Items where Author is "Qin, Jing"
access control
Sun, Jiameng, Su, Ye, Qin, Jing, Hu, Jiankun and Ma, Jixin (2019) Outsourced decentralized multi-authority attribute based signature and its application in IoT. IEEE Transactions on Cloud Computing, 9 (3). pp. 1195-1209. ISSN 2168-7161 (Online) (doi:10.1109/TCC.2019.2902380)
aggregated anonymous key issue
Su, Ye ORCID: https://orcid.org/0000-0002-4912-3197, Zhang, Xi, Qin, Jing ORCID: https://orcid.org/0000-0003-2380-0396 and Ma, Jixin ORCID: https://orcid.org/0000-0001-7458-7412 (2023) Efficient and flexible multi-authority attribute-based authentication for IoT devices. IEEE Internet of Things Journal. p. 1. ISSN 2327-4662 (Online) (doi:10.1109/JIOT.2023.3263497)
anonymous authentication
Sun, Jiameng, Su, Ye, Qin, Jing, Hu, Jiankun and Ma, Jixin (2019) Outsourced decentralized multi-authority attribute based signature and its application in IoT. IEEE Transactions on Cloud Computing, 9 (3). pp. 1195-1209. ISSN 2168-7161 (Online) (doi:10.1109/TCC.2019.2902380)
attribute based signature
Sun, Jiameng, Su, Ye, Qin, Jing, Hu, Jiankun and Ma, Jixin (2019) Outsourced decentralized multi-authority attribute based signature and its application in IoT. IEEE Transactions on Cloud Computing, 9 (3). pp. 1195-1209. ISSN 2168-7161 (Online) (doi:10.1109/TCC.2019.2902380)
attribute-based encryption
Zhu, Binrui, Sun, Jiameng, Qin, Jing and Ma, Jixin (2017) Fuzzy matching: multi-authority attribute searchable encryption without central authority. Soft Computing, 23 (2). pp. 527-536. ISSN 1432-7643 (Print), 1433-7479 (Online) (doi:10.1007/s00500-017-2849-3)
attribute-based signature
Su, Ye ORCID: https://orcid.org/0000-0002-4912-3197, Zhang, Xi, Qin, Jing ORCID: https://orcid.org/0000-0003-2380-0396 and Ma, Jixin ORCID: https://orcid.org/0000-0001-7458-7412 (2023) Efficient and flexible multi-authority attribute-based authentication for IoT devices. IEEE Internet of Things Journal. p. 1. ISSN 2327-4662 (Online) (doi:10.1109/JIOT.2023.3263497)
AVL tree
Wang, Qing, Zhang, Xi, Qin, Jing, Ma, Jixin and Huang, Xinyi (2021) A verifiable symmetric searchable encryption scheme based on the AVL tree. The Computer Journal:bxab152. pp. 1-10. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:10.1093/comjnl/bxab152)
biometric data
Shen, Wenting, Qin, Jing, Yu, Jia, Hao, Rong, Hu, Jiankun and Ma, Jixin (2019) Data integrity auditing without private key storage for secure cloud storage. IEEE Transactions on Cloud Computing, 9 (4). pp. 1408-1421. ISSN 2168-7161 (Online) (doi:10.1109/TCC.2019.2921553)
Blakley secret sharing
Su, Ye ORCID: https://orcid.org/0000-0002-4912-3197, Zhang, Xi, Qin, Jing ORCID: https://orcid.org/0000-0003-2380-0396 and Ma, Jixin ORCID: https://orcid.org/0000-0001-7458-7412 (2023) Efficient and flexible multi-authority attribute-based authentication for IoT devices. IEEE Internet of Things Journal. p. 1. ISSN 2327-4662 (Online) (doi:10.1109/JIOT.2023.3263497)
bloom filter
Liu, Jinlu, Zhao, Bo, Qin, Jing, Zhang, Xi and Ma, Jixin (2021) Multi-keyword ranked searchable encryption with the wildcard keyword for data sharing in cloud computing. The Computer Journal:bxab153. pp. 1-13. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:10.1093/comjnl/bxab153)
cloud computing
Zhu, Binrui, Susilo, Willy ORCID: https://orcid.org/0000-0002-1562-5105, Qin, Jing, Guo, Fuchun, Zhao, Zhen and Ma, Jixin (2019) A secure and efficient data sharing and searching scheme in wireless sensor networks. Sensors, 19 (11):2583. pp. 1-23. ISSN 1424-8220 (Online) (doi:10.3390/s19112583)
