Jianting Ning
Orcid: 0000-0001-7165-398X
According to our database1,
Jianting Ning
authored at least 133 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Fine-Grained and Sanitizable Access Control Service for IoT-Based Digital Subscriptions.
IEEE Internet Things J., October, 2024
Lightweight, verifiable and revocable EHRs sharing with fine-grained bilateral access control.
Clust. Comput., October, 2024
Secure multi-asks/bids with verifiable equality retrieval for double auction in smart grid.
Peer Peer Netw. Appl., September, 2024
An Access Control Scheme With Privacy-Preserving Authentication and Flexible Revocation for Smart Healthcare.
IEEE J. Biomed. Health Informatics, June, 2024
A Detection Method Against Selfish Mining-Like Attacks Based on Ensemble Deep Learning in IoT.
IEEE Internet Things J., June, 2024
Time-Controllable Keyword Search Scheme With Efficient Revocation in Mobile E-Health Cloud.
IEEE Trans. Mob. Comput., May, 2024
A Security-Enhanced Certificateless Designated Verifier Aggregate Signature Scheme for HWMSNs in the YOSO Model.
IEEE Internet Things J., March, 2024
Theor. Comput. Sci., February, 2024
Privacy-Preserving Traceable Encrypted Traffic Inspection in Blockchain-Based Industrial IoT.
IEEE Internet Things J., January, 2024
Non-interactive Boolean Searchable Asymmetric Encryption With Bilateral Access Control.
Comput. J., January, 2024
IEEE Trans. Serv. Comput., 2024
An Adaptive Secure and Practical Data Sharing System With Verifiable Outsourced Decryption.
IEEE Trans. Serv. Comput., 2024
Single-Server Public-Key Authenticated Encryption With Keyword Search and Its Application in IIoT.
IEEE Trans. Netw. Sci. Eng., 2024
Practical Searchable Symmetric Encryption for Arbitrary Boolean Query-Join in Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2024
FACOS: Enabling Privacy Protection Through Fine-Grained Access Control With On-Chain and Off-Chain System.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
FIBNet: Privacy-Enhancing Approach for Face Biometrics Based on the Information Bottleneck Principle.
IEEE Trans. Inf. Forensics Secur., 2024
Communication-Efficient Privacy-Preserving Neural Network Inference via Arithmetic Secret Sharing.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Verifiable Outsourced Attribute-Based Encryption Scheme for Cloud-Assisted Mobile E-Health System.
IEEE Trans. Dependable Secur. Comput., 2024
Theor. Comput. Sci., 2024
TRA-PS: Accountable data Pub/Sub service with fast and fine-grained controllable subscription.
J. Syst. Archit., 2024
E-Tenon: An efficient privacy-preserving secure open data sharing scheme for EHR system.
J. Comput. Secur., 2024
Designated server proxy re-encryption with boolean keyword search for E-Health Clouds.
J. Inf. Secur. Appl., 2024
IACR Cryptol. ePrint Arch., 2024
Comput. Stand. Interfaces, 2024
Blockchain-based efficient verifiable outsourced attribute-based encryption in cloud.
Comput. Stand. Interfaces, 2024
CoRR, 2024
2023
Verifiable Conjunctive Dynamic Searchable Symmetric Encryption With Forward and Backward Privacy.
Comput. J., October, 2023
Comput. J., September, 2023
SDRLAP: A secure lightweight RFID mutual authentication protocol based on PUF with strong desynchronization resistance.
Peer Peer Netw. Appl., August, 2023
Deep-Reuse-Enabled Common Satellite Network via Collaborative Blockchains: Architecture, Challenges, and Solutions.
IEEE Commun. Mag., August, 2023
BASRAC: An efficient batch authentication scheme with rule-based access control for VANETs.
Veh. Commun., April, 2023
Trustworthy Announcement Dissemination Scheme With Blockchain-Assisted Vehicular Cloud.
IEEE Trans. Intell. Transp. Syst., February, 2023
DuMSE: Toward Practical and Dynamic Multiuser Search Over Encrypted Cloud Data Against Keyword Guessing Attack.
IEEE Internet Things J., January, 2023
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Serv. Comput., 2023
Catch me if you can: A Secure Bilateral Access Control System With Anonymous Credentials.
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Serv. Comput., 2023
Efficient Construction of Verifiable Timed Signatures and Its Application in Scalable Payments.
IEEE Trans. Inf. Forensics Secur., 2023
AADEC: Anonymous and Auditable Distributed Access Control for Edge Computing Services.
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
Secure Cloud-Assisted Data Pub/Sub Service With Fine-Grained Bilateral Access Control.
IEEE Trans. Inf. Forensics Secur., 2023
An Adaptively Secure and Efficient Data Sharing System for Dynamic User Groups in Cloud.
IEEE Trans. Inf. Forensics Secur., 2023
Multi-Client Boolean File Retrieval With Adaptable Authorization Switching for Secure Cloud Search Services.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Cloud Comput., 2023
DCDPI: Dynamic and Continuous Deep Packet Inspection in Secure Outsourced Middleboxes.
IEEE Trans. Cloud Comput., 2023
RelCLAS: A Reliable Malicious KGC-Resistant Certificateless Aggregate Signature Protocol for Vehicular Ad Hoc Networks.
