Jiangchun Ren

According to our database1, Jiangchun Ren authored at least 32 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Disabling Tracing in Black-Box-Traceable CP-ABE System: Alert Decryption Black Box.
Symmetry, 2024

2018
Practical, Provably Secure, and Black-Box Traceable CP-ABE for Cryptographic Cloud Storage.
Symmetry, 2018

A Novel Vertical Fragmentation Method for Privacy Protection Based on Entropy Minimization in a Relational Database.
Symmetry, 2018

RIM4J: An Architecture for Language-Supported Runtime Measurement against Malicious Bytecode in Cloud Computing.
Symmetry, 2018

Astrape: An Efficient Concurrent Cloud Attestation with Ciphertext-Policy Attribute-Based Encryption.
Symmetry, 2018

Compulsory traceable ciphertext-policy attribute-based encryption against privilege abuse in fog computing.
Future Gener. Comput. Syst., 2018

2017
UTrustDisk: An Efficient Data Protection Scheme for Building Trusted USB Flash Disk.
KSII Trans. Internet Inf. Syst., 2017

Runtime Measurement Architecture for Bytecode Integrity in JVM-Based Cloud.
Proceedings of the 36th IEEE Symposium on Reliable Distributed Systems, 2017

Decoupling Security Services from IaaS Cloud Through Remote Virtual Machine Introspection.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

2016
User-policy-based dynamic remote attestation in cloud computing.
Int. J. Embed. Syst., 2016

iBalloon: Efficient VM Memory Balancing as a Service.
Proceedings of the IEEE International Conference on Web Services, 2016

OBC Based Optimization of Re-encryption for Cryptographic Cloud Storage.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2016

ESI-Cloud: Extending Virtual Machine Introspection for Integrating Multiple Security Services.
Proceedings of the IEEE International Conference on Services Computing, 2016

Tenants Attested Trusted Cloud Service.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2015
Application-Assisted Dynamic Attestation for JVM-Based Cloud.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
Cryptanalysis of Remote Data Integrity Checking Protocol Proposed by L. Chen for Cloud Storage.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

JVM-Based Dynamic Attestation in Cloud Computing.
Proceedings of the 13th IEEE International Conference on Trust, 2014

2013
Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage.
J. Zhejiang Univ. Sci. C, 2013

2012
Trusted Bytecode Virtual Machine Module: A Novel Method for Dynamic Remote Attestation in Cloud Computing.
Int. J. Comput. Intell. Syst., 2012

Keys Distributing Optimization of CP-ABE Based Access Control in Cryptographic Cloud Storage.
IEICE Trans. Inf. Syst., 2012

A semantic web service composition dynamic detecting method.
Proceedings of the Seventh International Conference on Digital Information Management, 2012

Attributes Union in CP-ABE Algorithm for Large Universe Cryptographic Access Control.
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012

Re-encryption Optimization in CP-ABE Based Cryptographic Cloud Storage.
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012

2011
VerFAT: A Transparent and Efficient Multi-versioning Mechanism for FAT File System.
Proceedings of the IEEE 10th International Conference on Trust, 2011

SWHash: An Efficient Data Integrity Verification Scheme Appropriate for USB Flash Disk.
Proceedings of the IEEE 10th International Conference on Trust, 2011

An Active Data Leakage Prevention Model for Insider Threat.
Proceedings of the 2nd International Symposium on Intelligence Information Processing and Trusted Computing, 2011

Trusted Bytecode Virtual Machine Module: Towards Dynamic Remote Attestation in Cloud Computing.
Proceedings of the 2nd International Symposium on Intelligence Information Processing and Trusted Computing, 2011

A novel file-level continuous data protection mechanism oriented service application.
Proceedings of the ICIMCS 2011, 2011

Mailbook: privacy-protecting social networking via email.
Proceedings of the ICIMCS 2011, 2011

2008
Research of a Secure File System for Protection of Intellectual Property Right.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

2005
Design and Implementation a TPM Chip SUP320 by SOC.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

Trust-Enhanced Alteration Scenario for Universal Computer.
Proceedings of the 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2005), 2005


  Loading...