According to our database1, Sha Ma authored at least 28 papers between 2007 and 2020.
Legend:Book In proceedings Article PhD thesis Other
Group public key encryption with equality test against offline message recovery attack.
Inf. Sci., 2020
Authorized Equality Test on Identity-Based Ciphertexts for Secret Data Sharing via Cloud Storage.
IEEE Access, 2019
Proceedings of the Provable Security, 2019
Plaintext-Checkable Encryption with Unlink-CCA Security in the Standard Model.
Proceedings of the Information Security Practice and Experience, 2019
Secure, Efficient and Searchable File System on Distributed Clouds.
Proceedings of the Data Science, 2019
Group ID-Based Encryption with Equality Test.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
Efficient k-out-of-n oblivious transfer scheme with the ideal communication cost.
Theor. Comput. Sci., 2018
Witness-based searchable encryption.
Inf. Sci., 2018
A Generic Scheme of plaintext-checkable database encryption.
Inf. Sci., 2018
Identity-Based Broadcast Encryption for Inner Products.
Comput. J., 2018
Authorized Equality Test of Encrypted Data for Secure Cloud Databases.
Proceedings of the 17th IEEE International Conference On Trust, 2018
A General Two-Server Framework for Ciphertext-Checkable Encryption Against Offline Message Recovery Attack.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Authorized Equi-join for Multiple Data Contributors in the PKC-Based Setting.
Comput. J., 2017
A General Two-Server Cryptosystem Supporting Complex Queries.
Proceedings of the Information Security Applications - 18th International Conference, 2017
dRMT: Disaggregated Programmable Switching.
Proceedings of the Conference of the ACM Special Interest Group on Data Communication, 2017
ID-Based Encryption with Equality Test Against Insider Attack.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
Identity-based encryption with outsourced equality test in cloud computing.
Inf. Sci., 2016
Stand-Alone Unlicensed LTE (SAiL).
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Proxy Signature with Revocation.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization.
IEEE Trans. Information Forensics and Security, 2015
Public Key Encryption with Delegated Equality Test in a Multi-User Setting.
Comput. J., 2015
PPGJ: A privacy-preserving general join for outsourced encrypted database.
Security and Communication Networks, 2014
Overcoming the information overload problem in a multiform feedback-based virtual reality system for hand motion rehabilitation: healthy subject case study.
Virtual Reality, 2012
Multi-Committer Threshold Commitment Scheme from Lattice.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2012
A Privacy-Preserving Join on Outsourced Database.
Proceedings of the Information Security, 14th International Conference, 2011
EMG Biofeedback Based VR System for Hand Rotation and Grasping Rehabilitation.
Proceedings of the 14th International Conference on Information Visualisation, 2010
Overcoming the Information Overload Problem in a Multiform Feedback Based Virtual Reality System for Hand Motion Rehabilitation.
Proceedings of the 2009 International Conference on CyberWorlds, 2009
Hole Filling on Three-Dimensional Surface Texture.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007