Jing Qin

According to our database1, Jing Qin authored at least 29 papers between 2008 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 



On csauthors.net:


Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage.
IEEE Trans. Information Forensics and Security, 2019

Fuzzy matching: multi-authority attribute searchable encryption without central authority.
Soft Comput., 2019

A Secure and Efficient Data Sharing and Searching Scheme in Wireless Sensor Networks.
Sensors, 2019

A Secure Data Sharing Scheme with Designated Server.
Security and Communication Networks, 2019

A Lightweight Identity-Based Cloud Storage Auditing Supporting Proxy Update and Workload-Based Payment.
Security and Communication Networks, 2019

Confidentiality-Preserving Publicly Verifiable Computation Schemes for Polynomial Evaluation and Matrix-Vector Multiplication.
Security and Communication Networks, 2018

Confidentiality-Preserving Publicly Verifiable Computation.
Int. J. Found. Comput. Sci., 2017

Key negotiation schemes for body sensor networks on the surface of the human body.
IJAACS, 2017

A confidentiality preserving publicly verifiable computation for multivariate polynomials.
Proceedings of the 15th IEEE International Conference on Software Engineering Research, 2017

The Public Verifiability of Public Key Encryption with Keyword Search.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017

Securely Outsourcing Decentralized Multi-authority Attribute Based Signature.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Threshold attribute-based signcryption and its application to authenticated key agreement.
Security and Communication Networks, 2016

Secure searches in the cloud: A survey.
Future Generation Comp. Syst., 2016

A secure biometric authentication based on PEKS.
Concurrency and Computation: Practice and Experience, 2016

Multi-Authority Attribute-Based Encryption Scheme from Lattices.
J. UCS, 2015

Lattice-based threshold cryptography and its applications in distributed cloud computing.
IJHPCN, 2015

Securing Body Sensor Networks with Biometric Methods: A New Key Negotiation Method and a Key Sampling Method for Linear Interpolation Encryption.
IJDSN, 2015

Threshold Attribute-Based Signcryption in Standard Model.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

A new Lagrange solution to the privacy-preserving general geometric intersection problem.
J. Network and Computer Applications, 2014

A Function Private Attribute-Based Encryption.
IJDSN, 2014

An Energy Efficient Key Management Scheme for Body Sensor Networks.
IEEE Trans. Parallel Distrib. Syst., 2013

A Key Management Scheme between Body Sensor Networks and the Base Station.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

A General Construction of Sequences with Good Autocorrelation over the 16-QAM Constellation.
IEICE Transactions, 2012

Hashed Random Key Pre-distribution Scheme for Large Heterogeneous Sensor Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Simulatable Oblivious Transfer Protocols Based on Blind Signature.
Proceedings of the 11th IEEE International Conference on Trust, 2012

A Hash Chains Based Key Management Scheme for Wireless Sensor Networks.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

A General Transformation from KP-ABE to Searchable Encryption.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

k out of n Oblivious Transfer Protocols from Bilinear Pairings.
JSW, 2010

Converters for Designing Applied Cryptographic Protocols.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008