Jin Li

According to our database1, Jin Li authored at least 151 papers between 2006 and 2018.

Collaborative distances :

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
Anonymous and Traceable Group Data Sharing in Cloud Computing.
IEEE Trans. Information Forensics and Security, 2018

Multi-authority fine-grained access control with accountability and its application in cloud.
J. Network and Computer Applications, 2018

Differentially private Naive Bayes learning over multiple data sources.
Inf. Sci., 2018

Computational Intelligence and its Applications in New Computing Models.
Inf. Sci., 2018

Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison attack.
Inf. Sci., 2018

Key-aggregate searchable encryption under multi-owner setting for group data sharing in the cloud.
IJWGS, 2018

Hedged Nonce-Based Public-Key Encryption: Adaptive Security under Randomness Failures.
IACR Cryptology ePrint Archive, 2018

Verifiable searchable encryption with aggregate keys for data sharing system.
Future Generation Comp. Syst., 2018

Internet of Things: Security and privacy in a connected world.
Future Generation Comp. Syst., 2018

Secure attribute-based data sharing for resource-limited users in cloud computing.
Computers & Security, 2018

A Short Linearly Homomorphic Proxy Signature Scheme.
IEEE Access, 2018

Hedged Nonce-Based Public-Key Encryption: Adaptive Security Under Randomness Failures.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

2017
Towards Privacy-Preserving Storage and Retrieval in Multiple Clouds.
IEEE Trans. Cloud Computing, 2017

Privacy-preserving outsourcing of image feature extraction in cloud computing.
Soft Comput., 2017

Model approach to grammatical evolution: deep-structured analyzing of model and representation.
Soft Comput., 2017

Flexible neural trees based early stage identification for IP traffic.
Soft Comput., 2017

Location-Sharing Systems With Enhanced Privacy in Mobile Online Social Networks.
IEEE Systems Journal, 2017

Towards privacy protection and malicious behavior traceability in smart health.
Personal and Ubiquitous Computing, 2017

CDPS: A cryptographic data publishing system.
J. Comput. Syst. Sci., 2017

Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing.
Inf. Sci., 2017

Insight of the protection for data security under selective opening attacks.
Inf. Sci., 2017

FFSSE: Flexible Forward Secure Searchable Encryption with Efficient Performance.
IACR Cryptology ePrint Archive, 2017

Towards achieving flexible and verifiable search for outsourced database in cloud computing.
Future Generation Comp. Syst., 2017

Multi-key privacy-preserving deep learning in cloud computing.
Future Generation Comp. Syst., 2017

Anonymous Announcement System (AAS) for Electric Vehicle in VANETs.
Comput. J., 2017

A Multi-source Homomorphic Network Coding Signature in the Standard Model.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

2016
Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services.
IEEE Trans. Information Forensics and Security, 2016

Hierarchical and Shared Access Control.
IEEE Trans. Information Forensics and Security, 2016

Secure Auditing and Deduplicating Data in Cloud.
IEEE Trans. Computers, 2016

Verifiable Computation over Large Database with Incremental Updates.
IEEE Trans. Computers, 2016

Cloud-based electronic health record system supporting fuzzy keyword search.
Soft Comput., 2016

A secure cloud storage system supporting privacy-preserving fuzzy deduplication.
Soft Comput., 2016

Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing.
Security and Communication Networks, 2016

Anonymous attribute-based proxy re-encryption for access control in cloud computing.
Security and Communication Networks, 2016

Efficient attribute-based data sharing in mobile clouds.
Pervasive and Mobile Computing, 2016

N-Mobishare: new privacy-preserving location-sharing system for mobile online social networks.
Int. J. Comput. Math., 2016

Secure Access Control of E-Health System with Attribute-Based Encryption.
Intelligent Automation & Soft Computing, 2016

Fully secure fuzzy identity-based encryption for secure IoT communications.
Computer Standards & Interfaces, 2016

Efficient Generic Construction of CCA-Secure Identity-Based Encryption from Randomness Extraction.
Comput. J., 2016

Rekeying for Encrypted Deduplication Storage.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

Generic Construction of Publicly Verifiable Predicate Encryption.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
A Hybrid Cloud Approach for Secure Authorized Deduplication.
IEEE Trans. Parallel Distrib. Syst., 2015

Privacy-aware attribute-based PHR sharing with user accountability in cloud computing.
The Journal of Supercomputing, 2015

New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations.
IEEE Trans. Information Forensics and Security, 2015

New Publicly Verifiable Databases with Efficient Updates.
IEEE Trans. Dependable Sec. Comput., 2015

Efficient algorithms for secure outsourcing of bilinear pairings.
Theor. Comput. Sci., 2015

OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices.
IEEE Trans. Cloud Computing, 2015

Identity-Based Encryption with Outsourced Revocation in Cloud Computing.
IEEE Trans. Computers, 2015

Secure Distributed Deduplication Systems with Improved Reliability.
IEEE Trans. Computers, 2015

