Jining Zhao

According to our database1, Jining Zhao authored at least 13 papers between 2013 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Secure and Efficient Privacy-Preserving Identity-Based Batch Public Auditing with Proxy Processing.
KSII Trans. Internet Inf. Syst., 2019

Detailed analysis and improvement of an efficient and secure identity-based public auditing for dynamic outsourced data with proxy.
J. Inf. Secur. Appl., 2019

Identity-based public auditing for cloud storage systems against malicious auditors via blockchain.
Sci. China Inf. Sci., 2019

2018
A Security-Enhanced Identity-Based Batch Provable Data Possession Scheme for Big Data Storage.
KSII Trans. Internet Inf. Syst., 2018

Analysis and Improvement of an Efficient and Secure Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy.
Proceedings of the Frontiers in Cyber Security - First International Conference, 2018

2017
Identity-based provable data possession revisited: Security analysis and generic construction.
Comput. Stand. Interfaces, 2017

2016
An ID-based Hierarchical Access Control Scheme with Constant Size Public Parameter.
Int. J. Netw. Secur., 2016

2015
A Secure RFID Mutual Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptography.
J. Medical Syst., 2015

Cryptanalysis of an integrity checking scheme for cloud data sharing.
J. Inf. Secur. Appl., 2015

2014
Efficient fully homomorphic encryption from RLWE with an extension to a threshold encryption scheme.
Future Gener. Comput. Syst., 2014

Cloud data auditing with designated verifier.
Frontiers Comput. Sci., 2014

Secure and efficient privacy-preserving public auditing scheme for cloud storage.
Comput. Electr. Eng., 2014

2013
Identity-Based Public Verification with Privacy-Preserving for Data Storage Security in Cloud Computing.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013


  Loading...