsourcing of modular exponentiation with single untrusted server
J Ye, J Wang
2015 18th International Conference on Network-Based Information Systems, 643-645, 2015
A new efficient request-based comparable encryption scheme
P Chen, J Ye, X Chen
2015 IEEE 29th International Conference on Advanced Information Networking …, 2015
An efficient traceable data sharing scheme in cloud computing for mobile devices
Z Wang, J Ye, J Wang
International Journal of High Performance Computing and Networking 12 (2 …, 2018
Verifiable outsourcing of high-degree polynomials and its application in keyword search
J Ye, X Zhou, Z Xu, Y Ding
Intelligent Automation & Soft Computing, 1-6, 2017
Request-based comparable encryption scheme with multiple users
J Ye, M Miao, P Chen, X Chen
2015 10th International Conference on Broadband and Wireless Computing …, 2015
Dynamic model for anonymity measurement based on information entropy.
J Ye, Y Ding, X Xiong, SL Wu
J. Internet Serv. Inf. Secur. 4 (2), 27-37, 2014
Constructing Verifiable Random Number in Finite Field.
J Ye, X Chen, J Ma
J. Internet Serv. Inf. Secur. 3 (3/4), 106-115, 2013
A new way to produce key streams based on chaotic sequences
X Zhou, J Ye
Journal of Discrete Mathematical Sciences and Cryptography 21 (5), 1097-1105, 2018
The system can't perform the operation now. Try again later.
Articles 1–20