Jinhua Ma

Orcid: 0000-0002-6870-048X

According to our database1, Jinhua Ma authored at least 20 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Catch me if you can: A Secure Bilateral Access Control System With Anonymous Credentials.
IEEE Trans. Serv. Comput., 2023

An Adaptively Secure and Efficient Data Sharing System for Dynamic User Groups in Cloud.
IEEE Trans. Inf. Forensics Secur., 2023

DilateFormer: Multi-Scale Dilated Transformer for Visual Recognition.
CoRR, 2023

2022
Redactable Blockchain in Decentralized Setting.
IEEE Trans. Inf. Forensics Secur., 2022

Authenticated Data Redaction With Accountability and Transparency.
IEEE Trans. Dependable Secur. Comput., 2022

2021
K-Time Modifiable and Epoch-Based Redactable Blockchain.
IEEE Trans. Inf. Forensics Secur., 2021

Authenticated Medical Documents Releasing with Privacy Protection and Release Control.
IEEE Trans. Dependable Secur. Comput., 2021

Expressive Bilateral Access Control for Internet-of-Things in Cloud-Fog Computing.
Proceedings of the SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies, 2021

Ring Trapdoor Redactable Signatures from Lattice.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021

Revocable Policy-Based Chameleon Hash.
Proceedings of the Computer Security - ESORICS 2021, 2021

2020
Authenticated Data Redaction with Fine-Grained Control.
IEEE Trans. Emerg. Top. Comput., 2020

A universal designated multi verifiers content extraction signature scheme.
Int. J. Comput. Sci. Eng., 2020

A Blockchain-Based Application System for Product Anti-Counterfeiting.
IEEE Access, 2020

An Efficient Public Batch Auditing Scheme for Data Integrity in Standard Model.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

2019
Data Authentication with Privacy Protection.
Proceedings of the Advances in Cyber Security: Principles, Techniques, and Applications., 2019

2018
Dissemination of Authenticated Tree-Structured Data with Privacy Protection and Fine-Grained Control in Outsourced Databases.
Proceedings of the Computer Security, 2018

2017
Protecting Mobile Health Records in Cloud Computing: A Secure, Efficient, and Anonymous Design.
ACM Trans. Embed. Comput. Syst., 2017

An Efficient and Secure Design of Redactable Signature Scheme with Redaction Condition Control.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

2015
Influences of Removable Devices on the Anti-Threat Model: Dynamic Analysis and Control Strategies.
Inf., 2015

Analysis of Two-Worm Interaction Model in Heterogeneous M2M Network.
Inf., 2015


  Loading...