Designing cloud-based electronic health record system with attribute-based encryption.
Multimedia Tools Appl., 2015

Server-Aided Verification Signature with Privacy for Mobile Computing.
Mobile Information Systems, 2015

L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing.
Knowl.-Based Syst., 2015

Emerging services and technologies in wireless networks.
J. High Speed Networks, 2015

Secure deduplication storage systems supporting keyword search.
J. Comput. Syst. Sci., 2015

New access control systems based on outsourced attribute-based encryption.
Journal of Computer Security, 2015

Universal designated verifier transitive signatures for graph-based big data.
Inf. Sci., 2015

Special Issue: Advances in Secure Data Streaming Systems.
Informatica (Slovenia), 2015

New attribute-based authentication and its application in anonymous cloud access service.
IJWGS, 2015

Refereed Computation Delegation of Private Sequence Comparison in Cloud Computing.
I. J. Network Security, 2015

Cloud Computing: Security, Privacy and Practice.
Future Generation Comp. Syst., 2015

Towards secure and reliable cloud storage against data re-outsourcing.
Future Generation Comp. Syst., 2015

A First Look at Android Malware Traffic in First Few Minutes.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A Video Deduplication Scheme with Privacy Preservation in IoT.
Proceedings of the Computational Intelligence and Intelligent Systems, 2015

Verifiable Search for Dynamic Outsourced Database in Cloud Computing.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

A New Secure Data Deduplication Approach Supporting User Traceability.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

General Multi-key Searchable Encryption.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

2014
Securely Outsourcing Attribute-Based Encryption with Checkability.
IEEE Trans. Parallel Distrib. Syst., 2014

Further Observations on Smart-Card-Based Password-Authenticated Key Agreement in Distributed Systems.
IEEE Trans. Parallel Distrib. Syst., 2014

Secure Outsourced Attribute-Based Signatures.
IEEE Trans. Parallel Distrib. Syst., 2014

Secure Deduplication with Efficient and Reliable Convergent Key Management.
IEEE Trans. Parallel Distrib. Syst., 2014

New Algorithms for Secure Outsourcing of Modular Exponentiations.
IEEE Trans. Parallel Distrib. Syst., 2014

An efficient PHR service system supporting fuzzy keyword search and fine-grained access control.
Soft Comput., 2014

{MobiShare}+: Security Improved System for Location Sharing in Mobile Online Social Networks.
J. Internet Serv. Inf. Secur., 2014

SQL-Based Fuzzy Query Mechanism Over Encrypted Database.
IJDWM, 2014

Attribute-Based Data Sharing with Flexible and Direct Revocation in Cloud Computing.
TIIS, 2014

Identity-based chameleon hashing and signatures without key exposure.
Inf. Sci., 2014

Advances in Security and Privacy in Sensor Networks.
IJDSN, 2014

Privacy-preserving data utilization in hybrid clouds.
Future Generation Comp. Syst., 2014

Digital provenance: Enabling secure data forensics in cloud computing.
Future Generation Comp. Syst., 2014

New and efficient conditional e-payment systems with transferability.
Future Generation Comp. Syst., 2014

A short non-delegatable strong designated verifier signature.
Frontiers Comput. Sci., 2014

Enabling efficient and secure data sharing in cloud computing.
Concurrency and Computation: Practice and Experience, 2014

Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks.
Computer Networks, 2014

Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts.
Proceedings of the Provable Security - 8th International Conference, 2014

TIMER: Secure and Reliable Cloud Storage against Data Re-outsourcing.
Proceedings of the Information Security Practice and Experience, 2014

Multi-key Searchable Encryption without Random Oracle.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014

A Verifiable Data Deduplication Scheme in Cloud Computing.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014

M-SRS: Secure and Trustworthy Mobile Service Review System Based on Mobile Cloudlet.
Proceedings of the Information and Communication Technology, 2014

Convergent Dispersal: Toward Storage-Efficient Security in a Cloud-of-Clouds.
Proceedings of the 6th USENIX Workshop on Hot Topics in Cloud Computing, 2014

Verifiable Computation over Large Database with Incremental Updates.
Proceedings of the Computer Security - ESORICS 2014, 2014

Efficient and Verifiable Algorithm for Secure Outsourcing of Large-scale Linear Programming.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

Secure Deduplication Storage Systems with Keyword Search.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

TMDS: Thin-Model Data Sharing Scheme Supporting Keyword Search in Cloud Storage.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

Secure Personal Health Record System with Attribute-Based Encryption in Cloud Computing.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

2013
An Efficient Ciphertext-Policy Attribute-Based Access Control towards Revocation in Cloud Computing.
J. UCS, 2013

Efficient verifiable fuzzy keyword search over encrypted data in cloud computing.
Comput. Sci. Inf. Syst., 2013

Outsourcing computation of modular exponentiations in cloud computing.
Cluster Computing, 2013

