Jun Shao

According to our database1, Jun Shao authored at least 101 papers between 1988 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage.
IEEE Trans. Information Forensics and Security, 2018

Secure Outsourced Computation in Connected Vehicular Cloud Computing.
IEEE Network, 2018

Data Security and Privacy in Fog Computing.
IEEE Network, 2018

Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) Security.
IACR Cryptology ePrint Archive, 2018

CCA-secure ABE with outsourced decryption for fog computing.
Future Generation Comp. Syst., 2018

A Privacy-Preserving Online Medical Prediagnosis Scheme for Cloud Environment.
IEEE Access, 2018

A New Design of Online/Offline Signatures Based on Lattice.
Proceedings of the Information Security Practice and Experience, 2018

Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) Security.
Proceedings of the Computer Security, 2018

2017
REPLACE: A Reliable Trust-Based Platoon Service Recommendation Scheme in VANET.
IEEE Trans. Vehicular Technology, 2017

Cost-effective privacy-preserving vehicular urban sensing system.
Personal and Ubiquitous Computing, 2017

Approximate conditional likelihood for generalized linear models with general missing data mechanism.
J. Systems Science & Complexity, 2017

Preface - Special issue to celebrate the 30th anniversary of Journal of Systems Science and Complexity.
J. Systems Science & Complexity, 2017

LDSCD: A loss and DoS resistant secure code dissemination algorithm supporting multiple authorized tenants.
Inf. Sci., 2017

A Privacy-Preserving Data-Sharing Framework for Smart Grid.
IEEE Internet of Things Journal, 2017

Minimal logarithmic signatures for one type of classical groups.
Appl. Algebra Eng. Commun. Comput., 2017

Hidden-Token Searchable Public-Key Encryption.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Efficient Certificate-Based Signature and Its Aggregation.
Proceedings of the Information Security Practice and Experience, 2017

Too Much of a Good Thing: Downsides of a Large Network in Tech Firms and Mitigating Effects of Political Skills.
Proceedings of the International Conference on Information Systems, 2017

2016
A Threshold Anonymous Authentication Protocol for VANETs.
IEEE Trans. Vehicular Technology, 2016

Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases.
IEEE Trans. Information Forensics and Security, 2016

Secure bidirectional proxy re-encryption for cryptographic cloud storage.
Pervasive and Mobile Computing, 2016

Cooperation Dynamics on Mobile Crowd Networks of Device-to-Device Communications.
Mobile Information Systems, 2016

Iterated imputation estimation for generalized linear models with missing response and covariate values.
Computational Statistics & Data Analysis, 2016

Public Key Encryption in Non-Abelian Groups.
CoRR, 2016

EPPD: Efficient and privacy-preserving proximity testing with differential privacy techniques.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

FSSR: Fine-Grained EHRs Sharing via Similarity-Based Recommendation in Cloud-Assisted eHealthcare System.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Chosen Ciphertext Secure Attribute-Based Encryption with Outsourced Decryption.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Preface to special issue on miscellaneous emerging security problems.
ICST Trans. Security Safety, 2015

Obtain confidentiality or/and authenticity in Big Data by ID-based generalized signcryption.
Inf. Sci., 2015

Efficient multiple sources network coding signature in the standard model.
Concurrency and Computation: Practice and Experience, 2015

Big data challenges in China centre for resources satellite data and application.
Proceedings of the 7th Workshop on Hyperspectral Image and Signal Processing: Evolution in Remote Sensing, 2015

Fine-grained data sharing in cloud computing for mobile devices.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

A New Optimization Algorithm for HEVC.
Proceedings of the Image and Graphics - 8th International Conference, 2015

New threshold anonymous authentication for VANETs.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

Land cover change detection of Ezhou Huarong district based on multi-temporal ZY-3 satellite images.
Proceedings of the 23rd International Conference on Geoinformatics, 2015

2014
Toward efficient and privacy-preserving computing in big data era.
IEEE Network, 2014

EFADS: Efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption.
J. Comput. Syst. Sci., 2014

Efficient verifiable multi-secret sharing scheme based on hash function.
Inf. Sci., 2014

RCCA-Secure Multi-use Bidirectional Proxy Re-encryption with Master Secret Security.
Proceedings of the Provable Security - 8th International Conference, 2014

FINE: A fine-grained privacy-preserving location-based service framework for mobile devices.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

PLAM: A privacy-preserving framework for local-area mobile social networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

2013
CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring.
IEEE Trans. Information Forensics and Security, 2013

Certificate-based proxy decryption systems with revocability in the standard model.
Inf. Sci., 2013

A novel compound regularization and fast algorithm for compressive sensing deconvolution.
Neurocomputing, 2013

New Efficient Identity-Based Encryption From Factorization.
IACR Cryptology ePrint Archive, 2013

More Efficient Cryptosystems From k-th Power Residues.
IACR Cryptology ePrint Archive, 2013

Multiple Sources Network Coding Signature in the Standard Model.
Proceedings of the Internet and Distributed Computing Systems, 2013

2012
Investigation of Atrial Vulnerability by Analysis of the Sinus Node EG From Atrial Fibrillation Models Using a Phase Synchronization Method.
IEEE Trans. Biomed. Engineering, 2012

Anonymous proxy re-encryption.
Security and Communication Networks, 2012

Achieving key privacy without losing CCA security in proxy re-encryption.
Journal of Systems and Software, 2012

Efficient Certificateless Authenticated Asymmetric Group Key Agreement Protocol.
TIIS, 2012

Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption.
Inf. Sci., 2012

Low-power programmable linear-phase filter designed for fully balanced bio-signal recording application.
IEICE Electronic Express, 2012

