Meixia Miao
Meixia Miao
Email verificata su
Citata da
Citata da
A secure and efficient id-based aggregate signature scheme for wireless sensor networks
L Shen, J Ma, X Liu, F Wei, M Miao
IEEE Internet of Things Journal 4 (2), 546-554, 2016
Secure multi-server-aided data deduplication in cloud computing
M Miao, J Wang, H Li, X Chen
Pervasive and Mobile Computing 24, 129-137, 2015
An incentive mechanism for K-anonymity in LBS privacy protection based on credit mechanism
X Li, M Miao, H Liu, J Ma, KC Li
Soft Computing 21 (14), 3907-3917, 2017
A provably secure aggregate signature scheme for healthcare wireless sensor networks
L Shen, J Ma, X Liu, M Miao
Journal of medical systems 40 (11), 1-10, 2016
Publicly verifiable database scheme with efficient keyword search
M Miao, J Wang, S Wen, J Ma
Information Sciences 475, 18-28, 2019
Publicly verifiable databases with efficient insertion/deletion operations
M Miao, J Wang, J Ma, W Susilo
Journal of Computer and System Sciences 86, 49-58, 2017
Towards efficient privacy-preserving encrypted image search in cloud computing
Y Wang, M Miao, J Shen, J Wang
Soft Computing 23 (6), 2101-2112, 2019
Efficient verifiable databases with insertion/deletion operations from delegating polynomial functions
M Miao, J Ma, X Huang, Q Wang
IEEE Transactions on Information Forensics and Security 13 (2), 511-520, 2017
Enabling efficient approximate nearest neighbor search for outsourced database in cloud computing
J Wang, M Miao, Y Gao, X Chen
Soft Computing 20 (11), 4487-4495, 2016
Payment-based incentive mechanism for secure cloud deduplication
M Miao, T Jiang, I You
International Journal of Information Management 35 (3), 379-386, 2015
Secure approximate nearest neighbor search over encrypted data
Y Gao, M Miao, J Wang, X Chen
2014 Ninth International Conference on Broadband and Wireless Computing …, 2014
Toward forward secure SSE supporting conjunctive keyword search
Y Wang, J Wang, S Sun, M Miao, X Chen
IEEE Access 7, 142762-142772, 2019
Detection of GPS spoofing attack on unmanned aerial vehicle system
C Liang, M Miao, J Ma, H Yan, Q Zhang, X Li, T Li
International Conference on Machine Learning for Cyber Security, 123-139, 2019
New publicly verifiable databases supporting insertion operation
M Miao, J Wang, J Ma
2015 18th International Conference on Network-Based Information Systems, 640-642, 2015
Comparable encryption scheme supporting multiple users in cloud computing
J Ye, M Miao, P Chen, X Chen
International Journal of High Performance Computing and Networking 11 (1), 24-33, 2018
Efficient Verifiable Multi-Key Searchable Encryption in Cloud Computing
Y Su, J Wang, Y Wang, M Miao
IEEE Access 7, 141352-141362, 2019
Outsourcing encrypted excel files
YN Li, Q Wu, W Tang, B Qin, Q Wang, M Miao
International Conference on Information Security Practice and Experience …, 2017
Request-based comparable encryption scheme with multiple users
J Ye, M Miao, P Chen, X Chen
2015 10th International Conference on Broadband and Wireless Computing …, 2015
New proofs of ownership for efficient data deduplication in the adversarial conspiracy model
M Miao, G Tian, W Susilo
International Journal of Intelligent Systems 36 (6), 2753-2766, 2021
Enabling Compressed Encryption for Cloud Based Big Data Stores
M Zhang, S Qi, M Miao, F Zhang
International Conference on Cryptology and Network Security, 270-287, 2019
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20