Jiaoli Shi
Orcid: 0000-0002-8908-1921
According to our database1,
Jiaoli Shi
authored at least 25 papers
between 2014 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2014
2016
2018
2020
2022
2024
0
1
2
3
4
5
6
7
8
9
3
2
2
1
4
6
1
2
2
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Efficient and Verifiable Range Query Scheme for Encrypted Geographical Information in Untrusted Cloud Environments.
ISPRS Int. J. Geo Inf., August, 2024
Int. J. Web Serv. Res., 2024
Secure multi-dimensional data retrieval with access control and range query in the cloud.
Inf. Syst., 2024
Proceedings of the Edge Computing - EDGE 2024, 2024
Proceedings of the Edge Computing - EDGE 2024, 2024
Privacy Preserving Adjacency Query Supporting Homoionym Search over Medical Graph Data in Cloud Computing.
Proceedings of the CLOUD Computing - CLOUD 2024, 2024
Proceedings of the CLOUD Computing - CLOUD 2024, 2024
2023
An Identity-Based Proxy Re-Encryption Scheme With Single-Hop Conditional Delegation and Multi-Hop Ciphertext Evolution for Secure Cloud Data Sharing.
IEEE Trans. Inf. Forensics Secur., 2023
Secure Cloud Storage and Retrieval of Personal Health Data From Smart Wearable Devices With Privacy-Preserving Techniques.
Int. J. Web Serv. Res., 2023
A Lightening Fine-grained Access Control Scheme Supporting Full Policy Hiding in Cloud Storage.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023
Proceedings of the Internet of Things, 2023
Secure and Fast Query Approach for High-Precision Multi-dimensional Satellite Remote Sensing Data.
Proceedings of the Edge Computing - EDGE 2023, 2023
A Lightweight Access Control Scheme Supporting Policy Hidden Based on Path Bloom Filter.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023
Proceedings of the Big Data - BigData 2023, 2023
Optimizing Read Performance in Lightweight Blockchain with Cooperative Storage Scheme.
Proceedings of the Fifth International Conference on Blockchain Computing and Applications, 2023
2022
Proceedings of the Wireless Internet - 15th EAI International Conference, 2022
2021
A Collusion-Resistant Blockchain-Enabled Data Sharing Scheme with Decryption Outsourcing under Time Restriction.
Secur. Commun. Networks, 2021
Enabling Decentralized and Dynamic Data Integrity Verification for Secure Cloud Storage via T-Merkle Hash Tree Based Blockchain.
Mob. Inf. Syst., 2021
2020
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020
IM-ACS: An Access Control Scheme Supporting Informal Non-malleable Security in Mobile Media Sharing System.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020
2016
Secur. Commun. Networks, 2016
Proceedings of the IEEE Symposium on Computers and Communication, 2016
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016
2015
Proceedings of the 23rd IEEE International Symposium on Quality of Service, 2015
2014
An Access Control Scheme with Direct Cloud-Aided Attribute Revocation Using Version Key.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2014