Jin Li
Orcid: 0000-0003-0385-8793Affiliations:
- Guangzhou University, School of Computational Science & Education Software, China
- Illinois Institute of Technology, IL, USA (former)
- KAIST, Daejon, South Korea (former)
- Sun Yat-Sen University, Hangzhou, China (PhD 2007)
According to our database1,
Jin Li
authored at least 310 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Detection of Adversarial Facial Accessory Presentation Attacks Using Local Face Differential.
ACM Trans. Multim. Comput. Commun. Appl., July, 2024
Security and Privacy Issues in Deep Reinforcement Learning: Threats and Countermeasures.
ACM Comput. Surv., June, 2024
IEEE Trans. Circuits Syst. Video Technol., April, 2024
Proc. VLDB Endow., April, 2024
IEEE Trans. Computers, February, 2024
ACM Trans. Priv. Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Self-sovereign identity management in ciphertext policy attribute based encryption for IoT protocols.
J. Inf. Secur. Appl., 2024
Expert Syst. Appl., 2024
Are You Copying My Prompt? Protecting the Copyright of Vision Prompt for VPaaS via Watermark.
CoRR, 2024
Proceedings of the 51st ACM/IEEE Annual International Symposium on Computer Architecture, 2024
2023
Semi-Fragile Reversible Watermarking for 3D Models Using Spherical Crown Volume Division.
IEEE Trans. Circuits Syst. Video Technol., November, 2023
A blockchain-enabled collaborative intrusion detection framework for SDN-assisted cyber-physical systems.
Int. J. Inf. Sec., October, 2023
A novel extended multimodal AI framework towards vulnerability detection in smart contracts.
Inf. Sci., July, 2023
IEEE Trans. Knowl. Data Eng., June, 2023
Load balancing inside programmable data planes based on network modeling prediction using a GNN with network behaviors.
Comput. Networks, May, 2023
Siamese transformer network-based similarity metric learning for cross-source remote sensing image retrieval.
Neural Comput. Appl., April, 2023
Privacy-Preserving Multi-Granular Federated Neural Architecture Search - A General Framework.
IEEE Trans. Knowl. Data Eng., March, 2023
GAN-Siamese Network for Cross-Domain Vehicle Re-Identification in Intelligent Transport Systems.
IEEE Trans. Netw. Sci. Eng., 2023
IEEE Trans. Mob. Comput., 2023
Sequential Order-Aware Coding-Based Robust Subspace Clustering for Human Action Recognition in Untrimmed Videos.
IEEE Trans. Image Process., 2023
Collaborative Sampling for Partial Multi-Dimensional Value Collection Under Local Differential Privacy.
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Multifactor Incentive Mechanism for Federated Learning in IoT: A Stackelberg Game Approach.
IEEE Internet Things J., 2023
GanFinger: GAN-Based Fingerprint Generation for Deep Neural Network Ownership Verification.
CoRR, 2023
3DFed: Adaptive and Extensible Framework for Covert Backdoor Attack in Federated Learning.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
DTrust: Toward Dynamic Trust Levels Assessment in Time-Varying Online Social Networks.
Proceedings of the IEEE INFOCOM 2023, 2023
Proceedings of the 39th IEEE International Conference on Data Engineering, 2023
Proceedings of the IEEE International Conference on Acoustics, 2023
Proceedings of the Data Mining and Big Data - 8th International Conference, 2023
Boost Off/On-Manifold Adversarial Robustness for Deep Learning with Latent Representation Mixup.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
2022
IEEE Trans. Serv. Comput., 2022
IMS: An Identity-Based Many-to-Many Subscription Scheme With Efficient Key Management for Wireless Broadcast Systems.
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Multim., 2022
IEEE Trans. Knowl. Data Eng., 2022
IEEE Trans. Knowl. Data Eng., 2022
EncodeORE: Reducing Leakage and Preserving Practicality in Order-Revealing Encryption.
IEEE Trans. Dependable Secur. Comput., 2022
Eurus: Towards an Efficient Searchable Symmetric Encryption With Size Pattern Protection.
IEEE Trans. Dependable Secur. Comput., 2022
Efficient and Secure Outsourcing of Differentially Private Data Publishing With Multiple Evaluators.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Circuits Syst. Video Technol., 2022
Enhancing blockchain-based filtration mechanism via IPFS for collaborative intrusion detection in IoT networks.
J. Syst. Archit., 2022
J. Ambient Intell. Humaniz. Comput., 2022
Resource Allocation in IoT Edge Computing via Concurrent Federated Reinforcement Learning.
IEEE Internet Things J., 2022
Int. J. Intell. Syst., 2022
BlockCSDN: Towards Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking.
IEICE Trans. Inf. Syst., 2022
Evaluating intrusion sensitivity allocation with supervised learning in collaborative intrusion detection.
