Jianting Ning
Jianting Ning
Verified email at smu.edu.sg
TitleCited byYear
White-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes
J Ning, X Dong, Z Cao, L Wei, X Lin
IEEE Transactions on Information Forensics and Security 10 (6), 1274-1288, 2015
1002015
Auditable -Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing
J Ning, Z Cao, X Dong, K Liang, H Ma, L Wei
IEEE Transactions on Information Forensics and Security 13 (1), 94-105, 2017
532017
Large universe ciphertext-policy attribute-based encryption with white-box traceability
J Ning, Z Cao, X Dong, L Wei, X Lin
European Symposium on Research in Computer Security, 55-72, 2014
502014
Accountable authority ciphertext-policy attribute-based encryption with white-box traceability and public auditing in the cloud
J Ning, X Dong, Z Cao, L Wei
European Symposium on Research in Computer Security, 270-289, 2015
352015
White-box traceable CP-ABE for cloud storage service: how to catch people leaking their access credentials effectively
J Ning, Z Cao, X Dong, L Wei
IEEE Transactions on Dependable and Secure Computing 15 (5), 883-897, 2016
252016
Privacy-preserving personal data operation on mobile cloud—Chances and challenges over advanced persistent threat
MH Au, K Liang, JK Liu, R Lu, J Ning
Future Generation Computer Systems 79, 337-349, 2018
152018
Passive attacks against searchable encryption
J Ning, J Xu, K Liang, F Zhang, EC Chang
IEEE Transactions on Information Forensics and Security 14 (3), 789-802, 2018
142018
Public auditing for shared cloud data with efficient and secure group management
H Tian, F Nan, H Jiang, CC Chang, J Ning, Y Huang
Information Sciences 472, 107-125, 2019
112019
Cryptcloud+: secure and expressive data access control for cloud storage
J Ning, Z Cao, X Dong, K Liang, L Wei, KKR Choo
IEEE Transactions on Services Computing, 2018
112018
An efficient key-policy attribute-based searchable encryption in prime-order groups
R Meng, Y Zhou, J Ning, K Liang, J Han, W Susilo
International Conference on Provable Security, 39-56, 2017
62017
Traceable CP-ABE with short ciphertexts: How to catch people selling decryption devices on ebay efficiently
J Ning, Z Cao, X Dong, J Gong, J Chen
European Symposium on Research in Computer Security, 551-569, 2016
62016
Traceable and revocable CP-ABE with shorter ciphertexts
J Ning, Z Cao, X Dong, L Wei
Science China Information Sciences 59 (11), 119102, 2016
52016
PrivHome: Privacy-preserving authenticated communication in smart home environment
GS Poh, P Gope, J Ning
IEEE Transactions on Dependable and Secure Computing, 2019
42019
Keeping Time-Release Secrets through Smart Contracts.
J Ning, H Dang, R Hou, EC Chang
IACR Cryptology ePrint Archive 2018, 1166, 2018
42018
Based Encryption Supporting Flexible Attributes Jianting Ning, Xiaolei Dong, Zhenfu Cao, Senior Member, IEEE, Lifei Wei, and Xiaodong Lin, Senior Member
WBTCP Attribute
IEEE, 0
4
Secure fine-grained encrypted keyword search for e-healthcare cloud
H Wang, J Ning, X Huang, G Wei, GS Poh, X Liu
IEEE Transactions on Dependable and Secure Computing, 2019
22019
Optimized approach for computing multi-base chains
X Yin, T Yang, J Ning
2011 Seventh International Conference on Computational Intelligence and …, 2011
22011
Identity-Based Signature Schemes for Multivariate Public Key Cryptosystems
J Chen, J Ling, J Ning, J Ding
The Computer Journal 62 (8), 1132-1147, 2019
12019
Lightweight privacy-preserving identity-based verifiable IoT-based health storage system
R Ding, H Zhong, J Ma, X Liu, J Ning
IEEE Internet of Things Journal 6 (5), 8393-8405, 2019
12019
Encryption Switching Service: Securely Switch Your Encrypted Data to Another Format
P Jiang, J Ning, K Liang, C Dong, J Chen, Z Cao
IEEE Transactions on Services Computing, 2018
12018
The system can't perform the operation now. Try again later.
Articles 1–20