Bo Qin

According to our database1, Bo Qin authored at least 137 papers between 2004 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Privacy-Preserving Cloud-Based Road Condition Monitoring With Source Authentication in VANETs.
IEEE Trans. Information Forensics and Security, 2019

A secure versatile light payment system based on blockchain.
Future Generation Comp. Syst., 2019

2018
Efficient subtree-based encryption for fuzzy-entity data sharing.
Soft Comput., 2018

Ownership-hidden group-oriented proofs of storage from pre-homomorphic signatures.
Peer-to-Peer Networking and Applications, 2018

Lightweight and Manageable Digital Evidence Preservation System on Bitcoin.
J. Comput. Sci. Technol., 2018

Secure pay-TV for chained hotels.
Int. J. Inf. Sec., 2018

Privacy Protection Method Based on Access Control.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

Auditable Hierarchy-Private Public-Key Encryption.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

Linkable Group Signature for Auditing Anonymous Communication.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Distributed Aggregate Privacy-Preserving Authentication in VANETs.
IEEE Trans. Intelligent Transportation Systems, 2017

Online/Offline Provable Data Possession.
IEEE Trans. Information Forensics and Security, 2017

Identity-Based Data Outsourcing With Comprehensive Auditing in Clouds.
IEEE Trans. Information Forensics and Security, 2017

Secure joint Bitcoin trading with partially blind fuzzy signatures.
Soft Comput., 2017

Certificateless and identity-based authenticated asymmetric group key agreement.
Int. J. Inf. Sec., 2017

Fine-Grained Fingerprinting Threats to Software-Defined Networks.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

TTP-free Fair Exchange of Digital Signatures with Bitcoin.
Proceedings of the Information Security Practice and Experience, 2017

Outsourcing Encrypted Excel Files.
Proceedings of the Information Security Practice and Experience, 2017

EyeSec: A Practical Shoulder-Surfing Resistant Gaze-Based Authentication System.
Proceedings of the Information Security Practice and Experience, 2017

Secure Communications in Unmanned Aerial Vehicle Network.
Proceedings of the Information Security Practice and Experience, 2017

Non-approximability and Polylogarithmic Approximations of the Single-Sink Unsplittable and Confluent Dynamic Flow Problems.
Proceedings of the 28th International Symposium on Algorithms and Computation, 2017

2016
Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response.
IEEE Trans. Computers, 2016

Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts.
IEEE Trans. Computers, 2016

Scalable privacy-enhanced traffic monitoring in vehicular ad hoc networks.
Soft Comput., 2016

SAKE: scalable authenticated key exchange for mobile e-health networks.
Security and Communication Networks, 2016

Energy-efficient sensor selection strategies based on sensing model clustering.
IJSNet, 2016

Practical chosen-ciphertext secure Hierarchical Identity-Based Broadcast Encryption.
Int. J. Inf. Sec., 2016

Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing.
IACR Cryptology ePrint Archive, 2016

Identity-based proxy re-encryption version 2: Making mobile access easy in cloud.
Future Generation Comp. Syst., 2016

Batch Public Key Cryptosystem with batch multi-exponentiation.
Future Generation Comp. Syst., 2016

Provably secure robust optimistic fair exchange of distributed signatures.
Future Generation Comp. Syst., 2016

Versatile lightweight key distribution for big data privacy in vehicular ad hoc networks.
Concurrency and Computation: Practice and Experience, 2016

Efficient group key management for secure big data in predictable large-scale networks.
Concurrency and Computation: Practice and Experience, 2016

Towards cost-effective and low latency data center network architecture.
Computer Communications, 2016

A Copy-Move Forgery Detection Scheme with Improved Clone Region Estimation.
Proceedings of the Third International Conference on Trustworthy Systems and their Applications, 2016

Distributed Bitcoin Account Management.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Analysis of SIFT Method Based on Swarm Intelligent Algorithms for Copy-Move Forgery Detection.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

On Sketching Quadratic Forms.
Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science, 2016

Online/Offline Public-Index Predicate Encryption for Fine-Grained Mobile Access Control.
Proceedings of the Computer Security - ESORICS 2016, 2016

Accelerating Oblivious Transfer with Batch Multi-exponentiation.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Round-Efficient and Sender-Unrestricted Dynamic Group Key Agreement Protocol for Secure Group Communications.
IEEE Trans. Information Forensics and Security, 2015

TPP: Traceable Privacy-Preserving Communication and Precise Reward for Vehicle-to-Grid Networks in Smart Grids.
IEEE Trans. Information Forensics and Security, 2015

Practical (fully) distributed signatures provably secure in the standard model.
Theor. Comput. Sci., 2015

Towards bandwidth guaranteed energy efficient data center networking.
J. Cloud Computing, 2015

Flexible attribute-based encryption applicable to secure e-healthcare records.
Int. J. Inf. Sec., 2015

Practical secure and privacy-preserving scheme for value-added applications in VANETs.
Computer Communications, 2015

Further ideal multipartite access structures from integer polymatroids.
SCIENCE CHINA Information Sciences, 2015

