Qingji Zheng

According to our database1, Qingji Zheng authored at least 22 papers between 2009 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Architectural Protection of Application Privacy against Software and Physical Attacks in Untrusted Cloud Environment.
IEEE Trans. Cloud Comput., 2018

2017
RSPP: A reliable, searchable and privacy-preserving e-healthcare system for cloud-assisted body area networks.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Data verification in information-centric networking with efficient revocable certificateless signature.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2016
Leveraging ICN for Secure Content Distribution in IP Networks.
Proceedings of the 2016 ACM Conference on Multimedia Conference, 2016

Hey, I know you are moving: producer movement status privacy in information-centric networking.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

2015
LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking.
IEEE Trans. Inf. Forensics Secur., 2015

Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation.
Inf. Sci., 2015

CLKS: Certificateless Keyword Search on Encrypted Data.
IACR Cryptol. ePrint Arch., 2015

Achieving secure and scalable data access control in information-centric networking.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

IoT Middleware Architecture over Information-Centric Network.
Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, 2015

2014
PWG: Progressive Weight-Growth Algorithm for LDPC Codes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

Verifiable Delegated Set Intersection Operations on Outsourced Encrypted Data.
IACR Cryptol. ePrint Arch., 2014

Improved anonymous proxy re-encryption with CCA security.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data.
IACR Cryptol. ePrint Arch., 2013

CloudSafe: Securing data processing within vulnerable virtualization environments in the cloud.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Multi-processor architectural support for protecting virtual machine privacy in untrusted cloud environment.
Proceedings of the Computing Frontiers Conference, 2013

2012
Efficient Query Integrity for Outsourced Dynamic Databases.
IACR Cryptol. ePrint Arch., 2012

Multiparty Cloud Computation
CoRR, 2012

2011
Secure and Efficient Proof of Storage with Deduplication.
IACR Cryptol. ePrint Arch., 2011

Fair and dynamic proofs of retrievability.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

2010
Regular Quasi-cyclic LDPC Codes with Girth 6 from Prime Fields.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

2009
Toward optimizing cauchy matrix for cauchy reed-solomon code.
IEEE Commun. Lett., 2009


  Loading...