jun ye
jun ye
suse
在 suse.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Secure outsourcing of modular exponentiations under single untrusted programme model
Y Ding, Z Xu, J Ye, KKR Choo
Journal of Computer and System Sciences 90, 1-13, 2017
372017
Controllable keyword search scheme supporting multiple users
J Ye, Y Ding
Future Generation Computer Systems 81, 433-442, 2018
232018
Fine-grained searchable encryption in multi-user setting
J Ye, J Wang, J Zhao, J Shen, KC Li
Soft Computing 21 (20), 6201-6212, 2017
222017
Efficient and secure encrypted image search in mobile cloud computing
Q Zou, J Wang, J Ye, J Shen, X Chen
Soft Computing 21 (11), 2959-2969, 2017
212017
An improved algorithm for secure outsourcing of modular exponentiations
J Ye, X Chen, J Ma
2015 IEEE 29th International Conference on Advanced Information Networking …, 2015
182015
Verifiable delegation of polynomials.
J Ye, H Zhang, C Fu
IJ Network Security 18 (2), 283-290, 2016
142016
Secure and efficient fine-grained data access control scheme in cloud computing1
C Yang, J Ye
Journal of High Speed Networks 21 (4), 259-271, 2015
132015
Efficient request-based comparable encryption scheme based on sliding window method
P Chen, J Ye, X Chen
Soft Computing 20 (11), 4589-4596, 2016
122016
Image search scheme over encrypted database
J Ye, Z Xu, Y Ding
Future Generation Computer Systems 87, 251-258, 2018
102018
Attribute-based fine-grained access control with user revocation
J Ye, W Zhang, S Wu, Y Gao, J Qiu
Information and Communication Technology-EurAsia Conference, 586-595, 2014
102014
Secure outsourcing of modular exponentiation with single untrusted server
J Ye, J Wang
2015 18th International Conference on Network-Based Information Systems, 643-645, 2015
62015
A new efficient request-based comparable encryption scheme
P Chen, J Ye, X Chen
2015 IEEE 29th International Conference on Advanced Information Networking …, 2015
62015
Identity-based re-encryption scheme with lightweight re-encryption key generation
L Liu, J Ye
Journal of Discrete Mathematical Sciences and Cryptography 21 (1), 41-57, 2018
42018
Group signature scheme based on verifiable random number
J Ye, L Li
Journal of Discrete Mathematical Sciences and Cryptography 20 (2), 525-533, 2017
42017
A Homomorphic Universal Re-encryptor for Identity-based Encryption.
L Liu, J Ye
IJ Network Security 19 (1), 11-19, 2017
42017
Secure Outsourcing Algorithm of Polynomials in Cloud Computing.
X Zhou, Y Ding, Z Wang, X Li, J Ye, Z Xu
SEKE, 46-51, 2016
42016
Comparable encryption scheme supporting multiple users in cloud computing
J Ye, M Miao, P Chen, X Chen
International Journal of High Performance Computing and Networking 11 (1), 24-33, 2018
32018
An efficient traceable data sharing scheme in cloud computing for mobile devices
Z Wang, J Ye, J Wang
International Journal of High Performance Computing and Networking 12 (2 …, 2018
22018
Verifiable outsourcing of high-degree polynomials and its application in keyword search
J Ye, X Zhou, Z Xu, Y Ding
Intelligent Automation & Soft Computing, 1-6, 2017
22017
Request-based comparable encryption scheme with multiple users
J Ye, M Miao, P Chen, X Chen
2015 10th International Conference on Broadband and Wireless Computing …, 2015
22015
系统目前无法执行此操作,请稍后再试。
文章 1–20