Baodong Qin
Orcid: 0000-0001-7617-5462
According to our database1,
Baodong Qin
authored at least 69 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
A pairing-free certificate-based key-insulated aggregate signature scheme for wireless medical sensor networks.
Peer Peer Netw. Appl., March, 2024
Further construction of even-variable balanced rotation symmetric Boolean functions with optimal algebraic immunity.
Theor. Comput. Sci., 2024
J. King Saud Univ. Comput. Inf. Sci., 2024
EFTA: An Efficient and Fault-Tolerant Data Aggregation Scheme without TTP in Smart Grid.
Comput. J., 2024
2023
A lattice-based designated-server public-key authenticated encryption with keyword search.
J. Syst. Archit., December, 2023
Discret. Appl. Math., October, 2023
Password-authenticated proofs of retrievability for multiple devices checking cloud data.
J. Inf. Secur. Appl., June, 2023
Sensors, March, 2023
Token-Based Biometric Enhanced Key Derivation for Authentication Over Wireless Networks.
IEEE Trans. Netw. Sci. Eng., 2023
Data Secure De-Duplication and Recovery Based on Public Key Encryption With Keyword Search.
IEEE Access, 2023
2022
J. Syst. Archit., 2022
Blockchain-Based Auditable Privacy-Preserving Data Classification for Internet of Things.
IEEE Internet Things J., 2022
2021
Public-key encryption with bidirectional keyword search and its application to encrypted emails.
Comput. Stand. Interfaces, 2021
Proceedings of the Provable and Practical Security, 2021
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
2020
An Efficient Searchable Public-Key Authenticated Encryption for Cloud-Assisted Medical Internet of Things.
Wirel. Commun. Mob. Comput., 2020
Cloud-Assisted Attribute-Based Data Sharing with Efficient User Revocation in the Internet of Things.
IEEE Wirel. Commun., 2020
Public-key authenticated encryption with keyword search revisited: Security model and constructions.
Inf. Sci., 2020
Key regeneration-free ciphertext-policy attribute-based encryption and its application.
Inf. Sci., 2020
Sci. China Inf. Sci., 2020
2019
A QR Code Secret Hiding Scheme against Contrast Analysis Attack for the Internet of Things.
Secur. Commun. Networks, 2019
Secur. Commun. Networks, 2019
(Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance.
Inf. Sci., 2019
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
Generic Approach to Outsource the Decryption of Attribute-Based Encryption in Cloud Computing.
IEEE Access, 2019
2018
Theor. Comput. Sci., 2018
Des. Codes Cryptogr., 2018
LR-RRA-CCA secure functional encryption for randomized functionalities from trapdoor HPS and LAF.
Sci. China Inf. Sci., 2018
Sci. China Inf. Sci., 2018
Proceedings of the Topics in Cryptology - CT-RSA 2018, 2018
2017
IEEE Trans. Serv. Comput., 2017
J. Comput. Syst. Sci., 2017
Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman.
Inf. Sci., 2017
New efficient chosen ciphertext secure Elgamal encryption schemes for secure Cloud storage service.
Int. J. Web Grid Serv., 2017
A new construction on randomized message-locked encryption in the standard model via UCEs.
Sci. China Inf. Sci., 2017
Proceedings of the Provable Security, 2017
Server-Aided Revocable Attribute-Based Encryption Resilient to Decryption Key Exposure.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017
2016
Privacy-Preserving Patient-Centric Clinical Decision Support System on Naïve Bayesian Classification.
IEEE J. Biomed. Health Informatics, 2016
IEEE Trans. Inf. Forensics Secur., 2016
A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains.
IEEE Trans. Computers, 2016
Secur. Commun. Networks, 2016
Comput. J., 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016
2015
IEEE Trans. Inf. Forensics Secur., 2015
Efficient chosen-ciphertext secure public-key encryption scheme with high leakage-resilience.
IET Inf. Secur., 2015
IACR Cryptol. ePrint Arch., 2015
Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing.
IACR Cryptol. ePrint Arch., 2015
Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited.
Int. J. Appl. Math. Comput. Sci., 2015
Proceedings of the 24th International Conference on Computer Communication and Networks, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
2013
Secur. Commun. Networks, 2013
Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter.
IACR Cryptol. ePrint Arch., 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the first ACM workshop on Asia public-key cryptography, 2013
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013
2012
Sender Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited.
IACR Cryptol. ePrint Arch., 2012
2009
Comput. Electr. Eng., 2009
2008
2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007