Follow
Jingwei Li
Title
Cited by
Cited by
Year
Secure deduplication with efficient and reliable convergent key management
J Li, X Chen, M Li, J Li, PPC Lee, W Lou
IEEE transactions on parallel and distributed systems 25 (6), 1615-1625, 2013
7862013
Securely outsourcing attribute-based encryption with checkability
J Li, X Huang, J Li, X Chen, Y Xiang
IEEE Transactions on Parallel and Distributed Systems 25 (8), 2201-2210, 2013
4882013
Identity-based encryption with outsourced revocation in cloud computing
J Li, J Li, X Chen, C Jia, W Lou
IEEE Transactions on computers 64 (2), 425-437, 2013
4442013
Secure auditing and deduplicating data in cloud
J Li, J Li, D Xie, Z Cai
IEEE Transactions on Computers 65 (8), 2386-2396, 2015
2052015
Fine-grained access control system based on outsourced attribute-based encryption
J Li, X Chen, J Li, C Jia, J Ma, W Lou
Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013
1972013
Outsourcing encryption of attribute-based encryption with mapreduce
J Li, C Jia, J Li, X Chen
Information and Communications Security: 14th International Conference …, 2012
1562012
Secure outsourced attribute-based signatures
X Chen, J Li, X Huang, J Li, Y Xiang, DS Wong
IEEE transactions on parallel and distributed systems 25 (12), 3285-3294, 2014
1472014
CDStore: Toward Reliable, Secure, and Cost-Efficient Cloud Storage via Convergent Dispersal
M Li, C Qin, J Li, PPC Lee
IEEE Internet Computing 20 (3), 45-53, 2016
1342016
Designing cloud-based electronic health record system with attribute-based encryption
F Xhafa, J Li, G Zhao, J Li, X Chen, DS Wong
Multimedia tools and applications 74, 3441-3458, 2015
902015
Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid Cloud
J Li, J Li, X Chen, C Jia, Z Liu
Network and System Security, 490-502, 2012
772012
Rekeying for encrypted deduplication storage
J Li, C Qin, PPC Lee, J Li
2016 46th Annual IEEE/IFIP International Conference on Dependable Systems …, 2016
702016
The design and implementation of a rekeying-aware encrypted deduplication storage system
C Qin, J Li, PPC Lee
ACM Transactions on Storage (TOS) 13 (1), 1-30, 2017
512017
Privacy-preserving data utilization in hybrid clouds
J Li, J Li, X Chen, Z Liu, C Jia
Future Generation Computer Systems 30, 98-106, 2014
482014
Towards privacy-preserving storage and retrieval in multiple clouds
J Li, D Lin, AC Squicciarini, J Li, C Jia
IEEE Transactions on Cloud Computing 5 (3), 499-509, 2015
472015
Survey on the searchable encryption
J Li, CF Jia, Z Liu, J Li, M Li
Journal of Software 26 (1), 109-128, 2015
422015
Format-preserving encryption for datetime
Z Liu, C Jia, J Li, X Cheng
2010 IEEE International Conference on Intelligent Computing and Intelligent …, 2010
422010
Balancing storage efficiency and data confidentiality with tunable encrypted deduplication
J Li, Z Yang, Y Ren, PPC Lee, X Zhang
Proceedings of the Fifteenth European Conference on Computer Systems, 1-15, 2020
382020
可搜索加密技术研究综述
李经纬, 贾春福, 刘哲理, 李进, 李敏
软件学报 1, 2015
382015
Enabling efficient and secure data sharing in cloud computing
J Li, J Li, Z Liu, C Jia
Concurrency and computation: practice and experience 26 (5), 1052-1066, 2014
352014
Information leakage in encrypted deduplication via frequency analysis
J Li, C Qin, PPC Lee, X Zhang
2017 47th Annual IEEE/IFIP international conference on dependable systems …, 2017
332017
The system can't perform the operation now. Try again later.
Articles 1–20