Ximing Li

Orcid: 0000-0003-4022-1273

Affiliations:
  • South China Agricultural University, Guangzhou, China


According to our database1, Ximing Li authored at least 19 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Revocable and verifiable weighted attribute-based encryption with collaborative access for electronic health record in cloud.
Cybersecur., December, 2024

2021
The FRCK clustering algorithm for determining cluster number and removing outliers automatically.
Int. J. Comput. Sci. Eng., 2021

Efficient Group ID-Based Encryption With Equality Test Against Insider Attack.
Comput. J., 2021

A CCA-Full-Anonymous Group Signature with Verifiable Controllable Linkability in the Standard Model.
Proceedings of the Provable and Practical Security, 2021

2020
Group public key encryption with equality test against offline message recovery attack.
Inf. Sci., 2020

2019
Accumulating automata and cascaded equations automata for communicationless information theoretically secure multi-party computation.
Theor. Comput. Sci., 2019

Plaintext-Verifiably-Checkable Encryption.
Proceedings of the Provable Security, 2019

Secure, Efficient and Searchable File System on Distributed Clouds.
Proceedings of the Data Science, 2019

Group ID-Based Encryption with Equality Test.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
A General Two-Server Framework for Ciphertext-Checkable Encryption Against Offline Message Recovery Attack.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Secure File Storage System Among Distributed Public Clouds.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2016
Magnifying computing gaps: Establishing encrypted communication over unidirectional channels.
Theor. Comput. Sci., 2016

2015
Accumulating Automata and Cascaded Equations Automata for Communicationless Information Theoretically Secure Multi-Party Computation: Extended Abstract.
Proceedings of the 3rd International Workshop on Security in Cloud Computing, 2015

SSSDB: Database with Private Information Search.
Proceedings of the Algorithmic Aspects of Cloud Computing - First International Workshop, 2015

2013
Design and Implementation of a Flexible Workflow Management System.
J. Softw., 2013

A Solution for Privacy-Preserving Data Manipulation and Query on NoSQL Database.
J. Comput., 2013

2012
Multi-Committer Threshold Commitment Scheme from Lattice.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2012

Nested Merkle's Puzzles against Sampling Attacks.
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012

2009
Fuzzy Identity Based Encryption Scheme with Some Assigned Attributes.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009


  Loading...