Concurr. Comput. Pract. Exp., 2022
Reinforcement learning based energy efficient robot relay for unmanned aerial vehicles against smart jamming.
Sci. China Inf. Sci., 2022
Labrador: towards fair and auditable data sharing in cloud computing with long-term privacy.
Sci. China Inf. Sci., 2022
Birds of a Feather Flock Together: How Set Bias Helps to Deanonymize You via Revealed Intersection Sizes.
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
IEEE Trans. Knowl. Data Eng., 2021
IEEE Trans. Intell. Transp. Syst., 2021
An Automatic Cost Learning Framework for Image Steganography Using Deep Reinforcement Learning.
IEEE Trans. Inf. Forensics Secur., 2021
VeriFL: Communication-Efficient and Fast Verifiable Aggregation for Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Dependable Secur. Comput., 2021
NPMML: A Framework for Non-Interactive Privacy-Preserving Multi-Party Machine Learning.
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Circuits Syst. Video Technol., 2021
TrajectoryCNN: A New Spatio-Temporal Feature Learning Network for Human Motion Prediction.
IEEE Trans. Circuits Syst. Video Technol., 2021
Mob. Networks Appl., 2021
Mob. Networks Appl., 2021
Lattice-based unidirectional infinite-use proxy re-signatures with private re-signature key.
J. Comput. Syst. Sci., 2021
Inf. Sci., 2021
Toward a blockchain-based framework for challenge-based collaborative intrusion detection.
Int. J. Inf. Sec., 2021
Challenge-based collaborative intrusion detection in software-defined networking: an evaluation.
Digit. Commun. Networks, 2021
Cetus: an efficient symmetric searchable encryption against file-injection attack with SGX.
Sci. China Inf. Sci., 2021
Enhancing Blackslist-Based Packet Filtration Using Blockchain in Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
Proceedings of the Provable and Practical Security, 2021
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021
ABAC: Anonymous Bilateral Access Control Protocol with Traceability for Fog-Assisted Mobile Crowdsensing.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
2020
Secure Real-Time Traffic Data Aggregation With Batch Verification for Vehicular Cloud in VANETs.
IEEE Trans. Veh. Technol., 2020
IEEE Trans. Serv. Comput., 2020
IEEE Trans. Knowl. Data Eng., 2020
J. Netw. Comput. Appl., 2020
Special issue on advanced techniques for security and privacy of internet-of-things with machine learning.
J. Netw. Comput. Appl., 2020
J. Inf. Secur. Appl., 2020
A training-integrity privacy-preserving federated learning scheme with trusted execution environment.
Inf. Sci., 2020
MAN: Mutual Attention Neural Networks Model for Aspect-Level Sentiment Classification in SIoT.
IEEE Internet Things J., 2020
How to Make Private Distributed Cardinality Estimation Practical, and Get Differential Privacy for Free.
IACR Cryptol. ePrint Arch., 2020
Secure and efficient outsourcing differential privacy data release scheme in Cyber-physical system.
Future Gener. Comput. Syst., 2020
Digit. Commun. Networks, 2020
Efficient privacy-preserving authentication protocol using PUFs with blockchain smart contracts.
Comput. Secur., 2020
TruNeo: an integrated pipeline improves personalized true tumor neoantigen identification.
BMC Bioinform., 2020
Proceedings of the KDD '20: The 26th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2020
Proceedings of the IEEE Global Communications Conference, 2020
Proceedings of the Computer Security - ESORICS 2020, 2020
PrivacyGuard: Enforcing Private Data Usage Control with Blockchain and Attested Off-Chain Contract Execution.
Proceedings of the Computer Security - ESORICS 2020, 2020
2019
ACM Trans. Intell. Syst. Technol., 2019
Efficient and Robust Certificateless Signature for Data Crowdsensing in Cloud-Assisted Industrial IoT.
IEEE Trans. Ind. Informatics, 2019
IEEE Trans. Inf. Forensics Secur., 2019
J. Parallel Distributed Comput., 2019
Tc-PEDCKS: Towards time controlled public key encryption with delegatable conjunctive keyword search for Internet of Things.
J. Netw. Comput. Appl., 2019
J. Netw. Comput. Appl., 2019
J. Ambient Intell. Humaniz. Comput., 2019
Inf. Sci., 2019
Inf. Sci., 2019
Comments on "A Large-Scale Concurrent Data Anonymous Batch Verification Scheme for Mobile Healthcare Crowd Sensing".
IEEE Internet Things J., 2019
IEEE Internet Things J., 2019
Future Gener. Comput. Syst., 2019
IoT-FBAC: Function-based access control scheme using identity-based encryption in IoT.
