Jianfeng Wang (王剑锋)
Jianfeng Wang (王剑锋)
在 xidian.edu.cn 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Verifiable auditing for outsourced database in cloud computing
J Wang, X Chen, X Huang, I You, Y Xiang
IEEE transactions on computers 64 (11), 3293-3303, 2015
1252015
Efficient verifiable fuzzy keyword search over encrypted data in cloud computing
J Wang, H Ma, Q Tang, J Li, H Zhu, S Ma, X Chen
Computer Science and Information Systems 10 (2), 667-684, 2013
1042013
An efficient PHR service system supporting fuzzy keyword search and fine-grained access control
F Xhafa, J Wang, X Chen, JK Liu, J Li, P Krause
Soft computing 18 (9), 1795-1802, 2014
612014
Towards achieving flexible and verifiable search for outsourced database in cloud computing
J Wang, X Chen, J Li, J Zhao, J Shen
Future Generation Computer Systems 67, 266-275, 2017
602017
Efficient verifiable public key encryption with keyword search based on KP-ABE
P Liu, J Wang, H Ma, H Nie
2014 Ninth International Conference on Broadband and Wireless Computing …, 2014
562014
Secure multi-server-aided data deduplication in cloud computing
M Miao, J Wang, H Li, X Chen
Pervasive and Mobile Computing 24, 129-137, 2015
392015
Secure searchable encryption: a survey
Y Wang, J Wang, X Chen
Journal of communications and information networks 1 (4), 52-65, 2016
382016
A New Efficient Verifiable Fuzzy Keyword Search Scheme.
J Wang, H Ma, Q Tang, J Li, H Zhu, S Ma, X Chen
JoWUA 3 (4), 61-71, 2012
272012
Fine-grained searchable encryption in multi-user setting
J Ye, J Wang, J Zhao, J Shen, KC Li
Soft Computing 21 (20), 6201-6212, 2017
222017
Efficient and secure encrypted image search in mobile cloud computing
Q Zou, J Wang, J Ye, J Shen, X Chen
Soft Computing 21 (11), 2959-2969, 2017
212017
A Verifiable Fuzzy Keyword Search Scheme Over Encrypted Data.
J Wang, X Chen, H Ma, Q Tang, J Li, H Zhu
J. Internet Serv. Inf. Secur. 2 (1/2), 49-58, 2012
212012
Verifiable privacy-preserving single-layer perceptron training scheme in cloud computing
X Zhang, X Chen, J Wang, Z Zhan, J Li
Soft Computing 22 (23), 7719-7732, 2018
182018
Towards efficient verifiable conjunctive keyword search for large encrypted database
J Wang, X Chen, SF Sun, JK Liu, MH Au, ZH Zhan
European Symposium on Research in Computer Security, 83-100, 2018
162018
Publicly verifiable database scheme with efficient keyword search
M Miao, J Wang, S Wen, J Ma
Information Sciences 475, 18-28, 2019
152019
Blockchain-based multiple groups data sharing with anonymity and traceability
H Huang, X Chen, J Wang
Science China Information Sciences 63 (3), 130101, 2020
142020
Publicly verifiable databases with efficient insertion/deletion operations
M Miao, J Wang, J Ma, W Susilo
Journal of Computer and System Sciences 86, 49-58, 2017
142017
Secure similarity-based cloud data deduplication in Ubiquitous city
J Liu, J Wang, X Tao, J Shen
Pervasive and Mobile Computing 41, 231-242, 2017
132017
Efficient and secure storage for outsourced data: A survey
J Wang, X Chen
Data Science and Engineering 1 (3), 178-188, 2016
132016
Towards efficient privacy-preserving encrypted image search in cloud computing
Y Wang, M Miao, J Shen, J Wang
Soft Computing 23 (6), 2101-2112, 2019
122019
Towards multi-user searchable encryption supporting boolean query and fast decryption
Y Wang, J Wang, SF Sun, JK Liu, W Susilo, X Chen
International Conference on Provable Security, 24-38, 2017
122017
系统目前无法执行此操作,请稍后再试。
文章 1–20