Jia Xu

Orcid: 0000-0001-7887-5913

Affiliations:
  • NUS-Singtel Cyber Security Research and Development Laboratory, Singapore
  • Institute for Infocomm Research, Singapore (2012 - 2017)
  • National University of Singapore, School of Computing, Singapore (PhD 2012)


According to our database1, Jia Xu authored at least 34 papers between 2008 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
cuNH: Efficient GPU Implementations of Post-Quantum KEM NewHope.
IEEE Trans. Parallel Distributed Syst., 2022

PRoM: Passive Remote Attestation Against Roving Malware in Multicore IoT Devices.
IEEE Syst. J., 2022

Machine-Learning-Based Attestation for the Internet of Things Using Memory Traces.
IEEE Internet Things J., 2022

2021
Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage.
IEEE Trans. Cloud Comput., 2021

Strong leakage-resilient encryption: enhancing data confidentiality by hiding partial ciphertext.
Int. J. Inf. Sec., 2021

Stateful KEM: Towards Optimal Robust Combiner for Key Encapsulation Mechanism.
IACR Cryptol. ePrint Arch., 2021

2020
<i>PrivateLink</i>: Privacy-Preserving Integration and Sharing of Datasets.
IEEE Trans. Inf. Forensics Secur., 2020

HAtt: Hybrid Remote Attestation for the Internet of Things With High Availability.
IEEE Internet Things J., 2020

PSI-Stats: Private Set Intersection Protocols Supporting Secure Statistical Functions.
IACR Cryptol. ePrint Arch., 2020

Practical Quantum-Safe Stateful Hybrid Key Exchange Protocol.
IACR Cryptol. ePrint Arch., 2020

PBio: Enabling Cross-organizational Biometric Authentication Service through Secure Sharing of Biometric Templates.
IACR Cryptol. ePrint Arch., 2020

2019
Passive Attacks Against Searchable Encryption.
IEEE Trans. Inf. Forensics Secur., 2019

Privacy as a Service: Publishing Data and Models.
Proceedings of the Database Systems for Advanced Applications, 2019

2018
Strong Leakage Resilient Encryption by Hiding Partial Ciphertext.
IACR Cryptol. ePrint Arch., 2018

Virtually Isolated Network: A Hybrid Network to Achieve High Level Security.
Proceedings of the Data and Applications Security and Privacy XXXII, 2018

2017
A New Functional Encryption for Multidimensional Range Query.
IACR Cryptol. ePrint Arch., 2017

A New Functional Encryption for Multidimensional Range Query (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017

2016
Directed Transitive Signature on Directed Tree.
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 2016

Lightweight Delegatable Proofs of Storage.
Proceedings of the Computer Security - ESORICS 2016, 2016

Enhancing TPM Security by Integrating SRAM PUFs Technology.
Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security, 2016

2015
Cyber and Physical Access Control in Legacy System Using Passwords.
IACR Cryptol. ePrint Arch., 2015

2014
Lightweight and Privacy-Preserving Delegatable Proofs of Storage.
IACR Cryptol. ePrint Arch., 2014

2013
Security Concerns in Popular Cloud Storage Services.
IEEE Pervasive Comput., 2013

Leakage Resilient Proofs of Ownership in Cloud Storage, Revisited.
IACR Cryptol. ePrint Arch., 2013

Weak leakage-resilient client-side deduplication of encrypted data in cloud storage.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Towards efficient proofs of retrievability.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
Towards Efficient Provable Data Possession.
IACR Cryptol. ePrint Arch., 2011

Practically Efficient Proof of Retrievability in Cloud Storage.
IACR Cryptol. ePrint Arch., 2011

ID Repetition in Structured P2P Networks.
Comput. J., 2011

2010
Authenticating Aggregate Range Queries over Multidimensional Dataset.
IACR Cryptol. ePrint Arch., 2010

A chameleon encryption scheme resistant to known-plaintext attack.
Proceedings of the 10th ACM Workshop on Digital Rights Management, 2010

2009
Short Redactable Signatures Using Random Trees.
IACR Cryptol. ePrint Arch., 2009

ID Repetition in Kad.
Proceedings of the Proceedings P2P 2009, 2009

2008
Remote Integrity Check with Dishonest Storage Server.
IACR Cryptol. ePrint Arch., 2008


  Loading...