IEEE Internet Things J., 2023
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023
2022
IEEE Trans. Serv. Comput., 2022
A Traitor-Resistant and Dynamic Anonymous Communication Service for Cloud-Based VANETs.
IEEE Trans. Serv. Comput., 2022
Subversion-Resistant and Consistent Attribute-Based Keyword Search for Secure Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Inf. Forensics Secur., 2022
Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing.
IEEE Trans. Dependable Secur. Comput., 2022
Untouchable Once Revoking: A Practical and Secure Dynamic EHR Sharing System via Cloud.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Differentially Oblivious Data Analysis With Intel SGX: Design, Optimization, and Evaluation.
IEEE Trans. Dependable Secur. Comput., 2022
Update Recovery Attacks on Encrypted Database Within Two Updates Using Range Queries Leakage.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Fine-Grained and Controllably Editable Data Sharing With Accountability in Cloud Storage.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Cloud Comput., 2022
Peer-to-Peer Netw. Appl., 2022
MP-BADNet<sup>+</sup>: Secure and effective backdoor attack detection and mitigation protocols among multi-participants in private DNNs.
Peer-to-Peer Netw. Appl., 2022
J. Syst. Archit., 2022
Blockchain-Enabled decentralized Attribute-Based access control with policy hiding for smart healthcare.
J. King Saud Univ. Comput. Inf. Sci., 2022
IEEE Internet Things J., 2022
Group Time-based One-time Passwords and its Application to Efficient Privacy-Preserving Proof of Location.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Trans. Emerg. Telecommun. Technol., 2022
Comput. Sci. Rev., 2022
CoRR, 2022
E-Tenon: An Efficient Privacy-Preserving Secure Open Data Sharing Scheme for EHR System.
CoRR, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the Information Security Practice and Experience, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022
2021
IEEE Trans. Serv. Comput., 2021
IEEE Trans. Serv. Comput., 2021
IEEE Trans. Inf. Forensics Secur., 2021
Server-Aided Bilateral Access Control for Secure Data Sharing With Dynamic User Groups.
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2021
Secur. Commun. Networks, 2021
Secur. Commun. Networks, 2021
Distributed additive encryption and quantization for privacy preserving federated deep learning.
Neurocomputing, 2021
Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-secure IBE.
IACR Cryptol. ePrint Arch., 2021
Trans. Emerg. Telecommun. Technol., 2021
A Survey of Privacy-Preserving Techniques for Encrypted Traffic Inspection over Network Middleboxes.
CoRR, 2021
Proceedings of the SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies, 2021
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
Lightweight Delegated Authentication with Identity Fraud Detection for Cyber-physical Systems.
Proceedings of the 7th ACM on Cyber-Physical System Security Workshop, 2021
LEAP: Leakage-Abuse Attack on Efficiently Deployable, Efficiently Searchable Encryption with Partially Known Dataset.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Group Time-based One-time Passwords and its Application to Efficient Privacy-Preserving Proof of Location.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
MP-BADNet: A Backdoor-Attack Detection and Identification Protocol among Multi-Participants in Private Deep Neural Networks.
Proceedings of the ACM TURC 2021: ACM Turing Award Celebration Conference - Hefei, China, 30 July 2021, 2021
2020
Theor. Comput. Sci., 2020
Int. J. Embed. Syst., 2020
Post quantum proxy signature scheme based on the multivariate public key cryptographic signature.
Int. J. Distributed Sens. Networks, 2020
SFE-GACN: A Novel Unknown Attack Detection Method Using Intra Categories Generation in Embedding Space.
CoRR, 2020
Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment.
Proceedings of the Computer Security - ESORICS 2020, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
IEEE Trans. Inf. Forensics Secur., 2019
Inf. Sci., 2019
Lightweight Privacy-Preserving Identity-Based Verifiable IoT-Based Health Storage System.
IEEE Internet Things J., 2019
Comput. J., 2019
A New Encrypted Data Switching Protocol: Bridging IBE and ABE Without Loss of Data Confidentiality.
IEEE Access, 2019
Proceedings of the Provable Security, 2019
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019
PrivDPI: Privacy-Preserving Encrypted Traffic Inspection with Reusable Obfuscated Rules.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Auditable σ-Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2018
White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively.
IEEE Trans. Dependable Secur. Comput., 2018
IACR Cryptol. ePrint Arch., 2018
Privacy-preserving personal data operation on mobile cloud - Chances and challenges over advanced persistent threat.
Future Gener. Comput. Syst., 2018
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
2017
Proceedings of the Provable Security, 2017
2016
Traceable CP-ABE with Short Ciphertexts: How to Catch People Selling Decryption Devices on eBay Efficiently.
Proceedings of the Computer Security - ESORICS 2016, 2016
2015
White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes.
IEEE Trans. Inf. Forensics Secur., 2015
Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud.
IACR Cryptol. ePrint Arch., 2015
2014
Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability.
Proceedings of the Computer Security - ESORICS 2014, 2014
2011
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
A Trivariate Polynomial-based Dynamic Key Management Scheme for Wireless Sensor Networks.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011