Jiangchun Ren
According to our database1,
Jiangchun Ren
authored at least 32 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Symmetry, 2024
2018
Practical, Provably Secure, and Black-Box Traceable CP-ABE for Cryptographic Cloud Storage.
Symmetry, 2018
A Novel Vertical Fragmentation Method for Privacy Protection Based on Entropy Minimization in a Relational Database.
Symmetry, 2018
RIM4J: An Architecture for Language-Supported Runtime Measurement against Malicious Bytecode in Cloud Computing.
Symmetry, 2018
Astrape: An Efficient Concurrent Cloud Attestation with Ciphertext-Policy Attribute-Based Encryption.
Symmetry, 2018
Compulsory traceable ciphertext-policy attribute-based encryption against privilege abuse in fog computing.
Future Gener. Comput. Syst., 2018
2017
KSII Trans. Internet Inf. Syst., 2017
Proceedings of the 36th IEEE Symposium on Reliable Distributed Systems, 2017
Decoupling Security Services from IaaS Cloud Through Remote Virtual Machine Introspection.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
2016
Int. J. Embed. Syst., 2016
Proceedings of the IEEE International Conference on Web Services, 2016
Proceedings of the Algorithms and Architectures for Parallel Processing, 2016
ESI-Cloud: Extending Virtual Machine Introspection for Integrating Multiple Security Services.
Proceedings of the IEEE International Conference on Services Computing, 2016
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016
2015
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
2014
Cryptanalysis of Remote Data Integrity Checking Protocol Proposed by L. Chen for Cloud Storage.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
2013
Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage.
J. Zhejiang Univ. Sci. C, 2013
2012
Trusted Bytecode Virtual Machine Module: A Novel Method for Dynamic Remote Attestation in Cloud Computing.
Int. J. Comput. Intell. Syst., 2012
Keys Distributing Optimization of CP-ABE Based Access Control in Cryptographic Cloud Storage.
IEICE Trans. Inf. Syst., 2012
Proceedings of the Seventh International Conference on Digital Information Management, 2012
Attributes Union in CP-ABE Algorithm for Large Universe Cryptographic Access Control.
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012
2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
SWHash: An Efficient Data Integrity Verification Scheme Appropriate for USB Flash Disk.
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the 2nd International Symposium on Intelligence Information Processing and Trusted Computing, 2011
Trusted Bytecode Virtual Machine Module: Towards Dynamic Remote Attestation in Cloud Computing.
Proceedings of the 2nd International Symposium on Intelligence Information Processing and Trusted Computing, 2011
A novel file-level continuous data protection mechanism oriented service application.
Proceedings of the ICIMCS 2011, 2011
Proceedings of the ICIMCS 2011, 2011
2008
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008
2005
Design and Implementation a TPM Chip SUP320 by SOC.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005
Proceedings of the 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2005), 2005