Junqing Gong
Orcid: 0000-0003-2281-4112Affiliations:
- East China Normal University, Shanghai, China
According to our database1,
Junqing Gong
authored at least 40 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Theor. Comput. Sci., February, 2024
Lavida: Large-Universe, Verifiable, and Dynamic Fine-Grained Access Control for E-Health Cloud.
IEEE Trans. Inf. Forensics Secur., 2024
Practical Searchable Symmetric Encryption for Arbitrary Boolean Query-Join in Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Designated server proxy re-encryption with boolean keyword search for E-Health Clouds.
J. Inf. Secur. Appl., 2024
Efficient and Scalable Circuit-Based Protocol for Multi-party Private Set Intersection.
Proceedings of the Computer Security - ESORICS 2024, 2024
2023
IET Inf. Secur., July, 2023
Theor. Comput. Sci., June, 2023
Peer Peer Netw. Appl., January, 2023
Secure Cloud-Assisted Data Pub/Sub Service With Fine-Grained Bilateral Access Control.
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023
2022
Comput. J., 2022
2021
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
2020
IACR Cryptol. ePrint Arch., 2020
2019
2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Leakage-resilient attribute based encryption in prime-order groups via predicate encodings.
Des. Codes Cryptogr., 2018
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018
Proceedings of the Applied Cryptography and Network Security, 2018
2017
ABE with Tag Made Easy: Concise Framework and New Instantiations in Prime-order Groups.
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Public-Key Cryptography - PKC 2017, 2017
2016
Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting.
IACR Cryptol. ePrint Arch., 2016
Extended dual system group and shorter unbounded hierarchical identity based encryption.
Des. Codes Cryptogr., 2016
Comput. J., 2016
Traceable CP-ABE with Short Ciphertexts: How to Catch People Selling Decryption Devices on eBay Efficiently.
Proceedings of the Computer Security - ESORICS 2016, 2016
Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Outsourced Verifiable Computation.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
2012
Anonymous password-based key exchange with low resources consumption and better user-friendliness.
Secur. Commun. Networks, 2012
2010
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010