Non-interactive Revocable Identity-Based Access Control over e-Healthcare Records.
Proceedings of the Information Security Practice and Experience, 2015

Expanding an Operating System's Working Space with a New Mode to Support Trust Measurement.
Proceedings of the Information Security Practice and Experience, 2015

Batch Blind Signatures on Elliptic Curves.
Proceedings of the Information Security Practice and Experience, 2015

Thermal error prediction of numerical control machine based on improved particle swarm optimized back propagation neural network.
Proceedings of the 11th International Conference on Natural Computation, 2015

An efficient framework for online virtual network embedding in virtualized cloud data centers.
Proceedings of the 4th IEEE International Conference on Cloud Networking, 2015

Group-oriented Proofs of Storage.
Proceedings of the 10th ACM Symposium on Information, 2015

Asymmetric Cross-cryptosystem Re-encryption Applicable to Efficient and Secure Mobile Access to Outsourced Data.
Proceedings of the 10th ACM Symposium on Information, 2015

Privacy-Preserving Traffic Monitoring in Vehicular Ad Hoc Networks.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

2014
Comparative analysis of metazoan chromatin organization Open.
Nature, 2014

FRR: Fair remote retrieval of outsourced private medical records in electronic health networks.
Journal of Biomedical Informatics, 2014

Signatures in hierarchical certificateless cryptography: Efficient constructions and provable security.
Inf. Sci., 2014

Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts.
Inf. Sci., 2014

Identity-based remote data possession checking in public clouds.
IET Information Security, 2014

Efficient Sub-/Inter-Group Key Distribution for ad hoc Networks.
Proceedings of the Network and System Security - 8th International Conference, 2014

Provably Secure Certificateless Authenticated Asymmetric Group Key Agreement.
Proceedings of the Information Security Practice and Experience, 2014

A Provably Secure Ring Signature Scheme with Bounded Leakage Resilience.
Proceedings of the Information Security Practice and Experience, 2014

NovaCube: A low latency Torus-based network architecture for data centers.
Proceedings of the IEEE Global Communications Conference, 2014

Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage.
Proceedings of the Computer Security - ESORICS 2014, 2014

Practical Direct Chosen Ciphertext Secure Key-Policy Attribute-Based Encryption with Public Ciphertext Test.
Proceedings of the Computer Security - ESORICS 2014, 2014

Who Is Touching My Cloud.
Proceedings of the Computer Security - ESORICS 2014, 2014

Practical Distributed Signatures in the Standard Model.
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014

Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

Hierarchical Identity-Based Broadcast Encryption.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm.
IEEE/ACM Trans. Netw., 2013

Identity-based optimistic fair exchange in the standard model.
Security and Communication Networks, 2013

Corrigendum: "Provably-secure electronic cash based on certicateless partially-blind signatures".
Electronic Commerce Research and Applications, 2013

Simultaneous authentication and secrecy in identity-based data upload to cloud.
Cluster Computing, 2013

CistromeFinder for ChIP-seq and DNase-seq data reuse.
Bioinformatics, 2013

ChainDroid: Safe and Flexible Access to Protected Android Resources Based on Call Chain.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Finding Key Leakage in Hierarchical Distribution of Encrypted Data.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Secure One-to-Group Communications Escrow-Free ID-Based Asymmetric Group Key Agreement.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

A Generic Construction of Proxy Signatures from Certificateless Signatures.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

2012
Provably secure threshold public-key encryption with adaptive security and short ciphertexts.
Inf. Sci., 2012

Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme.
IET Information Security, 2012

Improved one-to-many authentication scheme for access control in pay-TV systems.
IET Information Security, 2012

CistromeMap: a knowledgebase and web server for ChIP-Seq and DNase-Seq studies in mouse and human.
Bioinformatics, 2012

Analysis and Improvements of Two Identity Based Anonymous Signcryption Schemes for Multiple Receivers.
Proceedings of the 11th IEEE International Conference on Trust, 2012

An Improved Binary Authentication Tree Algorithm for Vehicular Networks.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

A New Identity Based Signcryption Scheme in the Standard Model.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Practical Privacy for Value-Added Applications in Vehicular Ad Hoc Networks.
Proceedings of the Internet and Distributed Computing Systems, 2012

Convex hull-based support vector machine rule extraction.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012

2011
Solitonic Excitations and Interactions in the Three-Spine Alpha-Helical Protein with Inhomogeneity.
SIAM Journal of Applied Mathematics, 2011

Provably secure one-round identity-based authenticated asymmetric group key agreement protocol.
Inf. Sci., 2011

Provably-secure electronic cash based on certificateless partially-blind signatures.
Electronic Commerce Research and Applications, 2011

Asymmetric group key agreement protocol for open networks and its application to broadcast encryption.
Computer Networks, 2011

Fully Distributed Broadcast Encryption.
Proceedings of the Provable Security - 5th International Conference, 2011

APPA: Aggregate Privacy-Preserving Authentication in Vehicular Ad Hoc Networks.
Proceedings of the Information Security, 14th International Conference, 2011

