Jinguang Han

Orcid: 0000-0002-4993-9452

According to our database1, Jinguang Han authored at least 71 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Efficient Revocable Attribute-Based Encryption With Verifiable Data Integrity.
IEEE Internet Things J., March, 2024

IoT Privacy-Preserving Data Mining With Dynamic Incentive Mechanism.
IEEE Internet Things J., January, 2024

OLBS: Oblivious Location-Based Services.
IEEE Trans. Inf. Forensics Secur., 2024

Guest Editorial IEEE Transactions on Emerging Topics in Computing Special Section on Advances in Emerging Privacy-Preserving Computing.
IEEE Trans. Emerg. Top. Comput., 2024

Privacy-Preserving Decentralized Functional Encryption for Inner Product.
IEEE Trans. Dependable Secur. Comput., 2024

Similarity-Based Secure Deduplication for IIoT Cloud Management System.
IEEE Trans. Dependable Secur. Comput., 2024

Privacy-Preserving Traceable Functional Encryption for Inner Product.
CoRR, 2024

Privacy-Preserving Confidential Reporting System With Designated Reporters.
Comput. J., 2024

2023
SecuCar: Data Loss Prevention for Cloud Assisted VSS Based on Public Auditing Technique.
IEEE Trans. Veh. Technol., November, 2023

DFE-IP: Delegatable functional encryption for inner product.
Inf. Sci., November, 2023

TFS-ABS: Traceable and Forward-Secure Attribute-Based Signature Scheme With Constant-Size.
IEEE Trans. Knowl. Data Eng., September, 2023

Similarity-based deduplication and secure auditing in IoT decentralized storage.
J. Syst. Archit., September, 2023

Multiauthority Attribute-Based Encryption for Assuring Data Deletion.
IEEE Syst. J., June, 2023

Blockchain-based Privacy-Preserving Public Key Searchable Encryption with Strong Traceability.
CoRR, 2023

RIS-assisted physical layer key generation by exploiting randomness from channel coefficients of reflecting elements and OFDM subcarriers.
Ad Hoc Networks, 2023

2022
Efficient Attribute Based Server-Aided Verification Signature.
IEEE Trans. Serv. Comput., 2022

Redactable Signature-Based Public Auditing Scheme With Sensitive Data Sharing for Cloud Storage.
IEEE Syst. J., 2022

Lightweight ID-based broadcast signcryption for cloud-fog-assisted IoT.
J. Syst. Archit., 2022

Key escrow-free attribute based encryption with user revocation.
Inf. Sci., 2022

Decentralized Attribute-Based Server-Aid Signature in the Internet of Things.
IEEE Internet Things J., 2022

An empirical study of supervised email classification in Internet of Things: Practical performance and key influencing factors.
Int. J. Intell. Syst., 2022

2021
Privacy-Preserving Electronic Ticket Scheme with Attribute-Based Credentials.
IEEE Trans. Dependable Secur. Comput., 2021

An efficient identity-based signature scheme with provable security.
Inf. Sci., 2021

Editorial for accountability and privacy issues in blockchain and cryptocurrency.
Future Gener. Comput. Syst., 2021

A Privacy-Preserving Logistics Information System with Traceability.
Proceedings of the Cyberspace Safety and Security - 13th International Symposium, 2021

2020
A Blockchain-Based Public Auditing Scheme for Cloud Storage Environment without Trusted Auditors.
Wirel. Commun. Mob. Comput., 2020

VOD-ADAC: Anonymous Distributed Fine-Grained Access Control Protocol with Verifiable Outsourced Decryption in Public Cloud.
IEEE Trans. Serv. Comput., 2020

Full Verifiability for Outsourced Decryption in Attribute Based Encryption.
IEEE Trans. Serv. Comput., 2020

Anonymous Single Sign-On With Proxy Re-Verification.
IEEE Trans. Inf. Forensics Secur., 2020

A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscation.
Soft Comput., 2020

Reversible data hiding in encrypted images for coding channel based on adaptive steganography.
IET Image Process., 2020