Zhu, Binrui, Sun, Jiameng, Qin, Jing and Ma, Jixin (2017) Fuzzy matching: multi-authority attribute searchable encryption without central authority. Soft Computing, 23 (2). pp. 527-536. ISSN 1432-7643 (Print), 1433-7479 (Online) (doi:10.1007/s00500-017-2849-3)
cloud storage
Shen, Wenting, Qin, Jing, Yu, Jia, Hao, Rong, Hu, Jiankun and Ma, Jixin (2019) Data integrity auditing without private key storage for secure cloud storage. IEEE Transactions on Cloud Computing, 9 (4). pp. 1408-1421. ISSN 2168-7161 (Online) (doi:10.1109/TCC.2019.2921553)
cloud storage auditing
Shen, Wenting, Qin, Jing ORCID: https://orcid.org/0000-0003-2380-0396 and Ma, Jixin (2019) A lightweight identity-based cloud storage auditing supporting proxy update and workload-based payment. Security and Communication Networks, 2019:8275074. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:10.1155/2019/8275074)
confidentiality-preserving public verifiable computation (CPPVC)
Sun, Jiameng ORCID: https://orcid.org/0000-0003-3153-7698, Zhu, Binrui, Qin, Jing ORCID: https://orcid.org/0000-0003-2380-0396, Hu, Jiankun ORCID: https://orcid.org/0000-0003-0230-1432 and Ma, Jixin (2018) Confidentiality-preserving publicly verifiable computation schemes for polynomial evaluation and matrix-vector multiplication. Security and Communication Networks, 2018:5275132. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:10.1155/2018/5275132)
conjunctive keyword query
Liu, Jinlu, Zhao, Bo, Qin, Jing ORCID: https://orcid.org/0000-0003-2380-0396, Hou, Xinyi and Ma, Jixin ORCID: https://orcid.org/0000-0001-7458-7412 (2023) Key-aggregate searchable encryption supporting conjunctive queries for flexible data sharing in the cloud. Information Sciences:119336. ISSN 0020-0255 (doi:10.1016/j.ins.2023.119336)
data integrity auditing
Shen, Wenting, Qin, Jing, Yu, Jia, Hao, Rong, Hu, Jiankun and Ma, Jixin (2019) Data integrity auditing without private key storage for secure cloud storage. IEEE Transactions on Cloud Computing, 9 (4). pp. 1408-1421. ISSN 2168-7161 (Online) (doi:10.1109/TCC.2019.2921553)
data security
Shen, Wenting, Qin, Jing, Yu, Jia, Hao, Rong, Hu, Jiankun and Ma, Jixin (2019) Data integrity auditing without private key storage for secure cloud storage. IEEE Transactions on Cloud Computing, 9 (4). pp. 1408-1421. ISSN 2168-7161 (Online) (doi:10.1109/TCC.2019.2921553)
data sharing
Liu, Jinlu, Zhao, Bo, Qin, Jing ORCID: https://orcid.org/0000-0003-2380-0396, Hou, Xinyi and Ma, Jixin ORCID: https://orcid.org/0000-0001-7458-7412 (2023) Key-aggregate searchable encryption supporting conjunctive queries for flexible data sharing in the cloud. Information Sciences:119336. ISSN 0020-0255 (doi:10.1016/j.ins.2023.119336)
data verifiability
Wang, Qing, Zhang, Xi, Qin, Jing, Ma, Jixin and Huang, Xinyi (2021) A verifiable symmetric searchable encryption scheme based on the AVL tree. The Computer Journal:bxab152. pp. 1-10. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:10.1093/comjnl/bxab152)
expired proxy
Shen, Wenting, Qin, Jing ORCID: https://orcid.org/0000-0003-2380-0396 and Ma, Jixin (2019) A lightweight identity-based cloud storage auditing supporting proxy update and workload-based payment. Security and Communication Networks, 2019:8275074. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:10.1155/2019/8275074)
fuzzy identity
