Jing Qin
Orcid: 0000-0003-2380-0396Affiliations:
- Shandong University, School of Mathematics, Jinan, China (PhD 2004)
According to our database1,
Jing Qin
authored at least 59 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on scopus.com
-
on orcid.org
On csauthors.net:
Bibliography
2024
Efficient Key-Aggregate Cryptosystem With User Revocation for Selective Group Data Sharing in Cloud Storage.
IEEE Trans. Knowl. Data Eng., November, 2024
Comput. Stand. Interfaces, March, 2024
Privacy leakage of certificateless public key authenticated searchable encryption via frequency analysis: Attacks and revises.
Comput. Stand. Interfaces, January, 2024
Secure, Dynamic, and Efficient Keyword Search With Flexible Merging for Cloud Storage.
IEEE Trans. Serv. Comput., 2024
Inf. Fusion, 2024
Comput. Secur., 2024
Comput. J., 2024
2023
Inf. Sci., November, 2023
Comput. Secur., November, 2023
Key-aggregate searchable encryption supporting conjunctive queries for flexible data sharing in the cloud.
Inf. Sci., October, 2023
Efficient and Flexible Multiauthority Attribute-Based Authentication for IoT Devices.
IEEE Internet Things J., August, 2023
Privacy-preserving certificateless public auditing supporting different auditing frequencies.
Comput. Secur., May, 2023
Comput. J., January, 2023
Multi-Keyword Ranked Searchable Encryption with the Wildcard Keyword for Data Sharing in Cloud Computing.
Comput. J., January, 2023
Verifiable Key-Aggregate Searchable Encryption With a Designated Server in Multi-Owner Setting.
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Efficient Wildcard Searchable Symmetric Encryption with Forward and Backward Security.
Proceedings of the Artificial Intelligence Security and Privacy, 2023
Proceedings of the Artificial Intelligence Security and Privacy, 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
Publicly Verifiable Shared Dynamic Electronic Health Record Databases With Functional Commitment Supporting Privacy-Preserving Integrity Auditing.
IEEE Trans. Cloud Comput., 2022
Proceedings of the IEEE Global Communications Conference, 2022
2021
Outsourced Decentralized Multi-Authority Attribute Based Signature and Its Application in IoT.
IEEE Trans. Cloud Comput., 2021
IEEE Trans. Cloud Comput., 2021
Int. J. Intell. Syst., 2021
2020
A Dynamic Searchable Symmetric Encryption Scheme for Multiuser with Forward and Backward Security.
Secur. Commun. Networks, 2020
Verifiable inner product computation on outsourced database for authenticated multi-user data sharing.
Inf. Sci., 2020
IEEE Internet Things J., 2020
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020
2019
Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2019
Fuzzy matching: multi-authority attribute searchable encryption without central authority.
Soft Comput., 2019
A Secure and Efficient Data Sharing and Searching Scheme in Wireless Sensor Networks.
Sensors, 2019
A Lightweight Identity-Based Cloud Storage Auditing Supporting Proxy Update and Workload-Based Payment.
Secur. Commun. Networks, 2019
Privacy-Preserving and Publicly Verifiable Protocol for Outsourcing Polynomials Evaluation to a Malicious Cloud.
Int. J. Digit. Crime Forensics, 2019
Concurr. Comput. Pract. Exp., 2019
2018
Confidentiality-Preserving Publicly Verifiable Computation Schemes for Polynomial Evaluation and Matrix-Vector Multiplication.
Secur. Commun. Networks, 2018
2017
Int. J. Found. Comput. Sci., 2017
Int. J. Auton. Adapt. Commun. Syst., 2017
A confidentiality preserving publicly verifiable computation for multivariate polynomials.
Proceedings of the 15th IEEE International Conference on Software Engineering Research, 2017
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
2016
Threshold attribute-based signcryption and its application to authenticated key agreement.
Secur. Commun. Networks, 2016
2015
J. Univers. Comput. Sci., 2015
Lattice-based threshold cryptography and its applications in distributed cloud computing.
Int. J. High Perform. Comput. Netw., 2015
Securing Body Sensor Networks with Biometric Methods: A New Key Negotiation Method and a Key Sampling Method for Linear Interpolation Encryption.
Int. J. Distributed Sens. Networks, 2015
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
2014
A new Lagrange solution to the privacy-preserving general geometric intersection problem.
J. Netw. Comput. Appl., 2014
Int. J. Distributed Sens. Networks, 2014
Future Gener. Comput. Syst., 2014
2013
IEEE Trans. Parallel Distributed Syst., 2013
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013
2012
A General Construction of Sequences with Good Autocorrelation over the 16-QAM Constellation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012
2010
2008
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008