Jinyong Chang
Orcid: 0000-0002-6569-5152
According to our database1,
Jinyong Chang
authored at least 49 papers
between 2014 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2014
2016
2018
2020
2022
2024
0
1
2
3
4
5
6
7
8
9
10
7
1
8
1
6
5
2
1
2
5
2
3
1
4
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Identity-based remote data integrity auditing from lattices for secure cloud storage.
Clust. Comput., August, 2024
General construction of compressive integrity auditing protocol from strong homomorphic encryption scheme.
Clust. Comput., August, 2024
Efficient Key-Escrow-Free and Vehicle-Revocable Data Sharing Protocol for Vehicular Ad Hoc Network.
IEEE Internet Things J., April, 2024
Certificateless Dynamic Data Sharing Scheme With File Recommendation and Integrity Auditing Functions in Cloud-Fog Environment.
IEEE Internet Things J., March, 2024
Efficient Data Sharing Scheme With Fine-Grained Access Control and Integrity Auditing in Terminal-Edge-Cloud Network.
IEEE Internet Things J., 2024
LFTDA: A lightweight and fault-tolerant data aggregation scheme with privacy-enhanced property in fog-assisted smart grid.
Comput. Commun., 2024
Secure data sharing scheme with privacy-preserving and certificateless integrity auditing in cloud storage.
Comput. Commun., 2024
2023
2022
Comment on "A Lightweight Auditing Service for Shared Data With Secure User Revocation in Cloud Storage".
IEEE Trans. Serv. Comput., 2022
Public auditing protocol with dynamic update and privacy-preserving properties in fog-to-cloud-based IoT applications.
Peer-to-Peer Netw. Appl., 2022
J. Cloud Comput., 2022
Certificateless public auditing scheme with designated verifier and privacy-preserving property in cloud storage.
Comput. Networks, 2022
Secure medical data management with privacy-preservation and authentication properties in smart healthcare system.
Comput. Networks, 2022
Flexible identity-based remote data integrity checking for cloud storage with privacy preserving property.
Clust. Comput., 2022
Clust. Comput., 2022
2021
Sci. China Inf. Sci., 2021
2020
Comment on "A Tag Encoding Scheme Against Pollution Attack to Linear Network Coding".
IEEE Trans. Parallel Distributed Syst., 2020
IEEE/ACM Trans. Netw., 2020
Efficient Identity-Based Provable Multi-Copy Data Possession in Multi-Cloud Storage, Revisited.
IEEE Commun. Lett., 2020
Privacy-preserving certificateless provable data possession scheme for big data storage on cloud, revisited.
Appl. Math. Comput., 2020
Certificateless Provable Data Possession Protocol for the Multiple Copies and Clouds Case.
IEEE Access, 2020
2019
Inf. Sci., 2019
General transformations from single-generation to multi-generation for homomorphic message authentication schemes in network coding.
Future Gener. Comput. Syst., 2019
On the KDM-CCA Security from Partial Trapdoor One-Way Family in the Random Oracle Model.
Comput. J., 2019
Security Analysis of an Efficient Null Space-Based Homomorphic MAC Scheme Against Tag Pollution Attacks in RLNC.
IEEE Access, 2019
2018
Wirel. Commun. Mob. Comput., 2018
On the RKA Security of the Standard-Model-Based BFKW Network Coding Signature Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
2017
Homomorphic MAC from Algebraic One-Way Functions for Network Coding with Small Key Size.
Comput. J., 2017
Proceedings of the Information Security Practice and Experience, 2017
Proceedings of the Information Security Practice and Experience, 2017
Proceedings of the 9th International Conference on Advanced Infocomm Technology, 2017
2016
Secur. Commun. Networks, 2016
Security analysis of a TESLA-based homomorphic MAC scheme for authentication in P2P live streaming system.
Secur. Commun. Networks, 2016
Network Coding Signature Schemes Against Related-Key Attacks in the Random Oracle Model.
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016
2015
Practical key-dependent message chosen-ciphertext security based on decisional composite residuosity and quadratic residuosity assumptions.
Secur. Commun. Networks, 2015
A Generic Construction of Homomorphic MAC for Multi-File Transmission in Network Coding.
J. Commun., 2015
Multi-Use Unidirectional Proxy Re-Signatures of Constant Size without Random Oracles.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
Proceedings of the Provable Security, 2015
The Generic Transformation from Standard Signatures to Identity-Based Aggregate Signatures.
Proceedings of the Information Security - 18th International Conference, 2015
Proceedings of the Information and Communications Security - 17th International Conference, 2015
Proceedings of the Cryptology and Network Security - 14th International Conference, 2015
2014
General Construction of Chameleon All-But-One Trapdoor Functions and Their Applications.
J. Softw., 2014
On the Security against Nonadaptive Chosen Ciphertext Attack and Key-Dependent Message Attack.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
Proceedings of the SECRYPT 2014, 2014