Future Gener. Comput. Syst., 2019
Frontiers Comput. Sci., 2019
Simulation-based selective opening security for receivers under chosen-ciphertext attacks.
Des. Codes Cryptogr., 2019
CoRR, 2019
Verifiable Chebyshev maps-based chaotic encryption schemes with outsourcing computations in the cloud/fog scenarios.
Concurr. Comput. Pract. Exp., 2019
A Lightweight Privacy-Preserving Protocol for VANETs Based on Secure Outsourcing Computing.
IEEE Access, 2019
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019
Proceedings of the Applied Cryptography and Network Security Workshops, 2019
2018
IEEE Trans. Ind. Informatics, 2018
Significant Permission Identification for Machine-Learning-Based Android Malware Detection.
IEEE Trans. Ind. Informatics, 2018
IEEE Trans. Inf. Forensics Secur., 2018
Verifiable privacy-preserving single-layer perceptron training scheme in cloud computing.
Soft Comput., 2018
Guest Editorial: Security and Privacy for Multimedia in the Internet of Things (IoT).
Multim. Tools Appl., 2018
A fog-based privacy-preserving approach for distributed signature-based intrusion detection.
J. Parallel Distributed Comput., 2018
Privacy-preserving communication and power injection over vehicle networks and 5G smart grid slice.
J. Netw. Comput. Appl., 2018
Multi-authority fine-grained access control with accountability and its application in cloud.
J. Netw. Comput. Appl., 2018
Inf. Sci., 2018
Inf. Sci., 2018
Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison attack.
Inf. Sci., 2018
Verifiable Outsourcing Computation for Matrix Multiplication With Improved Efficiency and Applicability.
IEEE Internet Things J., 2018
Key-aggregate searchable encryption under multi-owner setting for group data sharing in the cloud.
Int. J. Web Grid Serv., 2018
Hedged Nonce-Based Public-Key Encryption: Adaptive Security under Randomness Failures.
IACR Cryptol. ePrint Arch., 2018
Future Gener. Comput. Syst., 2018
Future Gener. Comput. Syst., 2018
Future Gener. Comput. Syst., 2018
Future Gener. Comput. Syst., 2018
JFCGuard: Detecting juice filming charging attack via processor usage analysis on smartphones.
Comput. Secur., 2018
Comput. Secur., 2018
Clust. Comput., 2018
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018
Proceedings of the Network and System Security - 12th International Conference, 2018
Towards Securing Challenge-Based Collaborative Intrusion Detection Networks via Message Verification.
Proceedings of the Information Security Practice and Experience, 2018
Towards Secure Cloud Data Similarity Retrieval: Privacy Preserving Near-Duplicate Image Data Detection.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018
Proceedings of the Computer Security, 2018
Enhancing Intelligent Alarm Reduction for Distributed Intrusion Detection Systems via Edge Computing.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
IEEE Trans. Cloud Comput., 2017
Design and theoretical analysis of virtual machine placement algorithm based on peak workload characteristics.
Soft Comput., 2017
Soft Comput., 2017
Model approach to grammatical evolution: deep-structured analyzing of model and representation.
Soft Comput., 2017
Soft Comput., 2017
IEEE Syst. J., 2017
Pers. Ubiquitous Comput., 2017
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing.
Inf. Sci., 2017
Inf. Sci., 2017
TrDup: enhancing secure data deduplication with user traceability in cloud computing.
Int. J. Web Grid Serv., 2017
IACR Cryptol. ePrint Arch., 2017
Towards achieving flexible and verifiable search for outsourced database in cloud computing.
Future Gener. Comput. Syst., 2017
Future Gener. Comput. Syst., 2017
Clust. Comput., 2017
IEEE Access, 2017
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Exploring Energy Consumption of Juice Filming Charging Attack on Smartphones: A Pilot Study.
Proceedings of the Network and System Security - 11th International Conference, 2017
Home Location Protection in Mobile Social Networks: A Community Based Method (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017
A Hierarchical VDB Scheme with Scalable Verification and Tampered Record Localization.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017
Proceedings of the Cloud Computing and Security - Third International Conference, 2017
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017
A Privacy-Preserving Framework for Collaborative Intrusion Detection Networks Through Fog Computing.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, 2017
2016
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Trans. Computers, 2016
High-dimension space projection-based biometric encryption for fingerprint with fuzzy minutia.
Soft Comput., 2016
Soft Comput., 2016
Soft Comput., 2016
Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing.
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
Pervasive Mob. Comput., 2016
J. Ambient Intell. Humaniz. Comput., 2016
N-Mobishare: new privacy-preserving location-sharing system for mobile online social networks.
Int. J. Comput. Math., 2016
Intell. Autom. Soft Comput., 2016
Comput. Stand. Interfaces, 2016
Efficient Generic Construction of CCA-Secure Identity-Based Encryption from Randomness Extraction.
