Sha Ma

Orcid: 0000-0003-4775-7062

According to our database1, Sha Ma authored at least 47 papers between 1994 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Revocable and verifiable weighted attribute-based encryption with collaborative access for electronic health record in cloud.
Cybersecur., December, 2024

Controllable forward secure identity-based encryption with equality test in privacy-preserving text similarity analysis.
Inf. Sci., March, 2024

Revocable Public Key Encryption with Equality Test without Pairing in Cloud Storage.
Comput. J., February, 2024

An Identity-Based Encryption with Equality Test scheme for healthcare social apps.
Comput. Stand. Interfaces, January, 2024

2023
MTER: An Efficient Multi-User Threshold Equality Retrieval for Double Auction in Smart Grid Market.
IEEE Trans. Inf. Forensics Secur., 2023

Certificateless Public Key Authenticated Encryption with Keyword Search Achieving Stronger Security.
Inf., 2023

Feature Structure Similarity Index for Hybrid Human and Machine Vision.
Proceedings of the IEEE International Conference on Image Processing, 2023

Forward Secure Online/Offline Key Policy Attribute-Based Encryption with Keyword Search.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

Public Key Authenticated Encryption with Keyword Search Improved: Strong Security Model and Multi-keyword Construction.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

2022
Efficient Public Key Encryption With Outsourced Equality Test for Cloud-Based IoT Environments.
IEEE Trans. Inf. Forensics Secur., 2022

2021
Private Set Intersection With Authorization Over Outsourced Encrypted Datasets.
IEEE Trans. Inf. Forensics Secur., 2021

CCA-Almost-Full Anonymous Group Signature with Verifier Local Revocation in the Standard Model.
Comput. J., 2021

Efficient Group ID-Based Encryption With Equality Test Against Insider Attack.
Comput. J., 2021

Functional signatures: new definition and constructions.
Sci. China Inf. Sci., 2021

A CCA-Full-Anonymous Group Signature with Verifiable Controllable Linkability in the Standard Model.
Proceedings of the Provable and Practical Security, 2021

Development of a Rat-Licking Device for Operant Conditioning Experiments.
Proceedings of the ICBBE 2021: 8th International Conference on Biomedical and Bioinformatics Engineering, Kyoto, Japan, November 12, 2021

2020
Group public key encryption with equality test against offline message recovery attack.
Inf. Sci., 2020

A New Framework of IND-CCA Secure Public Key Encryption with Keyword Search.
Comput. J., 2020

Plaintext-Verifiably-Checkable Encryption and Its Extension in Dual-Server Setting.
IEEE Access, 2020

2019
Authorized Equality Test on Identity-Based Ciphertexts for Secret Data Sharing via Cloud Storage.
IEEE Access, 2019

Plaintext-Verifiably-Checkable Encryption.
Proceedings of the Provable Security, 2019

Plaintext-Checkable Encryption with Unlink-CCA Security in the Standard Model.
Proceedings of the Information Security Practice and Experience, 2019

Secure, Efficient and Searchable File System on Distributed Clouds.
Proceedings of the Data Science, 2019

Group ID-Based Encryption with Equality Test.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
Efficient <i>k</i>-out-of-<i>n</i> oblivious transfer scheme with the ideal communication cost.
Theor. Comput. Sci., 2018

Witness-based searchable encryption.
Inf. Sci., 2018

A Generic Scheme of plaintext-checkable database encryption.
Inf. Sci., 2018

Identity-Based Broadcast Encryption for Inner Products.
Comput. J., 2018

Authorized Equality Test of Encrypted Data for Secure Cloud Databases.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A General Two-Server Framework for Ciphertext-Checkable Encryption Against Offline Message Recovery Attack.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
Authorized Equi-join for Multiple Data Contributors in the PKC-Based Setting.
Comput. J., 2017

A General Two-Server Cryptosystem Supporting Complex Queries.
Proceedings of the Information Security Applications - 18th International Conference, 2017

dRMT: Disaggregated Programmable Switching.
Proceedings of the Conference of the ACM Special Interest Group on Data Communication, 2017

ID-Based Encryption with Equality Test Against Insider Attack.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Identity-based encryption with outsourced equality test in cloud computing.
Inf. Sci., 2016

Stand-Alone Unlicensed LTE (SAiL).
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Proxy Signature with Revocation.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization.
IEEE Trans. Inf. Forensics Secur., 2015

Public Key Encryption with Delegated Equality Test in a Multi-User Setting.
Comput. J., 2015

2014
PPGJ: A privacy-preserving general join for outsourced encrypted database.
Secur. Commun. Networks, 2014

2012
Overcoming the information overload problem in a multiform feedback-based virtual reality system for hand motion rehabilitation: healthy subject case study.
Virtual Real., 2012

Multi-Committer Threshold Commitment Scheme from Lattice.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2012

2011
A Privacy-Preserving Join on Outsourced Database.
Proceedings of the Information Security, 14th International Conference, 2011

2010
EMG Biofeedback Based VR System for Hand Rotation and Grasping Rehabilitation.
Proceedings of the 14th International Conference on Information Visualisation, 2010

2009
Overcoming the Information Overload Problem in a Multiform Feedback Based Virtual Reality System for Hand Motion Rehabilitation.
Proceedings of the 2009 International Conference on CyberWorlds, 2009

2007
Hole Filling on Three-Dimensional Surface Texture.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

1994
Energy control and accurate delay estimation in the design of CMOS buffers.
IEEE J. Solid State Circuits, September, 1994


  Loading...