Seguir
Jinyue Xia
Jinyue Xia
Afiliação desconhecida
Email confirmado em ibm.com
Título
Citado por
Citado por
Ano
Secure key distribution for the smart grid
J Xia, Y Wang
IEEE Transactions on Smart Grid 3 (3), 1437-1443, 2012
2222012
Revocable identity-based broadcast proxy re-encryption for data sharing in clouds
C Ge, Z Liu, J Xia, L Fang
IEEE Transactions on Dependable and Secure Computing 18 (3), 1214-1226, 2019
1092019
Secure keyword search and data sharing mechanism for cloud computing
C Ge, W Susilo, Z Liu, J Xia, P Szalachowski, L Fang
IEEE Transactions on Dependable and Secure Computing 18 (6), 2787-2800, 2020
862020
Revocable attribute-based encryption with data integrity in clouds
C Ge, W Susilo, J Baek, Z Liu, J Xia, L Fang
IEEE Transactions on Dependable and Secure Computing 19 (5), 2864-2872, 2021
712021
A verifiable and fair attribute-based proxy re-encryption scheme for data sharing in clouds
C Ge, W Susilo, J Baek, Z Liu, J Xia, L Fang
IEEE Transactions on Dependable and Secure Computing 19 (5), 2907-2919, 2021
492021
A CCA-secure multi-conditional proxy broadcast re-encryption scheme for cloud storage system
Y Liu, Y Ren, C Ge, J Xia, Q Wang
Journal of Information Security and Applications 47, 125-131, 2019
252019
Quantum communication networks and trust management: a survey
S Zhang, Y Chang, L Yan, Z Sheng, F Yang, G Han, Y Huang, J Xia
Comput. Mater. Continua 61 (3), 1145-1174, 2019
222019
A physiological and behavioral feature authentication scheme for medical cloud based on fuzzy-rough core vector machine
L Fang, C Yin, L Zhou, Y Li, C Su, J Xia
Information Sciences 507, 143-160, 2020
212020
Task-attribute-based access control scheme for iot via blockchain
H Chen, W Wan, J Xia, S Zhang, J Zhang, X Peng, X Fan
CMC-COMPUTERS MATERIALS & CONTINUA 65 (3), 2441-2453, 2020
162020
Chosen ciphertext secure fuzzy identity based encryption without ROM
L Fang, J Wang, Y Ren, J Xia, S Bian
Journal of Shanghai Jiaotong University (Science) 13, 646-650, 2008
14*2008
A cluster correlation power analysis against double blinding exponentiation
W Wan, J Chen, S Zhang, J Xia
Journal of Information Security and Applications 48, 102357, 2019
122019
Blockchain Queuing Model with Non-Preemptive Limited-Priority.
T Li, Y Ren, J Xia
Intelligent Automation & Soft Computing 26 (5), 2020
112020
Instructor perspectives on comparative Heatmap visualizations of student engagement with lecture video
J Xia, DC Wilson
Proceedings of the 49th ACM Technical Symposium on Computer Science …, 2018
112018
Full security: Fuzzy identity based encryption
L Fang, J Xia
Cryptology ePrint Archive, 2008
112008
Long-term preservation of electronic record based on digital continuity in smart cities
Y Ren, K Zhu, Y Gao, J Xia, S Zhou, R Hu, X Feng
CMC-COMPUTERS MATERIALS & CONTINUA 66 (3), 3271-3287, 2021
92021
A new user behavior evaluation method in online social network
M Yang, S Zhang, H Zhang, J Xia
Journal of Information Security and Applications 47, 217-222, 2019
92019
Formal proof of relative strength of security among ECK2007 model and other proof models for key agreement protocols
JY Xia, JD Wang, LM Fang, YJ Ren, SZ Bian
Transactions of Nanjing University of Aeronautics & Astronautics 25 (4), 282-288, 2008
9*2008
A secure signcryption scheme for electronic health records sharing in blockchain
X Peng, J Zhang, S Zhang, W Wan, H Chen, J Xia
Computer Systems Science and Engineering 37 (2), 265-281, 2021
72021
A face recognition algorithm based on LBP-EHMM
T Li, L Wang, Y Chen, Y Ren, L Wang, J Xia
Journal of Artificial Intelligence 1 (2), 59, 2019
72019
A source hiding identity-based proxy reencryption scheme for wireless sensor network
C Ge, J Xia, A Wu, H Li, Y Wang
Security and Communication Networks 2018, 2018
62018
O sistema não pode efectuar a operação agora. Tente mais tarde.
Artigos 1–20