Comput. J., 2016
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
IEEE Trans. Parallel Distributed Syst., 2015
Privacy-aware attribute-based PHR sharing with user accountability in cloud computing.
J. Supercomput., 2015
IEEE Trans. Inf. Forensics Secur., 2015
IEEE Trans. Dependable Secur. Comput., 2015
Theor. Comput. Sci., 2015
OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices.
IEEE Trans. Cloud Comput., 2015
IEEE Trans. Computers, 2015
IEEE Trans. Computers, 2015
Designing cloud-based electronic health record system with attribute-based encryption.
Multim. Tools Appl., 2015
Mob. Inf. Syst., 2015
L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing.
Knowl. Based Syst., 2015
J. High Speed Networks, 2015
J. Comput. Syst. Sci., 2015
J. Comput. Secur., 2015
J. Ambient Intell. Humaniz. Comput., 2015
Inf. Sci., 2015
Informatica (Slovenia), 2015
Novel algorithms and equivalence optimisation for resource allocation in cloud computing.
Int. J. Web Grid Serv., 2015
New attribute-based authentication and its application in anonymous cloud access service.
Int. J. Web Grid Serv., 2015
Int. J. Netw. Secur., 2015
Future Gener. Comput. Syst., 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the Computational Intelligence and Intelligent Systems, 2015
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015
2014
IEEE Trans. Parallel Distributed Syst., 2014
Further Observations on Smart-Card-Based Password-Authenticated Key Agreement in Distributed Systems.
IEEE Trans. Parallel Distributed Syst., 2014
IEEE Trans. Parallel Distributed Syst., 2014
IEEE Trans. Parallel Distributed Syst., 2014
IEEE Trans. Parallel Distributed Syst., 2014
An efficient PHR service system supporting fuzzy keyword search and fine-grained access control.
Soft Comput., 2014
MobiShare+: Security Improved System for Location Sharing in Mobile Online Social Networks.
J. Internet Serv. Inf. Secur., 2014
Int. J. Data Warehous. Min., 2014
KSII Trans. Internet Inf. Syst., 2014
Inf. Sci., 2014
Int. J. Distributed Sens. Networks, 2014
Future Gener. Comput. Syst., 2014
Future Gener. Comput. Syst., 2014
Future Gener. Comput. Syst., 2014
Frontiers Comput. Sci., 2014
Concurr. Comput. Pract. Exp., 2014
Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks.
Comput. Networks, 2014
Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts.
Proceedings of the Provable Security - 8th International Conference, 2014
Proceedings of the Information Security Practice and Experience, 2014
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014
Proceedings of the Information and Communication Technology, 2014
Proceedings of the 6th USENIX Workshop on Hot Topics in Cloud Computing, 2014
Efficient and Verifiable Algorithm for Secure Outsourcing of Large-scale Linear Programming.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014
Secure Personal Health Record System with Attribute-Based Encryption in Cloud Computing.
Proceedings of the 2014 Ninth International Conference on P2P, 2014
2013
An Efficient Ciphertext-Policy Attribute-Based Access Control towards Revocation in Cloud Computing.
J. Univers. Comput. Sci., 2013
Comput. Sci. Inf. Syst., 2013
Clust. Comput., 2013
Comput. Informatics, 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013
Proceedings of the Computer Security - ESORICS 2013, 2013
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
Proceedings of the Eighth International Conference on P2P, 2013
2012
IEEE Trans. Inf. Forensics Secur., 2012
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012
J. Internet Serv. Inf. Secur., 2012
Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid Cloud.
Proceedings of the Network and System Security - 6th International Conference, 2012
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
A Novel Framework for Outsourcing and Sharing Searchable Encrypted Data on Hybrid Cloud.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
Deniably Information-Hiding Encryptions Secure against Adaptive Chosen Ciphertext Attack.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012
2011
Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing.
IEEE Trans. Parallel Distributed Syst., 2011
Theor. Comput. Sci., 2011
Mob. Networks Appl., 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
2010
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010
Proceedings of the Cloud Computing, Second International Conference, 2010
Fine-Grained Data Access Control Systems with User Accountability in Cloud Computing.
Proceedings of the Cloud Computing, Second International Conference, 2010
Proceedings of the 5th ACM Symposium on Information, 2010
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010
2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing.
Proceedings of the Computer Security, 2009
2008
J. Comput. Sci. Technol., 2008
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008
2007
Proceedings of the Provable Security, 2007
Proceedings of the Provable Security, 2007
2006
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006
Proceedings of the Computational Intelligence and Security, International Conference, 2006
Proceedings of the Computational Intelligence and Security, International Conference, 2006