Shuo Qiu

Orcid: 0000-0002-4955-8166

According to our database1, Shuo Qiu authored at least 19 papers between 2013 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Comments on a dynamic cloud data integrity verification scheme: security analysis and improvement.
Int. J. Secur. Networks, 2023

2022
Towards Public Integrity Audition for Cloud-IoT Data Based on Blockchain.
Comput. Syst. Sci. Eng., 2022

Research on Attribute-Based Privacy-Preserving Computing Technologies.
Proceedings of the Big Data and Security - 4th International Conference, 2022

2021
Delegated Key-Policy Attribute-Based Set Intersection over Outsourced Encrypted Data Sets for CloudIoT.
Secur. Commun. Networks, 2021

PUF-Based Mutual-Authenticated Key Distribution for Dynamic Sensor Networks.
Secur. Commun. Networks, 2021

2020
Toward Practical Privacy-Preserving Frequent Itemset Mining on Encrypted Cloud Data.
IEEE Trans. Cloud Comput., 2020

2019
Locally private Jaccard similarity estimation.
Concurr. Comput. Pract. Exp., 2019

PPSI: Practical Private Set Intersection Over Large-Scale Datasets.
Proceedings of the 2019 IEEE SmartWorld, 2019

Public Data Integrity Checking for Cloud Storage with Privacy Preserving.
Proceedings of the 19th IEEE International Conference on Communication Technology, 2019

An Efficient Lattice-Based IBE Scheme Using Combined Public Key.
Proceedings of the Big Data and Security - First International Conference, 2019

Authentication and Key Distribution Scheme for Two-Tiered IoT Based on PUF.
Proceedings of the Fuzzy Systems and Data Mining V, 2019

2018
CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles.
IEEE Trans. Intell. Transp. Syst., 2018

Identity-Based Private Matching over Outsourced Encrypted Datasets.
IEEE Trans. Cloud Comput., 2018

2017
PrivMin: Differentially Private MinHash for Jaccard Similarity Computation.
CoRR, 2017

Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack.
Sci. China Inf. Sci., 2017

Stereo Saliency Analysis Based on Disparity Influence and Spatial Dissimilarity.
Proceedings of the Advances in Multimedia Information Processing - PCM 2017, 2017

2016
Deterministic attribute-based encryption.
Int. J. High Perform. Comput. Netw., 2016

Fast, Private and Verifiable: Server-aided Approximate Similarity Computation over Large-Scale Datasets.
Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, 2016

2013
Identity-Based Symmetric Private Set Intersection.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013


  Loading...