Sha Ma

According to our database1, Sha Ma authored at least 28 papers between 2007 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Group public key encryption with equality test against offline message recovery attack.
Inf. Sci., 2020

2019
Authorized Equality Test on Identity-Based Ciphertexts for Secret Data Sharing via Cloud Storage.
IEEE Access, 2019

Plaintext-Verifiably-Checkable Encryption.
Proceedings of the Provable Security, 2019

Plaintext-Checkable Encryption with Unlink-CCA Security in the Standard Model.
Proceedings of the Information Security Practice and Experience, 2019

Secure, Efficient and Searchable File System on Distributed Clouds.
Proceedings of the Data Science, 2019

Group ID-Based Encryption with Equality Test.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
Efficient k-out-of-n oblivious transfer scheme with the ideal communication cost.
Theor. Comput. Sci., 2018

Witness-based searchable encryption.
Inf. Sci., 2018

A Generic Scheme of plaintext-checkable database encryption.
Inf. Sci., 2018

Identity-Based Broadcast Encryption for Inner Products.
Comput. J., 2018

Authorized Equality Test of Encrypted Data for Secure Cloud Databases.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A General Two-Server Framework for Ciphertext-Checkable Encryption Against Offline Message Recovery Attack.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
Authorized Equi-join for Multiple Data Contributors in the PKC-Based Setting.
Comput. J., 2017

A General Two-Server Cryptosystem Supporting Complex Queries.
Proceedings of the Information Security Applications - 18th International Conference, 2017

dRMT: Disaggregated Programmable Switching.
Proceedings of the Conference of the ACM Special Interest Group on Data Communication, 2017

ID-Based Encryption with Equality Test Against Insider Attack.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Identity-based encryption with outsourced equality test in cloud computing.
Inf. Sci., 2016

Stand-Alone Unlicensed LTE (SAiL).
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Proxy Signature with Revocation.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization.
IEEE Trans. Information Forensics and Security, 2015

Public Key Encryption with Delegated Equality Test in a Multi-User Setting.
Comput. J., 2015

2014
PPGJ: A privacy-preserving general join for outsourced encrypted database.
Security and Communication Networks, 2014

2012
Overcoming the information overload problem in a multiform feedback-based virtual reality system for hand motion rehabilitation: healthy subject case study.
Virtual Reality, 2012

Multi-Committer Threshold Commitment Scheme from Lattice.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2012

2011
A Privacy-Preserving Join on Outsourced Database.
Proceedings of the Information Security, 14th International Conference, 2011

2010
EMG Biofeedback Based VR System for Hand Rotation and Grasping Rehabilitation.
Proceedings of the 14th International Conference on Information Visualisation, 2010

2009
Overcoming the Information Overload Problem in a Multiform Feedback Based Virtual Reality System for Hand Motion Rehabilitation.
Proceedings of the 2009 International Conference on CyberWorlds, 2009

2007
Hole Filling on Three-Dimensional Surface Texture.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007


  Loading...