286 results on '"Ning, Jianting"'
Search Results
52. Privacy preserving search services against online attack
53. RelCLAS: A Reliable Malicious KGC-Resistant Certificateless Aggregate Signature Protocol for Vehicular Ad Hoc Networks
54. Provably secure multi-signature scheme based on the standard SM2 signature scheme
55. Updatable Searchable Symmetric Encryption: Definitions and Constructions
56. Multi-Client Boolean File Retrieval With Adaptable Authorization Switching for Secure Cloud Search Services
57. A Survey on Searchable Symmetric Encryption
58. Verifiable Cloud-Based Data Publish-Subscribe Service With Hidden Access Policy
59. Attribute-Based Encryption
60. Accountable and Traceable Attribute-Based Encryption
61. Revocable Policy-Based Chameleon Hash
62. Public auditing for shared cloud data with efficient and secure group management
63. Proteomics and Metabolomics Analysis Reveal the Regulation Mechanism of Linoleate Isomerase Activity and Function in Propionibacterium acnes.
64. Non-interactive Boolean Searchable Asymmetric Encryption With Bilateral Access Control.
65. Deep-Reuse-Enabled Common Satellite Network via Collaborative Blockchains: Architecture, Challenges, and Solutions
66. Secure Updatable Storage Access Control System for EHRs in the Cloud
67. Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment
68. MQ Aggregate Signature Schemes with Exact Security Based on UOV Signature
69. An Efficient Key-Policy Attribute-Based Searchable Encryption in Prime-Order Groups
70. Traceable CP-ABE with Short Ciphertexts: How to Catch People Selling Decryption Devices on eBay Efficiently
71. SIMC 2.0: Improved Secure ML Inference Against Malicious Clients
72. VerifyML: Obliviously Checking Model Fairness Resilient to Malicious Model Holder
73. Verifiable Outsourced Attribute-Based Encryption Scheme for Cloud-Assisted Mobile E-Health System
74. Time-Controllable Keyword Search Scheme With Efficient Revocation in Mobile E-Health Cloud
75. Proteomics and Peptidomics As a Tool to Compare the Proteins and Endogenous Peptides in Human, Cow, and Donkey Milk.
76. Verifiable Conjunctive Dynamic Searchable Symmetric Encryption With Forward and Backward Privacy.
77. Attribute-Based Encryption with Efficient Keyword Search and User Revocation
78. Secure Online/Offline Attribute-Based Encryption for IoT Users in Cloud Computing
79. Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud
80. DuMSE: Toward Practical and Dynamic Multiuser Search Over Encrypted Cloud Data Against Keyword Guessing Attack
81. VerifyML: Obliviously Checking Model Fairness Resilient to Malicious Model Holder
82. Dual-Server Boolean Data Retrieval for Highly-Scalable Secure File Sharing Services
83. Time-Controllable Keyword Search Scheme with Efficient Revocation in Mobile E-health Cloud
84. Privacy-Preserving Traceable Encrypted Traffic Inspection in Blockchain-based Industrial IoT
85. Single-Server Public-Key Authenticated Encryption With Keyword Search and Its Application in IIoT
86. Characterization and biological function analysis of endogenous peptides derived from donkey colostrum proteins
87. AADEC: Anonymous and Auditable Distributed Access Control for Edge Computing Services
88. Secure Cloud-Assisted Data Pub/Sub Service with Fine-grained Bilateral Access Control
89. A Secure EMR Sharing System With Tamper Resistance and Expressive Access Control
90. A Security-Enhanced Certificateless Designated Verifier Aggregate Signature Scheme for HWMSNs in the YOSO Model
91. An Adaptively Secure and Efficient Data Sharing System for Dynamic User Groups in Cloud
92. Catch Me If You Can: A Secure Bilateral Access Control System With Anonymous Credentials
93. An Adaptive Secure and Practical Data Sharing System with Verifiable Outsourced Decryption
94. SIMC 2.0: Improved Secure ML Inference Against Malicious Clients
95. Efficient Construction of Verifiable Timed Signatures and its Application in Scalable Payments
96. Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability
97. ACA: Anonymous, Confidential and Auditable Transaction Systems for Blockchain
98. Forward Secure Public-key Authenticated Encryption with Conjunctive Keyword Search.
99. Non-interactive Boolean Searchable Asymmetric Encryption With Bilateral Access Control
100. Differentially Oblivious Data Analysis With Intel SGX: Design, Optimization, and Evaluation
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.