Seguir
Jinyue Xia
Jinyue Xia
Email confirmado em ibm.com
Título
Citado por
Citado por
Ano
Secure key distribution for the smart grid
J Xia, Y Wang
IEEE Transactions on Smart Grid 3 (3), 1437-1443, 2012
2032012
Revocable identity-based broadcast proxy re-encryption for data sharing in clouds
C Ge, Z Liu, J Xia, L Fang
IEEE Transactions on Dependable and Secure Computing 18 (3), 1214-1226, 2019
722019
Secure keyword search and data sharing mechanism for cloud computing
C Ge, W Susilo, Z Liu, J Xia, P Szalachowski, L Fang
IEEE Transactions on Dependable and Secure Computing 18 (6), 2787-2800, 2020
522020
Revocable attribute-based encryption with data integrity in clouds
C Ge, W Susilo, J Baek, Z Liu, J Xia, L Fang
IEEE Transactions on Dependable and Secure Computing, 2021
302021
A verifiable and fair attribute-based proxy re-encryption scheme for data sharing in clouds
C Ge, W Susilo, J Baek, Z Liu, J Xia, L Fang
IEEE Transactions on Dependable and Secure Computing, 2021
242021
A CCA-secure multi-conditional proxy broadcast re-encryption scheme for cloud storage system
Y Liu, Y Ren, C Ge, J Xia, Q Wang
Journal of Information Security and Applications 47, 125-131, 2019
192019
Quantum communication networks and trust management: a survey
S Zhang, Y Chang, L Yan, Z Sheng, F Yang, G Han, Y Huang, J Xia
Comput. Mater. Continua 61 (3), 1145-1174, 2019
182019
A physiological and behavioral feature authentication scheme for medical cloud based on fuzzy-rough core vector machine
L Fang, C Yin, L Zhou, Y Li, C Su, J Xia
Information Sciences 507, 143-160, 2020
162020
Task-attribute-based access control scheme for iot via blockchain
H Chen, W Wan, J Xia, S Zhang, J Zhang, X Peng, X Fan
CMC-COMPUTERS MATERIALS & CONTINUA 65 (3), 2441-2453, 2020
152020
Chosen ciphertext secure fuzzy identity based encryption without ROM
L Fang, J Wang, Y Ren, J Xia, S Bian
Journal of Shanghai Jiaotong University (Science) 13 (6), 646-650, 2008
14*2008
A cluster correlation power analysis against double blinding exponentiation
W Wan, J Chen, S Zhang, J Xia
Journal of Information Security and Applications 48, 102357, 2019
112019
Formal proof of relative strength of security among ECK2007 model and other proof models for key agreement protocols
JY Xia, JD Wang, LM Fang, YJ Ren, SZ Bian
Transactions of Nanjing University of Aeronautics & Astronautics 25 (4), 282-288, 2008
10*2008
Full security: Fuzzy identity based encryption
L Fang, J Xia
Cryptology ePrint Archive, 2008
92008
A new user behavior evaluation method in online social network
M Yang, S Zhang, H Zhang, J Xia
Journal of Information Security and Applications 47, 217-222, 2019
82019
A secure signcryption scheme for electronic health records sharing in blockchain
X Peng, J Zhang, S Zhang, W Wan, H Chen, J Xia
Computer Systems Science and Engineering 37 (2), 265-281, 2021
72021
Instructor perspectives on comparative Heatmap visualizations of student engagement with lecture video
J Xia, DC Wilson
Proceedings of the 49th ACM Technical Symposium on Computer Science …, 2018
72018
Blockchain Queuing Model with Non-Preemptive Limited-Priority
T Li, Y Ren, J Xia
INTELLIGENT AUTOMATION AND SOFT COMPUTING 26 (5), 1111-1122, 2020
62020
Chosen-ciphertext secure multi-authority fuzzy identity-based key encapsulation without rom
L Fang, J Wang, Y Ren, J Xia, S Bian
2008 International Conference on Computational Intelligence and Security 1 …, 2008
52008
A cross-tenant RBAC model for collaborative cloud services
Z Liu, J Xia
Computers, Materials & Continua 60 (1), 395-408, 2019
42019
A source hiding identity-based proxy reencryption scheme for wireless sensor network
C Ge, J Xia, A Wu, H Li, Y Wang
Security and Communication Networks 2018, 2018
42018
O sistema não pode efectuar a operação agora. Tente novamente mais tarde.
Artigos 1–20