Jianting Ning

According to our database1, Jianting Ning authored at least 14 papers between 2011 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Passive Attacks Against Searchable Encryption.
IEEE Trans. Information Forensics and Security, 2019

Public auditing for shared cloud data with efficient and secure group management.
Inf. Sci., 2019

2018
Auditable σ-Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing.
IEEE Trans. Information Forensics and Security, 2018

White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively.
IEEE Trans. Dependable Sec. Comput., 2018

Keeping Time-Release Secrets through Smart Contracts.
IACR Cryptology ePrint Archive, 2018

Privacy-preserving personal data operation on mobile cloud - Chances and challenges over advanced persistent threat.
Future Generation Comp. Syst., 2018

2017
An Efficient Key-Policy Attribute-Based Searchable Encryption in Prime-Order Groups.
Proceedings of the Provable Security, 2017

2016
Traceable and revocable CP-ABE with shorter ciphertexts.
SCIENCE CHINA Information Sciences, 2016

Traceable CP-ABE with Short Ciphertexts: How to Catch People Selling Decryption Devices on eBay Efficiently.
Proceedings of the Computer Security - ESORICS 2016, 2016

2015
White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes.
IEEE Trans. Information Forensics and Security, 2015

Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud.
Proceedings of the Computer Security - ESORICS 2015, 2015

2014
Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability.
Proceedings of the Computer Security - ESORICS 2014, 2014

2011
Optimized Approach for Computing Multi-base Chains.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

A Trivariate Polynomial-based Dynamic Key Management Scheme for Wireless Sensor Networks.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011


  Loading...