Zhu, Binrui, Sun, Jiameng, Qin, Jing and Ma, Jixin (2017) Fuzzy matching: multi-authority attribute searchable encryption without central authority. Soft Computing, 23 (2). pp. 527-536. ISSN 1432-7643 (Print), 1433-7479 (Online) (doi:10.1007/s00500-017-2849-3)
hierarchical clustering
Liu, Jinlu, Zhao, Bo, Qin, Jing, Zhang, Xi and Ma, Jixin (2021) Multi-keyword ranked searchable encryption with the wildcard keyword for data sharing in cloud computing. The Computer Journal:bxab153. pp. 1-13. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:10.1093/comjnl/bxab153)
Internet of Things
Zhu, Binrui, Susilo, Willy ORCID: https://orcid.org/0000-0002-1562-5105, Qin, Jing, Guo, Fuchun, Zhao, Zhen and Ma, Jixin (2019) A secure and efficient data sharing and searching scheme in wireless sensor networks. Sensors, 19 (11):2583. pp. 1-23. ISSN 1424-8220 (Online) (doi:10.3390/s19112583)
IoT authentication
Su, Ye ORCID: https://orcid.org/0000-0002-4912-3197, Zhang, Xi, Qin, Jing ORCID: https://orcid.org/0000-0003-2380-0396 and Ma, Jixin ORCID: https://orcid.org/0000-0001-7458-7412 (2023) Efficient and flexible multi-authority attribute-based authentication for IoT devices. IEEE Internet of Things Journal. p. 1. ISSN 2327-4662 (Online) (doi:10.1109/JIOT.2023.3263497)
key-aggregate
Liu, Jinlu, Zhao, Bo, Qin, Jing ORCID: https://orcid.org/0000-0003-2380-0396, Hou, Xinyi and Ma, Jixin ORCID: https://orcid.org/0000-0001-7458-7412 (2023) Key-aggregate searchable encryption supporting conjunctive queries for flexible data sharing in the cloud. Information Sciences:119336. ISSN 0020-0255 (doi:10.1016/j.ins.2023.119336)
key-aggregate searchable encryption
Liu, Jinlu ORCID: https://orcid.org/0000-0003-1186-8545, Wei, Zhongkai, Qin, Jing ORCID: https://orcid.org/0000-0003-2380-0396, Zhao, Bo and Ma, Jixin (2023) Verifiable key-aggregate searchable encryption with a designated server in multi-owner setting. IEEE Transactions on Services Computing, 16 (6). pp. 4233-4247. ISSN 1939-1374 (Online) (doi:10.1109/TSC.2023.3315957)
keyword search
Wang, Qing, Zhang, Xi, Qin, Jing, Ma, Jixin and Huang, Xinyi (2021) A verifiable symmetric searchable encryption scheme based on the AVL tree. The Computer Journal:bxab152. pp. 1-10. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:10.1093/comjnl/bxab152)
KGA
Liu, Jinlu ORCID: https://orcid.org/0000-0003-1186-8545, Wei, Zhongkai, Qin, Jing ORCID: https://orcid.org/0000-0003-2380-0396, Zhao, Bo and Ma, Jixin (2023) Verifiable key-aggregate searchable encryption with a designated server in multi-owner setting. IEEE Transactions on Services Computing, 16 (6). pp. 4233-4247. ISSN 1939-1374 (Online) (doi:10.1109/TSC.2023.3315957)
matrix-vector multiplication
Sun, Jiameng ORCID: https://orcid.org/0000-0003-3153-7698, Zhu, Binrui, Qin, Jing ORCID: https://orcid.org/0000-0003-2380-0396, Hu, Jiankun ORCID: https://orcid.org/0000-0003-0230-1432 and Ma, Jixin (2018) Confidentiality-preserving publicly verifiable computation schemes for polynomial evaluation and matrix-vector multiplication. Security and Communication Networks, 2018:5275132. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:10.1155/2018/5275132)
multi-authority
Su, Ye ORCID: https://orcid.org/0000-0002-4912-3197, Zhang, Xi, Qin, Jing ORCID: https://orcid.org/0000-0003-2380-0396 and Ma, Jixin ORCID: https://orcid.org/0000-0001-7458-7412 (2023) Efficient and flexible multi-authority attribute-based authentication for IoT devices. IEEE Internet of Things Journal. p. 1. ISSN 2327-4662 (Online) (doi:10.1109/JIOT.2023.3263497)
