Segui
SHAO Jun
SHAO Jun
Professor, Zhejiang Gongshang University
Email verificata su zjgsu.edu.cn - Home page
Titolo
Citata da
Citata da
Anno
Mobile device assisted secure computer network communication
B Zhu, M Feng, X Yin, Y Yang, Y Zhang, J Shao
US Patent 8,209,744, 2012
4232012
CCA-secure proxy re-encryption without pairings
J Shao, Z Cao
International Workshop on Public Key Cryptography, 357-376, 2009
4162009
Toward efficient and privacy-preserving computing in big data era
R Lu, H Zhu, X Liu, JK Liu, J Shao
IEEE Network 28 (4), 46-50, 2014
3632014
Attribute based proxy re-encryption with delegating capabilities
X Liang, Z Cao, H Lin, J Shao
Proceedings of the 4th International Symposium on Information, Computer, and…, 2009
3192009
A threshold anonymous authentication protocol for VANETs
J Shao, X Lin, R Lu, C Zuo
IEEE Transactions on vehicular technology 65 (3), 1711-1720, 2015
2752015
Secure threshold multi authority attribute based encryption without a central authority
H Lin, Z Cao, X Liang, J Shao
International Conference on Cryptology in India, 426-436, 2008
1992008
Proxy re-encryption with keyword search
J Shao, Z Cao, X Liang, H Lin
Information Sciences 180 (13), 2576-2587, 2010
1902010
Cryptographic primitives in blockchains
L Wang, X Shen, J Li, J Shao, Y Yang
Journal of Network and Computer Applications 127, 43-58, 2019
1872019
Privacy-preserving-outsourced association rule mining on vertically partitioned databases
L Li, R Lu, KKR Choo, A Datta, J Shao
IEEE Transactions on Information Forensics and Security 11 (8), 1847-1861, 2016
1872016
REPLACE: A reliable trust-based platoon service recommendation scheme in VANET
H Hu, R Lu, Z Zhang, J Shao
IEEE Transactions on Vehicular Technology 66 (2), 1786-1797, 2016
1602016
Secure threshold multi authority attribute based encryption without a central authority
H Lin, Z Cao, X Liang, J Shao
Information Sciences 180 (13), 2618-2632, 2010
1552010
CAM: cloud-assisted privacy preserving mobile health monitoring
H Lin, J Shao, C Zhang, Y Fang
IEEE Transactions on Information Forensics and Security 8 (6), 985-997, 2013
1512013
FINE: A fine-grained privacy-preserving location-based service framework for mobile devices
J Shao, R Lu, X Lin
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 244-252, 2014
1502014
CCA-secure ABE with outsourced decryption for fog computing
C Zuo, J Shao, G Wei, M Xie, M Ji
Future Generation Computer Systems 78, 730-738, 2018
1422018
A new efficient (t, n) verifiable multi-secret sharing (VMSS) based on YCH scheme
J Shao, Z Cao
Applied Mathematics and Computation 168 (1), 135-140, 2005
1292005
Proxy re-signature schemes without random oracles
J Shao, Z Cao, L Wang, X Liang
International Conference on Cryptology in India, 197-209, 2007
1042007
A dynamic membership data aggregation (DMDA) protocol for smart grid
J Song, Y Liu, J Shao, C Tang
IEEE Systems Journal 14 (1), 900-908, 2019
932019
Data security and privacy in fog computing
Y Guan, J Shao, G Wei, M Xie
IEEE Network 32 (5), 106-111, 2018
902018
Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
J Shao, Z Cao
Information Sciences 206, 83-95, 2012
802012
Short group signature without random oracles
X Liang, Z Cao, J Shao, H Lin
International Conference on Information and Communications Security, 69-82, 2007
722007
Il sistema al momento non pu eseguire l'operazione. Riprova pi tardi.
Articoli 1–20