Items where Author is "Hu, Jiankun"
Up a level |
access control
Sun, Jiameng, Su, Ye, Qin, Jing, Hu, Jiankun and Ma, Jixin (2019) Outsourced decentralized multi-authority attribute based signature and its application in IoT. IEEE Transactions on Cloud Computing, 9 (3). pp. 1195-1209. ISSN 2168-7161 (Online) (doi:https://doi.org/10.1109/TCC.2019.2902380)
anonymous authentication
Sun, Jiameng, Su, Ye, Qin, Jing, Hu, Jiankun and Ma, Jixin (2019) Outsourced decentralized multi-authority attribute based signature and its application in IoT. IEEE Transactions on Cloud Computing, 9 (3). pp. 1195-1209. ISSN 2168-7161 (Online) (doi:https://doi.org/10.1109/TCC.2019.2902380)
attribute based signature
Sun, Jiameng, Su, Ye, Qin, Jing, Hu, Jiankun and Ma, Jixin (2019) Outsourced decentralized multi-authority attribute based signature and its application in IoT. IEEE Transactions on Cloud Computing, 9 (3). pp. 1195-1209. ISSN 2168-7161 (Online) (doi:https://doi.org/10.1109/TCC.2019.2902380)
biometric data
Shen, Wenting, Qin, Jing, Yu, Jia, Hao, Rong, Hu, Jiankun and Ma, Jixin (2019) Data integrity auditing without private key storage for secure cloud storage. IEEE Transactions on Cloud Computing, 9 (4). pp. 1408-1421. ISSN 2168-7161 (Online) (doi:https://doi.org/10.1109/TCC.2019.2921553)
cloud storage
Shen, Wenting, Qin, Jing, Yu, Jia, Hao, Rong, Hu, Jiankun and Ma, Jixin (2019) Data integrity auditing without private key storage for secure cloud storage. IEEE Transactions on Cloud Computing, 9 (4). pp. 1408-1421. ISSN 2168-7161 (Online) (doi:https://doi.org/10.1109/TCC.2019.2921553)
confidentiality-preserving public verifiable computation (CPPVC)
Sun, Jiameng ORCID: 0000-0003-3153-7698 , Zhu, Binrui, Qin, Jing ORCID: 0000-0003-2380-0396 , Hu, Jiankun ORCID: 0000-0003-0230-1432 and Ma, Jixin (2018) Confidentiality-preserving publicly verifiable computation schemes for polynomial evaluation and matrix-vector multiplication. Security and Communication Networks, 2018:5275132. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:https://doi.org/10.1155/2018/5275132)
data integrity auditing
Shen, Wenting, Qin, Jing, Yu, Jia, Hao, Rong, Hu, Jiankun and Ma, Jixin (2019) Data integrity auditing without private key storage for secure cloud storage. IEEE Transactions on Cloud Computing, 9 (4). pp. 1408-1421. ISSN 2168-7161 (Online) (doi:https://doi.org/10.1109/TCC.2019.2921553)
data security
Shen, Wenting, Qin, Jing, Yu, Jia, Hao, Rong, Hu, Jiankun and Ma, Jixin (2019) Data integrity auditing without private key storage for secure cloud storage. IEEE Transactions on Cloud Computing, 9 (4). pp. 1408-1421. ISSN 2168-7161 (Online) (doi:https://doi.org/10.1109/TCC.2019.2921553)
matrix-vector multiplication
Sun, Jiameng ORCID: 0000-0003-3153-7698 , Zhu, Binrui, Qin, Jing ORCID: 0000-0003-2380-0396 , Hu, Jiankun ORCID: 0000-0003-0230-1432 and Ma, Jixin (2018) Confidentiality-preserving publicly verifiable computation schemes for polynomial evaluation and matrix-vector multiplication. Security and Communication Networks, 2018:5275132. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:https://doi.org/10.1155/2018/5275132)
multivariate polynomial evaluation
Sun, Jiameng ORCID: 0000-0003-3153-7698 , Zhu, Binrui, Qin, Jing ORCID: 0000-0003-2380-0396 , Hu, Jiankun ORCID: 0000-0003-0230-1432 and Ma, Jixin (2018) Confidentiality-preserving publicly verifiable computation schemes for polynomial evaluation and matrix-vector multiplication. Security and Communication Networks, 2018:5275132. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:https://doi.org/10.1155/2018/5275132)
outsourcing computation
Sun, Jiameng, Su, Ye, Qin, Jing, Hu, Jiankun and Ma, Jixin (2019) Outsourced decentralized multi-authority attribute based signature and its application in IoT. IEEE Transactions on Cloud Computing, 9 (3). pp. 1195-1209. ISSN 2168-7161 (Online) (doi:https://doi.org/10.1109/TCC.2019.2902380)
public verifiability
Sun, Jiameng ORCID: 0000-0003-3153-7698 , Zhu, Binrui, Qin, Jing ORCID: 0000-0003-2380-0396 , Hu, Jiankun ORCID: 0000-0003-0230-1432 and Ma, Jixin (2018) Confidentiality-preserving publicly verifiable computation schemes for polynomial evaluation and matrix-vector multiplication. Security and Communication Networks, 2018:5275132. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:https://doi.org/10.1155/2018/5275132)