Jia XU  (徐佳)
Title
Cited by
Cited by
Year
Leakage-Resilient Client-side Deduplication of Encrypted Data in Cloud Storage (Old Title: Secure Cloud Storage with Encrypted Data using File-Based Authentication)
J Xu, EC Chang, J Zhou
Cryptology ePrint Archive, Report 2011/538, 0
231*
Weak Leakage-Resilient Client-side Deduplication of Encrypted Data in Cloud Storage
J Xu, EC Chang, J Zhou
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
2302013
Remote integrity check with dishonest storage server
EC Chang, J Xu
Computer Security-ESORICS 2008, 223-237, 2008
1372008
Towards Efficient Proofs of Retrievability
J Xu, EC Chang
AsiaCCS, 2012
1032012
Security concerns in popular cloud storage services
CK Chu, WT Zhu, J Han, JK Liu, J Xu, J Zhou
IEEE Pervasive Computing 12 (4), 50-57, 2013
942013
Short redactable signatures using random trees
EC Chang, C Lim, J Xu
Topics in Cryptology–CT-RSA 2009, 133-147, 2009
752009
ID repetition in Kad
J Yu, C Fang, J Xu, EC Chang, Z Li
Peer-to-Peer Computing, 2009. P2P'09. IEEE Ninth International Conference on …, 2009
382009
Passive attacks against searchable encryption
J Ning, J Xu, K Liang, F Zhang, EC Chang
IEEE Transactions on Information Forensics and Security 14 (3), 789-802, 2018
292018
Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage
A Yang, J Xu, J Weng, J Zhou, DS Wong
IEEE Transactions on Cloud Computing, 2018
242018
Leakage Resilient Proofs of Ownership in Cloud Storage, Revisited
J Xu, J Zhou
International Conference on Applied Cryptography and Network Security (ACNS …, 2013
242013
Auditing the Auditor: Secure Delegation of Auditing Operation over Cloud Storage
J Xu
https://eprint.iacr.org/2011/304, 2011
162011
Authenticating Aggregate Range Queries over Multidimensional Dataset.
J Xu, EC Chang
IACR Cryptology ePrint Archive 2010, 50, 2010
92010
On Directed Transitive Signature.
J Xu
IACR Cryptology ePrint Archive 2009, 209, 2009
92009
Lightweight Delegatable Proofs of Storage
J Xu, A Yang, J Zhou, DS Wong
European Symposium on Research in Computer Security, 324-343, 2016
52016
Lightweight and Privacy-Preserving Delegatable Proofs of Storage.
J Xu, A Yang, J Zhou, DS Wong
IACR Cryptology ePrint Archive 2014, 395, 2014
52014
Towards Efficient Provable Data Possession.
J Xu, EC Chang
IACR Cryptology ePrint Archive 2011, 574, 2011
52011
Zhoujun Li. Id repetition in kad
J Yu, C Fang, J Xu, EC Chang
Peer-to-Peer Computing, 111-120, 2009
52009
Id repetition in structured p2p networks
J Yu, Z Li, P Xiao, C Fang, J Xu, EC Chang
The Computer Journal 54 (6), 962-975, 2011
42011
Practically Efficient Verifiable Delegation of Polynomial and its Applications.
J Xu
IACR Cryptology ePrint Archive 2011, 473, 2011
42011
HAtt: Hybrid Remote Attestation for the Internet of Things with High Availability
MN Aman, MH Basheer, S Dash, JW Wong, J Xu, HW Lim, B Sikdar
IEEE Internet of Things Journal, 2020
32020
The system can't perform the operation now. Try again later.
Articles 1–20