Jia XU  (徐佳)
Jia XU (徐佳)
SingTel
在 singtel.com 的电子邮件经过验证
标题
引用次数
引用次数
年份
Leakage-Resilient Client-side Deduplication of Encrypted Data in Cloud Storage (Old Title: Secure Cloud Storage with Encrypted Data using File-Based Authentication)
J Xu, EC Chang, J Zhou
Cryptology ePrint Archive, Report 2011/538, 0
257*
Weak Leakage-Resilient Client-side Deduplication of Encrypted Data in Cloud Storage
J Xu, EC Chang, J Zhou
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
2562013
Remote integrity check with dishonest storage server
EC Chang, J Xu
Computer Security-ESORICS 2008, 223-237, 2008
1382008
Towards Efficient Proofs of Retrievability
J Xu, EC Chang
AsiaCCS, 2012
1102012
Security concerns in popular cloud storage services
CK Chu, WT Zhu, J Han, JK Liu, J Xu, J Zhou
IEEE Pervasive Computing 12 (4), 50-57, 2013
1052013
Short redactable signatures using random trees
EC Chang, C Lim, J Xu
Topics in Cryptology–CT-RSA 2009, 133-147, 2009
782009
Passive attacks against searchable encryption
J Ning, J Xu, K Liang, F Zhang, EC Chang
IEEE Transactions on Information Forensics and Security 14 (3), 789-802, 2018
462018
ID repetition in Kad
J Yu, C Fang, J Xu, EC Chang, Z Li
Peer-to-Peer Computing, 2009. P2P'09. IEEE Ninth International Conference on …, 2009
392009
Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage
A Yang, J Xu, J Weng, J Zhou, DS Wong
IEEE Transactions on Cloud Computing, 2018
352018
Leakage Resilient Proofs of Ownership in Cloud Storage, Revisited
J Xu, J Zhou
International Conference on Applied Cryptography and Network Security (ACNS …, 2013
262013
Auditing the Auditor: Secure Delegation of Auditing Operation over Cloud Storage
J Xu
https://eprint.iacr.org/2011/304, 2011
202011
HAtt: Hybrid Remote Attestation for the Internet of Things with High Availability
MN Aman, MH Basheer, S Dash, JW Wong, J Xu, HW Lim, B Sikdar
IEEE Internet of Things Journal, 2020
132020
Lightweight Delegatable Proofs of Storage
J Xu, A Yang, J Zhou, DS Wong
European Symposium on Research in Computer Security, 324-343, 2016
112016
On Directed Transitive Signature.
J Xu
IACR Cryptology ePrint Archive 2009, 209, 2009
112009
Authenticating Aggregate Range Queries over Multidimensional Dataset.
J Xu, EC Chang
IACR Cryptology ePrint Archive 2010, 50, 2010
92010
Lightweight and Privacy-Preserving Delegatable Proofs of Storage.
J Xu, A Yang, J Zhou, DS Wong
IACR Cryptology ePrint Archive 2014, 395, 2014
62014
Towards Efficient Provable Data Possession.
J Xu, EC Chang
IACR Cryptology ePrint Archive 2011, 574, 2011
62011
Zhoujun Li. Id repetition in kad
J Yu, C Fang, J Xu, EC Chang
Peer-to-Peer Computing, 111-120, 2009
52009
: Privacy-Preserving Integration and Sharing of Datasets
HW Lim, GS Poh, J Xu, V Chittawar
IEEE Transactions on Information Forensics and Security 15, 564-577, 2019
42019
Id repetition in structured p2p networks
J Yu, Z Li, P Xiao, C Fang, J Xu, EC Chang
The Computer Journal 54 (6), 962-975, 2011
42011
系统目前无法执行此操作,请稍后再试。
文章 1–20