关注
jia yu
jia yu
Professor of Computer Science, Qingdao University
在 qdu.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage
W Shen, J Qin, J Yu, R Hao, J Hu
IEEE Transactions on Information Forensics and Security 14 (2), 331-346, 2018
2522018
Enabling cloud storage auditing with key-exposure resistance
J Yu, K Ren, C Wang, V Varadharajan
IEEE Transactions on Information forensics and security 10 (6), 1167-1179, 2015
2262015
Enabling cloud storage auditing with verifiable outsourcing of key updates
J Yu, K Ren, C Wang
IEEE transactions on information forensics and security 11 (6), 1362-1375, 2016
1662016
Enabling efficient user revocation in identity-based cloud storage auditing for shared big data
Y Zhang, J Yu, R Hao, C Wang, K Ren
IEEE Transactions on Dependable and Secure computing 17 (3), 608-619, 2018
1612018
Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability
G Yang, J Yu, W Shen, Q Su, Z Fu, R Hao
Journal of Systems and Software 113, 130-139, 2016
1492016
Strong key-exposure resilient auditing for secure cloud storage
J Yu, H Wang
IEEE Transactions on Information Forensics and Security 12 (8), 1931-1940, 2017
1362017
Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium
W Shen, J Yu, H Xia, H Zhang, X Lu, R Hao
Journal of Network and Computer Applications 82, 56-64, 2017
1092017
Incentive and unconditionally anonymous identity-based public provable data possession
H Wang, D He, J Yu, Z Wang
IEEE Transactions on Services Computing 12 (5), 824-835, 2016
912016
Symmetric-key based proofs of retrievability supporting public verification
C Guan, K Ren, F Zhang, F Kerschbaum, J Yu
Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015
882015
Forward-secure identity-based signature: security notions and construction
J Yu, R Hao, F Kong, X Cheng, J Fan, Y Chen
Information Sciences 181 (3), 648-660, 2011
852011
Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data
X Jiang, J Yu, J Yan, R Hao
Information Sciences 403, 22-41, 2017
822017
Towards achieving keyword search over dynamic encrypted cloud data with symmetric-key based verification
X Ge, J Yu, H Zhang, C Hu, Z Li, Z Qin, R Hao
IEEE Transactions on Dependable and Secure computing 18 (1), 490-504, 2019
812019
Energy-efficient routing algorithm based on unequal clustering and connected graph in wireless sensor networks
H Xia, R Zhang, J Yu, Z Pan
International Journal of Wireless Information Networks 23, 141-150, 2016
742016
Efficient unicast in bijective connection networks with the restricted faulty node set
J Fan, X Jia, X Liu, S Zhang, J Yu
Information Sciences 181 (11), 2303-2315, 2011
492011
Data integrity auditing without private key storage for secure cloud storage
W Shen, J Qin, J Yu, R Hao, J Hu, J Ma
IEEE Transactions on Cloud Computing 9 (4), 1408-1421, 2019
442019
Enabling efficient verifiable fuzzy keyword search over encrypted data in cloud computing
X Ge, J Yu, C Hu, H Zhang, R Hao
IEEE Access 6, 45725-45739, 2018
432018
Light-weight trust-enhanced on-demand multi-path routing in mobile ad hoc networks
H Xia, J Yu, C Tian, Z Pan, E Sha
Journal of Network and Computer Applications 62, 112-127, 2016
422016
An efficient fault-tolerant routing algorithm in bijective connection networks with restricted faulty edges
J Fan, X Jia, B Cheng, J Yu
Theoretical Computer Science 412 (29), 3440-3450, 2011
402011
Remote data possession checking with privacy-preserving authenticators for cloud storage
W Shen, G Yang, J Yu, H Zhang, F Kong, R Hao
Future Generation Computer Systems 76, 136-145, 2017
392017
Blockchain-based privacy-preserving and rewarding private data sharing for IoT
T Li, H Wang, D He, J Yu
IEEE Internet of Things Journal 9 (16), 15138-15149, 2022
372022
系统目前无法执行此操作,请稍后再试。
文章 1–20