Jining Zhao

Orcid: 0009-0004-4484-0746

According to our database1, Jining Zhao authored at least 14 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

2014
2016
2018
2020
2022
2024
0
1
2
3
4
1
3
1
1
1
2
3
1
1

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Enhanced Infrared Defect Detection for UAVs Using Wavelet-Based Image Processing and Channel Attention-Integrated SSD Model.
IEEE Access, 2024

2019
Secure and Efficient Privacy-Preserving Identity-Based Batch Public Auditing with Proxy Processing.
KSII Trans. Internet Inf. Syst., 2019

Detailed analysis and improvement of an efficient and secure identity-based public auditing for dynamic outsourced data with proxy.
J. Inf. Secur. Appl., 2019

Identity-based public auditing for cloud storage systems against malicious auditors via blockchain.
Sci. China Inf. Sci., 2019

2018
A Security-Enhanced Identity-Based Batch Provable Data Possession Scheme for Big Data Storage.
KSII Trans. Internet Inf. Syst., 2018

Analysis and Improvement of an Efficient and Secure Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy.
Proceedings of the Frontiers in Cyber Security - First International Conference, 2018

2017
Identity-based provable data possession revisited: Security analysis and generic construction.
Comput. Stand. Interfaces, 2017

2016
An ID-based Hierarchical Access Control Scheme with Constant Size Public Parameter.
Int. J. Netw. Secur., 2016

2015
A Secure RFID Mutual Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptography.
J. Medical Syst., 2015

Cryptanalysis of an integrity checking scheme for cloud data sharing.
J. Inf. Secur. Appl., 2015

2014
Efficient fully homomorphic encryption from RLWE with an extension to a threshold encryption scheme.
Future Gener. Comput. Syst., 2014

Cloud data auditing with designated verifier.
Frontiers Comput. Sci., 2014

Secure and efficient privacy-preserving public auditing scheme for cloud storage.
Comput. Electr. Eng., 2014

2013
Identity-Based Public Verification with Privacy-Preserving for Data Storage Security in Cloud Computing.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013


  Loading...