Zhu, Binrui, Sun, Jiameng, Qin, Jing and Ma, Jixin (2017) Fuzzy matching: multi-authority attribute searchable encryption without central authority. Soft Computing, 23 (2). pp. 527-536. ISSN 1432-7643 (Print), 1433-7479 (Online) (doi:10.1007/s00500-017-2849-3)
multi-keyword ranked
Liu, Jinlu, Zhao, Bo, Qin, Jing, Zhang, Xi and Ma, Jixin (2021) Multi-keyword ranked searchable encryption with the wildcard keyword for data sharing in cloud computing. The Computer Journal:bxab153. pp. 1-13. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:10.1093/comjnl/bxab153)
multi-owner
Liu, Jinlu ORCID: https://orcid.org/0000-0003-1186-8545, Wei, Zhongkai, Qin, Jing ORCID: https://orcid.org/0000-0003-2380-0396, Zhao, Bo and Ma, Jixin (2023) Verifiable key-aggregate searchable encryption with a designated server in multi-owner setting. IEEE Transactions on Services Computing, 16 (6). pp. 4233-4247. ISSN 1939-1374 (Online) (doi:10.1109/TSC.2023.3315957)
multivariate polynomial evaluation
Sun, Jiameng ORCID: https://orcid.org/0000-0003-3153-7698, Zhu, Binrui, Qin, Jing ORCID: https://orcid.org/0000-0003-2380-0396, Hu, Jiankun ORCID: https://orcid.org/0000-0003-0230-1432 and Ma, Jixin (2018) Confidentiality-preserving publicly verifiable computation schemes for polynomial evaluation and matrix-vector multiplication. Security and Communication Networks, 2018:5275132. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:10.1155/2018/5275132)
off-line keyword guessing attack
Zhu, Binrui, Susilo, Willy ORCID: https://orcid.org/0000-0002-1562-5105, Qin, Jing, Guo, Fuchun, Zhao, Zhen and Ma, Jixin (2019) A secure and efficient data sharing and searching scheme in wireless sensor networks. Sensors, 19 (11):2583. pp. 1-23. ISSN 1424-8220 (Online) (doi:10.3390/s19112583)
on-line keyword guessing attack
Zhu, Binrui, Susilo, Willy ORCID: https://orcid.org/0000-0002-1562-5105, Qin, Jing, Guo, Fuchun, Zhao, Zhen and Ma, Jixin (2019) A secure and efficient data sharing and searching scheme in wireless sensor networks. Sensors, 19 (11):2583. pp. 1-23. ISSN 1424-8220 (Online) (doi:10.3390/s19112583)
outsourcing computation
Sun, Jiameng, Su, Ye, Qin, Jing, Hu, Jiankun and Ma, Jixin (2019) Outsourced decentralized multi-authority attribute based signature and its application in IoT. IEEE Transactions on Cloud Computing, 9 (3). pp. 1195-1209. ISSN 2168-7161 (Online) (doi:10.1109/TCC.2019.2902380)
proof of knowledge
Su, Ye ORCID: https://orcid.org/0000-0002-4912-3197, Zhang, Xi, Qin, Jing ORCID: https://orcid.org/0000-0003-2380-0396 and Ma, Jixin ORCID: https://orcid.org/0000-0001-7458-7412 (2023) Efficient and flexible multi-authority attribute-based authentication for IoT devices. IEEE Internet of Things Journal. p. 1. ISSN 2327-4662 (Online) (doi:10.1109/JIOT.2023.3263497)
proxy update
Shen, Wenting, Qin, Jing ORCID: https://orcid.org/0000-0003-2380-0396 and Ma, Jixin (2019) A lightweight identity-based cloud storage auditing supporting proxy update and workload-based payment. Security and Communication Networks, 2019:8275074. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:10.1155/2019/8275074)
public key encryption with keyword search
Zhu, Binrui, Susilo, Willy ORCID: https://orcid.org/0000-0002-1562-5105, Qin, Jing, Guo, Fuchun, Zhao, Zhen and Ma, Jixin (2019) A secure and efficient data sharing and searching scheme in wireless sensor networks. Sensors, 19 (11):2583. pp. 1-23. ISSN 1424-8220 (Online) (doi:10.3390/s19112583)