Special Issue on Cryptographic Currency and Blockchain Technology.
Future Gener. Comput. Syst., 2020

2019
Keyword Attacks and Privacy Preserving in Public-Key-Based Searchable Encryption.
Proceedings of the Encyclopedia of Big Data Technologies., 2019

Fine-grained information flow control using attributes.
Inf. Sci., 2019

Toward Practical Privacy-Preserving Processing Over Encrypted Data in IoT: An Assistive Healthcare Use Case.
IEEE Internet Things J., 2019

Enhancing the security of FinTech applications with map-based graphical password authentication.
Future Gener. Comput. Syst., 2019

Oblivious Location-Based Service Query.
CoRR, 2019

Attribute-Based Information Flow Control.
Comput. J., 2019

2018
Expressive attribute-based keyword search with constant-size ciphertext.
Soft Comput., 2018

User Collusion Avoidance CP-ABE With Efficient Attribute Revocation for Cloud Storage.
IEEE Syst. J., 2018

Message from the Guest Editors.
Int. J. Inf. Sec., 2018

Towards leakage-resilient fine-grained access control in fog computing.
Future Gener. Comput. Syst., 2018

When Intrusion Detection Meets Blockchain Technology: A Review.
IEEE Access, 2018

CPMap: Design of Click-Points Map-Based Graphical Password Authentication.
Proceedings of the ICT Systems Security and Privacy Protection, 2018

Towards Securing Challenge-Based Collaborative Intrusion Detection Networks via Message Verification.
Proceedings of the Information Security Practice and Experience, 2018

Anonymous Single-Sign-On for n Designated Services with Traceability.
Proceedings of the Computer Security, 2018

2017
Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing.
IEEE Trans. Serv. Comput., 2017

KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage.
IEEE Trans. Serv. Comput., 2017

A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2017

Preface.
Int. J. Found. Comput. Sci., 2017

PPETS-FGP: Privacy-Preserving Electronic Ticket Scheme with Fine-Grained Pricing.
CoRR, 2017

An Efficient Key-Policy Attribute-Based Searchable Encryption in Prime-Order Groups.
Proceedings of the Provable Security, 2017

Automatic Encryption Schemes Based on the Neural Networks: Analysis and Discussions on the Various Adversarial Models (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017

2016
User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption.
IEEE Trans. Computers, 2016

ABKS-CSC: attribute-based keyword search with constant-size ciphertexts.
Secur. Commun. Networks, 2016

Accountable mobile E-commerce scheme via identity-based plaintext-checkable encryption.
Inf. Sci., 2016

Improved handover authentication and key pre-distribution for wireless mesh networks.
Concurr. Comput. Pract. Exp., 2016

Leakage-Resilient Functional Encryption via Pair Encodings.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption.
IEEE Trans. Inf. Forensics Secur., 2015

AAC-OT: Accountable Oblivious Transfer With Access Control.
IEEE Trans. Inf. Forensics Secur., 2015

Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation.
Int. J. Inf. Sec., 2015

2014
Identity-Based Secure DistributedData Storage Schemes.
IEEE Trans. Computers, 2014

PPDCP-ABE: Privacy-Preserving Decentralized Cipher-Policy Attribute-Based Encryption.
IACR Cryptol. ePrint Arch., 2014

Attribute-Based Data Transfer with Filtering Scheme in Cloud Computing.
Comput. J., 2014

PPDCP-ABE: Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption.
Proceedings of the Computer Security - ESORICS 2014, 2014

2013
Identity-based data storage in cloud computing.
Future Gener. Comput. Syst., 2013

2012
Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption.
IEEE Trans. Parallel Distributed Syst., 2012

New constructions of OSBE schemes and their applications in oblivious access control.
Int. J. Inf. Sec., 2012

Efficient oblivious transfers with access control.
Comput. Math. Appl., 2012

Attribute-Based Oblivious Access Control.
Comput. J., 2012

2010
A Generic Construction of Dynamic Single Sign-on with Strong Security.
Proceedings of the Security and Privacy in Communication Networks, 2010


  Loading...