Jianting Ning
Jianting Ning
Verified email at smu.edu.sg
Title
Cited by
Cited by
Year
White-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes
J Ning, X Dong, Z Cao, L Wei, X Lin
IEEE Transactions on Information Forensics and Security 10 (6), 1274-1288, 2015
1132015
Auditable -Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing
J Ning, Z Cao, X Dong, K Liang, H Ma, L Wei
IEEE Transactions on Information Forensics and Security 13 (1), 94-105, 2017
622017
Large universe ciphertext-policy attribute-based encryption with white-box traceability
J Ning, Z Cao, X Dong, L Wei, X Lin
European Symposium on Research in Computer Security, 55-72, 2014
572014
Accountable authority ciphertext-policy attribute-based encryption with white-box traceability and public auditing in the cloud
J Ning, X Dong, Z Cao, L Wei
European Symposium on Research in Computer Security, 270-289, 2015
402015
White-box traceable CP-ABE for cloud storage service: how to catch people leaking their access credentials effectively
J Ning, Z Cao, X Dong, L Wei
IEEE Transactions on Dependable and Secure Computing 15 (5), 883-897, 2016
322016
Passive attacks against searchable encryption
J Ning, J Xu, K Liang, F Zhang, EC Chang
IEEE Transactions on Information Forensics and Security 14 (3), 789-802, 2018
262018
Privacy-preserving personal data operation on mobile cloud—Chances and challenges over advanced persistent threat
MH Au, K Liang, JK Liu, R Lu, J Ning
Future Generation Computer Systems 79, 337-349, 2018
182018
Public auditing for shared cloud data with efficient and secure group management
H Tian, F Nan, H Jiang, CC Chang, J Ning, Y Huang
Information Sciences 472, 107-125, 2019
152019
Cryptcloud+: secure and expressive data access control for cloud storage
J Ning, Z Cao, X Dong, K Liang, L Wei, KKR Choo
IEEE Transactions on Services Computing, 2018
122018
Privhome: privacy-preserving authenticated communication in smart home environment
GS Poh, P Gope, J Ning
IEEE Transactions on Dependable and Secure Computing, 2019
102019
Attribute based encryption with privacy protection and accountability for CloudIoT
J Li, Y Zhang, J Ning, X Huang, GS Poh, D Wang
IEEE Transactions on Cloud Computing, 2020
92020
An efficient key-policy attribute-based searchable encryption in prime-order groups
R Meng, Y Zhou, J Ning, K Liang, J Han, W Susilo
International Conference on Provable Security, 39-56, 2017
82017
Traceable and revocable CP-ABE with shorter ciphertexts
J Ning, Z Cao, X Dong, L Wei
Science China Information Sciences 59 (11), 119102, 2016
62016
Traceable CP-ABE with short ciphertexts: How to catch people selling decryption devices on ebay efficiently
J Ning, Z Cao, X Dong, J Gong, J Chen
European Symposium on Research in Computer Security, 551-569, 2016
62016
Keeping Time-Release Secrets through Smart Contracts.
J Ning, H Dang, R Hou, EC Chang
IACR Cryptol. ePrint Arch. 2018, 1166, 2018
52018
Lightweight privacy-preserving identity-based verifiable IoT-based health storage system
R Ding, H Zhong, J Ma, X Liu, J Ning
IEEE Internet of Things Journal 6 (5), 8393-8405, 2019
42019
Based Encryption Supporting Flexible Attributes Jianting Ning, Xiaolei Dong, Zhenfu Cao, Senior Member, IEEE, Lifei Wei, and Xiaodong Lin, Senior Member
WBTCP Attribute
IEEE, 0
4
Secure fine-grained encrypted keyword search for e-healthcare cloud
H Wang, J Ning, X Huang, G Wei, GS Poh, X Liu
IEEE Transactions on Dependable and Secure Computing, 2019
32019
Identity-based signature schemes for multivariate public key cryptosystems
J Chen, J Ling, J Ning, J Ding
The Computer Journal 62 (8), 1132-1147, 2019
22019
Encryption switching service: Securely switch your encrypted data to another format
P Jiang, J Ning, K Liang, C Dong, J Chen, Z Cao
IEEE Transactions on Services Computing, 2018
22018
The system can't perform the operation now. Try again later.
Articles 1–20