Distributed Privacy-Preserving Secure Aggregation in Vehicular Communication.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

SK-OFDM Robust to Frequency Selective Fading Channel with Spectral Nulls.
Proceedings of the Third International Conference on Communications and Mobile Computing, 2011

Regression rules extraction from artificial neural network based on least squares.
Proceedings of the Seventh International Conference on Natural Computation, 2011

Preserving Security and Privacy in Large-Scale VANETs.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

Bridging Broadcast Encryption and Group Key Agreement.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

2010
A 52-mW 3.1-10.6-GHz Fully Integrated Correlator for IR-UWB Transceivers in 0.18 μm CMOS.
IEEE Trans. Industrial Electronics, 2010

1.8 pJ/Pulse Programmable Gaussian Pulse Generator for Full-Band Noncarrier Impulse-UWB Transceivers in 90-nm CMOS.
IEEE Trans. Industrial Electronics, 2010

Efficient many-to-one authentication with certificateless aggregate signatures.
Computer Networks, 2010

Adapting Open Information Extraction to Domain-Specific Relations.
AI Magazine, 2010

Secure compression of privacy-preserving witnesses in vehicular ad hoc networks.
Proceedings of the IEEE 6th International Conference on Wireless and Mobile Computing, 2010

GPU-Based Parallelization Algorithm for 2D Line Integral Convolution.
Proceedings of the Advances in Swarm Intelligence, First International Conference, 2010

A Traffic Video Background Extraction Algorithm Based on Image Content Sensitivity.
Proceedings of the Advances in Swarm Intelligence, First International Conference, 2010

Topological simplification of planar flow field based on physical feature.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010

Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

Authenticated Asymmetric Group Key Agreement Protocol and Its Application.
Proceedings of IEEE International Conference on Communications, 2010

Hierarchical Certificateless Signatures.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

Identity-Based Authenticated Asymmetric Group Key Agreement Protocol.
Proceedings of the Computing and Combinatorics, 16th Annual International Conference, 2010

Ad hoc broadcast encryption.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Identity-Based Verifiably Encrypted Signatures without Random Oracles.
Proceedings of the Provable Security, Third International Conference, 2009

A Single-chip 33pJ/pulse 5th-derivative Gaussian based IR-UWB Transmitter in 0.13µm CMOS.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2009), 2009

Fast Rendering Algorithm of Underwater Optical Effect.
Proceedings of the Second International Symposium on Intelligent Information Technology and Security Informatics, 2009

Asymmetric Group Key Agreement.
Proceedings of the Advances in Cryptology, 2009

A Three-Phase Approach to Photometric Calibration for Multi-projector Display Using LCD Projectors.
Proceedings of the Computer Vision, 2009

Novel Efficient Certificateless Aggregate Signatures.
Proceedings of the Applied Algebra, 2009

Certificateless One-Way Authenticated Two-Party Key Agreement Protocol.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Privacy for Private Key in Signatures.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

Publicly Verifiable Privacy-Preserving Group Decryption.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

OceanGrid: Constructing Data Grid of Ocean Environmental Information.
Proceedings of the Third ChinaGrid Annual Conference, ChinaGrid 2008, Dunhuang, Gansu, 2008

2007
Short Group Signatures Without Random Oracles.
J. Comput. Sci. Technol., 2007

Group Decryption.
IACR Cryptology ePrint Archive, 2007

A Varying Pulse Width Second Order Derivative Gaussian Pulse Generator for UWB Transceivers in CMOS.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2007), 2007

A High Resolution Video Display System by Seamlessly Tiling Multiple Projectors.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

Fast Detection of Vehicles Based-on the Moving Region.
Proceedings of the 10th International Conference on Computer-Aided Design and Computer Graphics, 2007

Cryptanalysis of BGW Broadcast Encryption Schemes for DVD Content Protection.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

A simple and quick method for rendering underwater optical effect.
Proceedings of the 4th International Conference on Computer Graphics, 2007

2006
A Quick Self-Adaptive Background Updating Algorithm Based on Moving Region.
Proceedings of the 2006 Joint Conference on Information Sciences, 2006

Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel Identification/Signature Scheme).
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006

2005
Extended Methodology of RS Design and Instances Based on GIP.
J. Comput. Sci. Technol., 2005

t-Out-of-n String/Bit Oblivious Transfers Revisited.
Proceedings of the Information Security Practice and Experience, 2005

A Robust Statistical Method for Brain Magnetic Resonance Image Segmentation.
Proceedings of the Progress in Pattern Recognition, 2005

Real-Time Dynamic Cloud Modeling and Rendering.
Proceedings of the 2005 International Conference on Computer Graphics, 2005

2004
The Recognition of the Vehicle License Plate Based on Modular Networks.
Proceedings of the Advances in Neural Networks, 2004

Simulation of the emission of frozen soil by using IEM.
Proceedings of the 2004 IEEE International Geoscience and Remote Sensing Symposium, 2004

Simulated radiation characteristics of frozen soil surface at typical microwave bands.
Proceedings of the 2004 IEEE International Geoscience and Remote Sensing Symposium, 2004


  Loading...