フォロー
Jianfeng Wang (王剑锋)
Jianfeng Wang (王剑锋)
その他の名前Jianfeng Wang
Associate Professor, Xidian University, China
確認したメール アドレス: xidian.edu.cn - ホームページ
タイトル
引用先
引用先
Verifiable auditing for outsourced database in cloud computing
J Wang, X Chen, X Huang, I You, Y Xiang
IEEE transactions on computers 64 (11), 3293-3303, 2015
1622015
Efficient verifiable fuzzy keyword search over encrypted data in cloud computing
J Wang, H Ma, Q Tang, J Li, H Zhu, S Ma, X Chen
Computer science and information systems 10 (2), 667-684, 2013
1272013
Towards achieving flexible and verifiable search for outsourced database in cloud computing
J Wang, X Chen, J Li, J Zhao, J Shen
Future Generation Computer Systems 67, 266-275, 2017
822017
Secure searchable encryption: a survey
Y Wang, J Wang, X Chen
Journal of communications and information networks 1, 52-65, 2016
802016
An efficient PHR service system supporting fuzzy keyword search and fine-grained access control
F Xhafa, J Wang, X Chen, JK Liu, J Li, P Krause
Soft computing 18, 1795-1802, 2014
702014
Secure multi-server-aided data deduplication in cloud computing
M Miao, J Wang, H Li, X Chen
Pervasive and Mobile Computing 24, 129-137, 2015
672015
Efficient verifiable public key encryption with keyword search based on KP-ABE
P Liu, J Wang, H Ma, H Nie
2014 Ninth International Conference on Broadband and Wireless Computing …, 2014
652014
Blockchain-based public auditing and secure deduplication with fair arbitration
H Yuan, X Chen, J Wang, J Yuan, H Yan, W Susilo
Information Sciences 541, 409-425, 2020
622020
Blockchain-based multiple groups data sharing with anonymity and traceability
H Huang, X Chen, J Wang
Science China Information Sciences 63, 1-13, 2020
572020
Towards efficient verifiable forward secure searchable symmetric encryption
Z Zhang, J Wang, Y Wang, Y Su, X Chen
Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019
442019
Towards efficient verifiable conjunctive keyword search for large encrypted database
J Wang, X Chen, SF Sun, JK Liu, MH Au, ZH Zhan
Computer Security: 23rd European Symposium on Research in Computer Security …, 2018
432018
Secure cloud data deduplication with efficient re-encryption
H Yuan, X Chen, J Li, T Jiang, J Wang, RH Deng
IEEE Transactions on Services Computing 15 (1), 442-456, 2019
402019
A New Efficient Verifiable Fuzzy Keyword Search Scheme.
J Wang, H Ma, Q Tang, J Li, H Zhu, S Ma, X Chen
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3 (4), 61-71, 2012
332012
Publicly verifiable database scheme with efficient keyword search
M Miao, J Wang, S Wen, J Ma
Information Sciences 475, 18-28, 2019
302019
Efficient and secure encrypted image search in mobile cloud computing
Q Zou, J Wang, J Ye, J Shen, X Chen
Soft Computing 21, 2959-2969, 2017
302017
Fine-grained searchable encryption in multi-user setting
J Ye, J Wang, J Zhao, J Shen, KC Li
Soft Computing 21, 6201-6212, 2017
292017
Position paper on blockchain technology: Smart contract and applications
W Meng, J Wang, X Wang, J Liu, Z Yu, J Li, Y Zhao, SSM Chow
Network and System Security: 12th International Conference, NSS 2018, Hong …, 2018
272018
Towards multi-user searchable encryption supporting Boolean query and fast decryption
Y Wang, J Wang, SF Sun, JK Liu, W Susilo, X Chen
Provable Security: 11th International Conference, ProvSec 2017, Xi'an, China …, 2017
272017
Achieving searchable encryption scheme with search pattern hidden
Y Wang, SF Sun, J Wang, JK Liu, X Chen
IEEE Transactions on Services Computing 15 (2), 1012-1025, 2020
252020
A Verifiable Fuzzy Keyword Search Scheme Over Encrypted Data.
J Wang, X Chen, H Ma, Q Tang, J Li, H Zhu
J. Internet Serv. Inf. Secur. 2 (1/2), 49-58, 2012
242012
現在システムで処理を実行できません。しばらくしてからもう一度お試しください。
論文 1–20