关注
Jia-Nan Liu
Jia-Nan Liu
在 stu2013.jnu.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
CrowdBC: A blockchain-based decentralized framework for crowdsourcing
M Li, J Weng, A Yang, W Lu, Y Zhang, L Hou, JN Liu, Y Xiang, RH Deng
IEEE transactions on parallel and distributed systems 30 (6), 1251-1266, 2018
5152018
Toward blockchain-based fair and anonymous ad dissemination in vehicular networks
M Li, J Weng, A Yang, JN Liu, X Lin
IEEE Transactions on Vehicular Technology 68 (11), 11248-11259, 2019
852019
Enabling efficient and privacy-preserving aggregation communication and function query for fog computing-based smart grid
JN Liu, J Weng, A Yang, Y Chen, X Lin
IEEE Transactions on Smart Grid 11 (1), 247-257, 2019
742019
Anonymous identity-based broadcast encryption with chosen-ciphertext security
K He, J Weng, JN Liu, JK Liu, W Liu, RH Deng
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
612016
Fully secure fuzzy identity-based encryption for secure IoT communications
Y Mao, J Li, MR Chen, J Liu, C Xie, Y Zhan
Computer Standards & Interfaces 44, 117-121, 2016
582016
Toward vehicular digital forensics from decentralized trust: An accountable, privacy-preserving, and secure realization
M Li, J Weng, JN Liu, X Lin, C Obimbo
IEEE Internet of Things Journal 9 (9), 7009-7024, 2021
292021
Dual trapdoor identity-based encryption with keyword search
J Liu, J Lai, X Huang
Soft Computing 21 (10), 2599–2607, 2017
232017
pvcnn: Privacy-preserving and verifiable convolutional neural network testing
J Weng, J Weng, G Tang, A Yang, M Li, JN Liu
IEEE Transactions on Information Forensics and Security 18, 2218-2233, 2023
172023
Efficient fine-grained access control for secure personal health records in cloud computing
K He, J Weng, JK Liu, W Zhou, JN Liu
Network and System Security: 10th International Conference, NSS 2016, Taipei …, 2016
172016
Enabling efficient, secure and privacy-preserving mobile cloud storage
JN Liu, X Luo, J Weng, A Yang, XA Wang, M Li, X Lin
IEEE Transactions on Dependable and Secure Computing 19 (3), 1518-1531, 2020
162020
Zerocross: A sidechain-based privacy-preserving cross-chain solution for monero
Y Li, J Weng, M Li, W Wu, J Weng, JN Liu, S Hu
Journal of Parallel and Distributed Computing 169, 301-316, 2022
152022
REMT: A Real-Time End-to-End Media Data Transmission Mechanism in UAV-Aided Networks
J Zhang, J Weng, W Luo, JN Liu, A Yang, J Lin, Z Zhang, H Li
IEEE Network 32 (5), 118 - 123, 2018
142018
Maliciously secure and efficient large-scale genome-wide association study with multi-party computation
C Dong, J Weng, JN Liu, A Yang, Z Liu, Y Yang, J Ma
IEEE Transactions on Dependable and Secure Computing 20 (2), 1243-1257, 2022
92022
BB-VDF: Enabling Accountability and Fine-grained Access Control for Vehicular Digital Forensics through Blockchain.
M Li, J Weng, JN Liu, X Lin, C Obimbo
IACR Cryptol. ePrint Arch. 2020, 11, 2020
72020
Cross-domain identity-based matchmaking encryption
A Wu, J Weng, W Luo, A Yang, JN Liu, Z Jiang
Cryptology ePrint Archive, 2022
52022
Mobile authentication system based on national regulation and NFC technology
C Cai, J Weng, J Liu
2016 IEEE First International Conference on Data Science in Cyberspace (DSC …, 2016
52016
Review of smart grid security
J Liu, J Weng
Information Network Security 5, 78-84, 2016
32016
Efficient identity-based broadcast encryption scheme on lattices for the Internet of Things
K He, X Liu, JN Liu, W Liu
Security and Communication Networks 2021, 1-11, 2021
12021
智能电网安全研究综述
刘家男, 翁健
信息网络安全, 78-84, 2016
12016
可穿戴设备拥有者转换协议的设计
胡舜, 翁健, 刘家男
网络与信息安全学报 1 (1), 72-80, 2015
12015
系统目前无法执行此操作,请稍后再试。
文章 1–20