Efficient Multi-User Keyword Search over Encrypted Data in Cloud Computing.
Computing and Informatics, 2013

Secure Storage and Fuzzy Query over Encrypted Databases.
Proceedings of the Network and System Security - 7th International Conference, 2013

FDR-ABE: Attribute-Based Encryption with Flexible and Direct Revocation.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

An Efficient Proof of Retrievability with Public Auditing in Cloud Computing.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption.
Proceedings of the Computer Security - ESORICS 2013, 2013

Verifiable Evaluation of Private Polynomials.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

Server-Aided Hierarchical Identity-Based Encryption.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

Anonymous attribute-based encryption supporting efficient decryption test.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

New Privacy-Preserving Location Sharing System for Mobile Online Social Networks.
Proceedings of the Eighth International Conference on P2P, 2013

2012
Efficient Fair Conditional Payments for Outsourcing Computations.
IEEE Trans. Information Forensics and Security, 2012

A New Efficient Verifiable Fuzzy Keyword Search Scheme.
JoWUA, 2012

A Verifiable Fuzzy Keyword Search Scheme Over Encrypted Data.
J. Internet Serv. Inf. Secur., 2012

Generic security-amplifying methods of ordinary digital signatures.
Inf. Sci., 2012

Secure Outsourced Attribute-Based Signatures.
IACR Cryptology ePrint Archive, 2012

Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid Cloud.
Proceedings of the Network and System Security - 6th International Conference, 2012

Efficient and Secure Batch Exponentiations Outsourcing in Cloud Computing.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

A Novel Framework for Outsourcing and Sharing Searchable Encrypted Data on Hybrid Cloud.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Deniably Information-Hiding Encryptions Secure against Adaptive Chosen Ciphertext Attack.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Outsourcing Encryption of Attribute-Based Encryption with MapReduce.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

New Algorithms for Secure Outsourcing of Modular Exponentiations.
Proceedings of the Computer Security - ESORICS 2012, 2012

A Short Non-delegatable Strong Designated Verifier Signature.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012

2011
Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing.
IEEE Trans. Parallel Distrib. Syst., 2011

Identity-based trapdoor mercurial commitments and applications.
Theor. Comput. Sci., 2011

Enhancing Attribute-Based Encryption with Attribute Hierarchy.
MONET, 2011

Multi-authority ciphertext-policy attribute-based encryption with accountability.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Toward publicly auditable secure cloud data storage services.
IEEE Network, 2010

Hidden attribute-based signatures without anonymity revocation.
Inf. Sci., 2010

Fuzzy Keyword Search over Encrypted Data in Cloud Computing.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Secure Ranked Keyword Search over Encrypted Cloud Data.
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010

Trusted Data Sharing over Untrusted Cloud Storage Providers.
Proceedings of the Cloud Computing, Second International Conference, 2010

Fine-Grained Data Access Control Systems with User Accountability in Cloud Computing.
Proceedings of the Cloud Computing, Second International Conference, 2010

Attribute-based signature and its applications.
Proceedings of the 5th ACM Symposium on Information, 2010

Identity-Based Chameleon Hash Scheme without Key Exposure.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010

2009
Defending Against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems.
IACR Cryptology ePrint Archive, 2009

Enabling Public Verifiability and Data Dynamics for Storage Security.
IACR Cryptology ePrint Archive, 2009

Enhancing Attribute-based Encryption with Attribute Hierarchy.
IACR Cryptology ePrint Archive, 2009

Enabling Efficient Fuzzy Keyword Search over Encrypted Data in Cloud Computing.
IACR Cryptology ePrint Archive, 2009

Privacy-aware Attribute-based Encryption with User Accountability.
IACR Cryptology ePrint Archive, 2009

A2BE: Accountable Attribute-Based Encryption for Abuse Free Access Control.
IACR Cryptology ePrint Archive, 2009

Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems.
Proceedings of the Security and Privacy in Communication Networks, 2009

Privacy-Aware Attribute-Based Encryption with User Accountability.
Proceedings of the Information Security, 12th International Conference, 2009

Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing.
Proceedings of the Computer Security, 2009

2008
Generic Transformation from Weakly to Strongly Unforgeable Signatures.
J. Comput. Sci. Technol., 2008

Attribute-Based Ring Signatures.
IACR Cryptology ePrint Archive, 2008

Generic Security-Amplifying Methods of Ordinary Digital Signatures.
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008

2007
Practical Threshold Signatures Without Random Oracles.
Proceedings of the Provable Security, 2007

Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature.
Proceedings of the Provable Security, 2007

2006
A New Hierarchical ID-Based Cryptosystem and CCA-Secure PKE.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

A Strong Identity Based Key-Insulated Cryptosystem.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

Generalization of the Selective-ID Security Model for HIBS Protocols.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

Proxy Ring Signature: Formal Definitions, Efficient Construction and New Variant.
Proceedings of the Computational Intelligence and Security, International Conference, 2006


  Loading...