public verifiability
Sun, Jiameng ORCID: https://orcid.org/0000-0003-3153-7698, Zhu, Binrui, Qin, Jing ORCID: https://orcid.org/0000-0003-2380-0396, Hu, Jiankun ORCID: https://orcid.org/0000-0003-0230-1432 and Ma, Jixin (2018) Confidentiality-preserving publicly verifiable computation schemes for polynomial evaluation and matrix-vector multiplication. Security and Communication Networks, 2018:5275132. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:10.1155/2018/5275132)
revoked proxy
Shen, Wenting, Qin, Jing ORCID: https://orcid.org/0000-0003-2380-0396 and Ma, Jixin (2019) A lightweight identity-based cloud storage auditing supporting proxy update and workload-based payment. Security and Communication Networks, 2019:8275074. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:10.1155/2019/8275074)
searchable encryption
Liu, Jinlu, Zhao, Bo, Qin, Jing, Zhang, Xi and Ma, Jixin (2021) Multi-keyword ranked searchable encryption with the wildcard keyword for data sharing in cloud computing. The Computer Journal:bxab153. pp. 1-13. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:10.1093/comjnl/bxab153)
Zhu, Binrui, Sun, Jiameng, Qin, Jing and Ma, Jixin (2017) Fuzzy matching: multi-authority attribute searchable encryption without central authority. Soft Computing, 23 (2). pp. 527-536. ISSN 1432-7643 (Print), 1433-7479 (Online) (doi:10.1007/s00500-017-2849-3)
selective data sharing
Liu, Jinlu ORCID: https://orcid.org/0000-0003-1186-8545, Wei, Zhongkai, Qin, Jing ORCID: https://orcid.org/0000-0003-2380-0396, Zhao, Bo and Ma, Jixin (2023) Verifiable key-aggregate searchable encryption with a designated server in multi-owner setting. IEEE Transactions on Services Computing, 16 (6). pp. 4233-4247. ISSN 1939-1374 (Online) (doi:10.1109/TSC.2023.3315957)
standard model
Liu, Jinlu, Zhao, Bo, Qin, Jing ORCID: https://orcid.org/0000-0003-2380-0396, Hou, Xinyi and Ma, Jixin ORCID: https://orcid.org/0000-0001-7458-7412 (2023) Key-aggregate searchable encryption supporting conjunctive queries for flexible data sharing in the cloud. Information Sciences:119336. ISSN 0020-0255 (doi:10.1016/j.ins.2023.119336)
TF-IDF
Liu, Jinlu, Zhao, Bo, Qin, Jing, Zhang, Xi and Ma, Jixin (2021) Multi-keyword ranked searchable encryption with the wildcard keyword for data sharing in cloud computing. The Computer Journal:bxab153. pp. 1-13. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:10.1093/comjnl/bxab153)
verifiable
Liu, Jinlu ORCID: https://orcid.org/0000-0003-1186-8545, Wei, Zhongkai, Qin, Jing ORCID: https://orcid.org/0000-0003-2380-0396, Zhao, Bo and Ma, Jixin (2023) Verifiable key-aggregate searchable encryption with a designated server in multi-owner setting. IEEE Transactions on Services Computing, 16 (6). pp. 4233-4247. ISSN 1939-1374 (Online) (doi:10.1109/TSC.2023.3315957)
wildcard keyword
Liu, Jinlu, Zhao, Bo, Qin, Jing, Zhang, Xi and Ma, Jixin (2021) Multi-keyword ranked searchable encryption with the wildcard keyword for data sharing in cloud computing. The Computer Journal:bxab153. pp. 1-13. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:10.1093/comjnl/bxab153)
wireless sensor networks
Zhu, Binrui, Susilo, Willy ORCID: https://orcid.org/0000-0002-1562-5105, Qin, Jing, Guo, Fuchun, Zhao, Zhen and Ma, Jixin (2019) A secure and efficient data sharing and searching scheme in wireless sensor networks. Sensors, 19 (11):2583. pp. 1-23. ISSN 1424-8220 (Online) (doi:10.3390/s19112583)