Sha Ma
Orcid: 0009-0004-5015-8444
According to our database1,
Sha Ma
authored at least 52 papers
between 1994 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
An efficient ciphertext-policy weighted attribute-based encryption with collaborative access for cloud storage.
Comput. Stand. Interfaces, 2025
2024
Revocable and verifiable weighted attribute-based encryption with collaborative access for electronic health record in cloud.
Cybersecur., December, 2024
Controllable forward secure identity-based encryption with equality test in privacy-preserving text similarity analysis.
Inf. Sci., March, 2024
Comput. J., February, 2024
Comput. Stand. Interfaces, January, 2024
Int. J. Appl. Cryptogr., 2024
FFEC: Fast and forward-secure equivalence-based ciphertext comparability for multiple users in cloud environment.
Comput. Stand. Interfaces, 2024
Automatic localization and segmentation of adherent microplastics in optical micrographs based on improved YOLOv5 and adaptive perceptual UNET 3+++.
Biomed. Signal Process. Control., 2024
Enhancing the Mental Health of College Students: An Emotional Robot Design Based on CNNs and Smart Wearable Devices.
Proceedings of the 14th International Conference on Biomedical Engineering and Technology, 2024
2023
MTER: An Efficient Multi-User Threshold Equality Retrieval for Double Auction in Smart Grid Market.
IEEE Trans. Inf. Forensics Secur., 2023
Certificateless Public Key Authenticated Encryption with Keyword Search Achieving Stronger Security.
Inf., 2023
Proceedings of the IEEE International Conference on Image Processing, 2023
Forward Secure Online/Offline Key Policy Attribute-Based Encryption with Keyword Search.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023
Public Key Authenticated Encryption with Keyword Search Improved: Strong Security Model and Multi-keyword Construction.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023
2022
Efficient Public Key Encryption With Outsourced Equality Test for Cloud-Based IoT Environments.
IEEE Trans. Inf. Forensics Secur., 2022
2021
IEEE Trans. Inf. Forensics Secur., 2021
CCA-Almost-Full Anonymous Group Signature with Verifier Local Revocation in the Standard Model.
Comput. J., 2021
Comput. J., 2021
A CCA-Full-Anonymous Group Signature with Verifiable Controllable Linkability in the Standard Model.
Proceedings of the Provable and Practical Security, 2021
Proceedings of the ICBBE 2021: 8th International Conference on Biomedical and Bioinformatics Engineering, Kyoto, Japan, November 12, 2021
2020
Group public key encryption with equality test against offline message recovery attack.
Inf. Sci., 2020
Comput. J., 2020
IEEE Access, 2020
2019
Authorized Equality Test on Identity-Based Ciphertexts for Secret Data Sharing via Cloud Storage.
IEEE Access, 2019
Proceedings of the Provable Security, 2019
Proceedings of the Information Security Practice and Experience, 2019
Proceedings of the Data Science, 2019
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
2018
Efficient <i>k</i>-out-of-<i>n</i> oblivious transfer scheme with the ideal communication cost.
Theor. Comput. Sci., 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
A General Two-Server Framework for Ciphertext-Checkable Encryption Against Offline Message Recovery Attack.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
2017
Comput. J., 2017
Proceedings of the Information Security Applications - 18th International Conference, 2017
Proceedings of the Conference of the ACM Special Interest Group on Data Communication, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
2016
Inf. Sci., 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization.
IEEE Trans. Inf. Forensics Secur., 2015
Comput. J., 2015
2014
Secur. Commun. Networks, 2014
2012
Overcoming the information overload problem in a multiform feedback-based virtual reality system for hand motion rehabilitation: healthy subject case study.
Virtual Real., 2012
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2012
2011
Proceedings of the Information Security, 14th International Conference, 2011
2010
Proceedings of the 14th International Conference on Information Visualisation, 2010
2009
Overcoming the Information Overload Problem in a Multiform Feedback Based Virtual Reality System for Hand Motion Rehabilitation.
Proceedings of the 2009 International Conference on CyberWorlds, 2009
2007
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007
1994
IEEE J. Solid State Circuits, September, 1994