A novel single event upset hardened CMOS SRAM cell.
IEICE Electronic Express, 2012

Micro-film Marketing of Chinese Tourism Destinations via Social Media: The Case of Shaoxing.
Proceedings of the 14th IEEE International Conference on Commerce and Enterprise Computing, 2012

Anonymous ID-Based Proxy Re-Encryption.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012

2011
SCCR: a generic approach to simultaneously achieve CCA security and collusion-resistance in proxy re-encryption.
Security and Communication Networks, 2011

Compounded Regularization and Fast Algorithm for Compressive Sensing Deconvolution.
Proceedings of the Sixth International Conference on Image and Graphics, 2011

Unidirectional Identity-Based Proxy Re-Signature.
Proceedings of IEEE International Conference on Communications, 2011

Identity-Based Conditional Proxy Re-Encryption.
Proceedings of IEEE International Conference on Communications, 2011

Multi-Use Unidirectional Proxy Re-Encryption.
Proceedings of IEEE International Conference on Communications, 2011

Novel conic-based group signature scheme with revocation.
Proceedings of the Eighth International Conference on Fuzzy Systems and Knowledge Discovery, 2011

Efficient and secure electronic resume using smart cards.
Proceedings of the Eighth International Conference on Fuzzy Systems and Knowledge Discovery, 2011

1-out-of-2 signature.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Proxy re-encryption with keyword search.
Inf. Sci., 2010

Secure threshold multi authority attribute based encryption without a central authority.
Inf. Sci., 2010

CCA-Secure PRE Scheme without Random Oracles.
IACR Cryptology ePrint Archive, 2010

Looking Does not Automatically Lead to Booking: Analysis of Clickstreams on a Chinese Travel Agency Website.
Proceedings of the Information and Communication Technologies in Tourism, 2010

New Constructions of Public-Key Encryption Schemes from Conjugacy Search Problems.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010

How to Construct State Registries-Matching Undeniability with Public Security.
Proceedings of the Intelligent Information and Database Systems, 2010

CCA-Secure Type-based Proxy Re-encryption with Invisible Proxy.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
New Cryptosystems From CSP-Based Self-Distributive Systems.
IACR Cryptology ePrint Archive, 2009

CCA-Secure Proxy Re-Encryption without Pairings.
IACR Cryptology ePrint Archive, 2009

CCA-Secure Proxy Re-encryption without Pairings.
Proceedings of the Public Key Cryptography, 2009

Attribute based proxy re-encryption with delegating capabilities.
Proceedings of the 2009 ACM Symposium on Information, 2009

2008
New (t, n) threshold directed signature scheme with provable security.
Inf. Sci., 2008

An evaluation of the Dental 3D Multimedia System on dentist-patient interactions: A report from China.
I. J. Medical Informatics, 2008

Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority.
Proceedings of the Progress in Cryptology, 2008

Collaborative geospatial web services for multi-dimension remote sensing data.
Proceedings of the Third IEEE International Conference on Digital Information Management (ICDIM), 2008

2007
Improvement of Yang et al.'s threshold proxy signature scheme.
Journal of Systems and Software, 2007

On Security of Two Nonrepudiable Threshold Multi-proxy Multi-signature Schemes with Shared Verification.
I. J. Network Security, 2007

Proxy Re-Signature Schemes without Random Oracles.
IACR Cryptology ePrint Archive, 2007

Efficient Password-based Authenticated Key Exchange without Public Information.
IACR Cryptology ePrint Archive, 2007

Short Group Signature without Random Oracles.
IACR Cryptology ePrint Archive, 2007

An Efficient Certified Email Protocol.
Proceedings of the Information Security, 10th International Conference, 2007

A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power.
Proceedings of the Progress in Cryptology, 2007

Proxy Re-signature Schemes Without Random Oracles.
Proceedings of the Progress in Cryptology, 2007

Short Group Signature Without Random Oracles.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

A Burst Scheduling Access Reordering Mechanism.
Proceedings of the 13st International Conference on High-Performance Computer Architecture (HPCA-13 2007), 2007

Efficient Password-Based Authenticated Key Exchange Without Public Information.
Proceedings of the Computer Security, 2007

2006
An improved deniable authentication protocol.
Networks, 2006

Efficient ID-based Threshold Signature Schemes without Pairings.
IACR Cryptology ePrint Archive, 2006

A traceable threshold signature scheme with multiple signing policies.
Computers & Security, 2006

Family Cars' Life Cycle Cost (LCC) Estimation Model Based on the Neural Network Ensemble.
Proceedings of the Knowledge Enterprise: Intelligent Strategies in Product Design, 2006

Non-gaussian statistical parameter modeling for SSTA with confidence interval analysis.
Proceedings of the 2006 International Symposium on Physical Design, 2006

2005
Pairing-Based Two-Party Authenticated Key Agreement Protocol.
IACR Cryptology ePrint Archive, 2005

A new efficient (t, n) verifiable multi-secret sharing (VMSS) based on YCH scheme.
Applied Mathematics and Computation, 2005

The Bit-reversal SDRAM Address Mapping.
Proceedings of the 9th International Workshop on Software and Compilers for Embedded Systems, Dallas, Texas, USA, September 29, 2005

1997
Weighted Jackknife-after-Bootstrap: A Heuristic Approach.
Proceedings of the 29th conference on Winter simulation, 1997

1988
A Knowledge-Based Query Optimization System.
Proceedings of the IFIP TC2/TC8/WG 2.6/WG 8.1 Working Conference on the Role of Artificial Intelligence in Databases and Information Systems, 1988


  Loading...