Jinbo Xiong

According to our database1, Jinbo Xiong authored at least 47 papers between 2009 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Enhancing Privacy and Availability for Data Clustering in Intelligent Electrical Service of IoT.
IEEE Internet of Things Journal, 2019

An Attribute-Based Assured Deletion Scheme in Cloud Computing.
IJITWE, 2019

Privacy-preserving edge-assisted image retrieval and classification in IoT.
Frontiers Comput. Sci., 2019

Fine-grained multi-authority access control in IoT-enabled mHealth.
Annales des Télécommunications, 2019

Secure Encrypted Data With Authorized Deduplication in Cloud.
IEEE Access, 2019

2018
Achieving Incentive, Security, and Scalable Privacy Protection in Mobile Crowdsensing Services.
Wireless Communications and Mobile Computing, 2018

RSE-PoW: a Role Symmetric Encryption PoW Scheme with Authorized Deduplication for Multimedia Data.
MONET, 2018

Local HMM for indoor positioning based on fingerprinting and displacement ranging.
IET Communications, 2018

MAIM: A Novel Incentive Mechanism Based on Multi-Attribute User Selection in Mobile Crowdsensing.
IEEE Access, 2018

D2D Data Privacy Protection Mechanism Based on Reliability and Homomorphic Encryption.
IEEE Access, 2018

Distributed and Application-Aware Task Scheduling in Edge-Clouds.
Proceedings of the 14th International Conference on Mobile Ad-Hoc and Sensor Networks, 2018

A Novel Data Secure Deletion Scheme for Mobile Devices.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

2017
Efficient Sequential Data Migration Scheme Considering Dying Data for HDD/SSD Hybrid Storage Systems.
IEEE Access, 2017

Privacy Protection-Oriented Mobile Crowdsensing Analysis Based on Game Theory.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Achieving Proof of Shared Ownership for the Shared File in Collaborative Cloud Applications.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

Workload-Aware Page-Level Flash Translation Layer for NAND Flash-Based Storage Systems.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

DPLK-Means: A Novel Differential Privacy K-Means Mechanism.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

2016
History-aware page replacement algorithm for NAND flash-based consumer electronics.
IEEE Trans. Consumer Electronics, 2016

A secure access and associate deleting scheme for multi-replica in multi-cloud environment.
IJHPSA, 2016

Secure, efficient and revocable multi-authority access control system in cloud storage.
Computers & Security, 2016

An efficient CGA algorithm against DoS attack on duplicate address detection process.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

An efficient CGA algorithm against DoS attack on Duplicate Address Detection process.
Proceedings of the IEEE Wireless Communications and Networking Conference Workshops, 2016

A Secure Data Deduplication Scheme Based on Differential Privacy.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

Role and Time-Based Access Control with Efficient Revocation for Cloud Storage.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

A Multi-replica Associated Deleting Scheme in Cloud.
Proceedings of the 10th International Conference on Complex, 2016

2015
Provably secure unbounded multi-authority ciphertext-policy attribute-based encryption.
Security and Communication Networks, 2015

Large universe decentralized key-policy attribute-based encryption.
Security and Communication Networks, 2015

A full lifecycle privacy protection scheme for sensitive data in cloud computing.
Peer-to-Peer Networking and Applications, 2015

Attribute Based Multisignature Scheme for Wireless Communications.
Mobile Information Systems, 2015

A Novel Cyberspace-Oriented Access Control Model.
IACR Cryptology ePrint Archive, 2015

Achieving Lightweight and Secure Access Control in Multi-authority Cloud.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

2014
A Secure Data Self-Destructing Scheme in Cloud Computing.
IEEE Trans. Cloud Computing, 2014

PRIAM: Privacy Preserving Identity and Access Management Scheme in Cloud.
TIIS, 2014

Efficient attribute based sequential aggregate signature for wireless sensor networks.
IJSNet, 2014

Ciphertext-Policy Hierarchical Attribute-based Encryption for Fine-Grained Access Control of Encryption Data.
I. J. Network Security, 2014

Threshold attribute-based encryption with attribute hierarchy for lattices in the standard model.
IET Information Security, 2014

Trustworthy Service Composition in Service-Oriented Mobile Social Networks.
Proceedings of the 2014 IEEE International Conference on Web Services, 2014

2013
Access control requirements for structured document in cloud computing.
IJGUC, 2013

A Secure Document Self-Destruction Scheme with Identity Based Encryption.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Ciphertext-Policy Weighted Attribute Based Encryption for Fine-Grained Access Control.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Fully Secure Decentralized Key-Policy Attribute-Based Encryption.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Personal Health Records Integrity Verification Using Attribute Based Proxy Signature in Cloud Computing.
Proceedings of the Internet and Distributed Computing Systems, 2013

A Secure Document Self-Destruction Scheme: An ABE Approach.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

Attribute Based Multi-signature Scheme in the Standard Model.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

PRAM: privacy preserving access management scheme in cloud services.
Proceedings of the 2013 International Workshop on Security in Cloud Computing, 2013

2012
TNC-eSA: An Echanced Security Access Solution to Office Networks.
Proceedings of the Information Computing and Applications - Third International Conference, 2012

2009
Syncretizing Context Information into the Collaborative Filtering Recommendation.
Proceedings of the First International Workshop on Database Technology and Applications, 2009


  Loading...