Seguir
Jia XU  (徐佳)
Título
Citado por
Citado por
Ano
Leakage-Resilient Client-side Deduplication of Encrypted Data in Cloud Storage (Old Title: Secure Cloud Storage with Encrypted Data using File-Based Authentication)
J Xu, EC Chang, J Zhou
Cryptology ePrint Archive, Report 2011/538, 0
285*
Weak Leakage-Resilient Client-side Deduplication of Encrypted Data in Cloud Storage
J Xu, EC Chang, J Zhou
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
2842013
Remote integrity check with dishonest storage server
EC Chang, J Xu
Computer Security-ESORICS 2008, 223-237, 2008
1572008
Towards Efficient Proofs of Retrievability
J Xu, EC Chang
AsiaCCS, 2012
1292012
Security concerns in popular cloud storage services
CK Chu, WT Zhu, J Han, JK Liu, J Xu, J Zhou
IEEE Pervasive Computing 12 (4), 50-57, 2013
1242013
Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage
A Yang, J Xu, J Weng, J Zhou, DS Wong
IEEE Transactions on Cloud Computing, 2018
1122018
Passive attacks against searchable encryption
J Ning, J Xu, K Liang, F Zhang, EC Chang
IEEE Transactions on Information Forensics and Security 14 (3), 789-802, 2018
992018
Short redactable signatures using random trees
EC Chang, C Lim, J Xu
Topics in Cryptology–CT-RSA 2009, 133-147, 2009
862009
HAtt: Hybrid Remote Attestation for the Internet of Things with High Availability
MN Aman, MH Basheer, S Dash, JW Wong, J Xu, HW Lim, B Sikdar
IEEE Internet of Things Journal, 2020
632020
ID repetition in Kad
J Yu, C Fang, J Xu, EC Chang, Z Li
Peer-to-Peer Computing, 2009. P2P'09. IEEE Ninth International Conference on …, 2009
442009
Leakage-resilient clientside deduplication of encrypted data in cloud storage. Cryptology ePrint Archive, Report 2011/538
J Xu, E Chang, J Zhou
36*2011
Leakage Resilient Proofs of Ownership in Cloud Storage, Revisited
J Xu, J Zhou
International Conference on Applied Cryptography and Network Security (ACNS …, 2013
282013
Lightweight Delegatable Proofs of Storage
J Xu, A Yang, J Zhou, DS Wong
European Symposium on Research in Computer Security, 324-343, 2016
212016
: Privacy-Preserving Integration and Sharing of Datasets
HW Lim, GS Poh, J Xu, V Chittawar
IEEE Transactions on Information Forensics and Security 15, 564-577, 2019
202019
Auditing the Auditor: Secure Delegation of Auditing Operation over Cloud Storage
J Xu
https://eprint.iacr.org/2011/304, 2011
192011
cuNH: Efficient GPU Implementations of Post-Quantum KEM NewHope
Y Gao, J Xu, H Wang
IEEE Transactions on Parallel and Distributed Systems, 2021
172021
On Directed Transitive Signature.
J Xu
IACR Cryptology ePrint Archive 2009, 209, 2009
132009
Authenticating Aggregate Range Queries over Multidimensional Dataset.
J Xu, EC Chang
IACR Cryptology ePrint Archive 2010, 50, 2010
102010
Towards Efficient Provable Data Possession.
J Xu, EC Chang
IACR Cryptology ePrint Archive 2011, 574, 2011
92011
PSI-Stats: Private Set Intersection Protocols Supporting Secure Statistical Functions
JHM Ying, S Cao, GS Poh, J Xu, HW Lim
Applied Cryptography and Network Security, 585–604, 2022
82022
O sistema não pode efectuar a operação agora. Tente mais tarde.
Artigos 1–20