Jianbing Ni

According to our database1, Jianbing Ni
  • authored at least 35 papers between 2012 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Data integrity checking with reliable data transfer for secure cloud storage.
IJWGS, 2018

Securing Fog Computing for Internet of Things Applications: Challenges and Solutions.
IEEE Communications Surveys and Tutorials, 2018

2017
Differentially Private Smart Metering With Fault Tolerance and Range-Based Filtering.
IEEE Trans. Smart Grid, 2017

Provable data transfer from provable data possession and deletion in cloud storage.
Computer Standards & Interfaces, 2017

Security and Privacy in Smart City Applications: Challenges and Solutions.
IEEE Communications Magazine, 2017

Security, Privacy, and Fairness in Fog-Based Vehicular Crowdsensing.
IEEE Communications Magazine, 2017

Location privacy-aware task recommendation for spatial crowdsourcing.
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017

Privacy-preserving mobile crowdsensing for located-based applications.
Proceedings of the IEEE International Conference on Communications, 2017

Dual-anonymous reward distribution for mobile crowdsensing.
Proceedings of the IEEE International Conference on Communications, 2017

Privacy-Preserving Data Forwarding in VANETs: A Personal-Social Behavior Based Approach.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
Comments on "Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification".
IEEE Trans. Information Forensics and Security, 2016

Cloud data integrity checking with an identity-based auditing mechanism from RSA.
Future Generation Comp. Syst., 2016

Provable multiple replication data possession with full dynamics for secure cloud storage.
Concurrency and Computation: Practice and Experience, 2016

SDIVIP2: shared data integrity verification with identity privacy preserving in mobile clouds.
Concurrency and Computation: Practice and Experience, 2016

Privacy-Preserving Real-Time Navigation System Using Vehicular Crowdsourcing.
Proceedings of the IEEE 84th Vehicular Technology Conference, 2016

Cloud-Based Privacy-Preserving Parking Navigation Through Vehicular Communications.
Proceedings of the Security and Privacy in Communication Networks, 2016

Device-invisible two-factor authenticated key agreement protocol for BYOD.
Proceedings of the 2016 IEEE/CIC International Conference on Communications in China, 2016

Secure outsourced data transfer with integrity verification in cloud storage.
Proceedings of the 2016 IEEE/CIC International Conference on Communications in China, 2016

AMA: Anonymous mutual authentication with traceability in carpooling systems.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

EDAT: Efficient data aggregation without TTP for privacy-assured smart metering.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Secure and Deduplicated Spatial Crowdsourcing: A Fog-Based Approach.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
Comments on a Public Auditing Mechanism for Shared Cloud Data Service.
IEEE Trans. Services Computing, 2015

Searchable Public-Key Encryption with Data Sharing in Dynamic Groups for Mobile Cloud Storage.
J. UCS, 2015

Remote data possession checking with enhanced security for cloud storage.
Future Generation Comp. Syst., 2015

Security-Enhanced Data Aggregation against Malicious Gateways in Smart Grid.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Provable Data Possession Supporting Secure Data Transfer for Cloud Storage.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

2014
On the Security of an Efficient Dynamic Auditing Protocol in Cloud Storage.
IEEE Trans. Parallel Distrib. Syst., 2014

Efficient public key encryption with revocable keyword search.
Security and Communication Networks, 2014

Improved security of a dynamic remote data possession checking protocol for cloud storage.
Expert Syst. Appl., 2014

Identity Privacy-Preserving Public Auditing with Dynamic Group for Secure Mobile Cloud Storage.
Proceedings of the Network and System Security - 8th International Conference, 2014

Improvement of a Remote Data Possession Checking Protocol from Algebraic Signatures.
Proceedings of the Information Security Practice and Experience, 2014

2013
Security Analysis of a Distributed Reprogramming Protocol for Wireless Sensor Networks.
IEICE Transactions, 2013

A Secure and Efficient E-Cheque Protocol from Chameleon Hash Function.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

A New Construction of Proxy Signature Using Chameleon Hash Function.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

2012
Further Cryptanalysis of a Signature Scheme with Message Recovery.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012


  Loading...