Jiguo Li
Title
Cited by
Cited by
Year
Flexible and fine-grained attribute-based data storage in cloud computing
J Li, W Yao, Y Zhang, H Qian, J Han
IEEE Transactions on Services Computing 10 (5), 785-796, 2016
1392016
Certificate-based signature: security model and efficient construction
J Li, X Huang, Y Mu, W Susilo, Q Wu
European Public Key Infrastructure Workshop, 110-125, 2007
1362007
KSF-OABE: outsourced attribute-based encryption with keyword search function for cloud storage
J Li, X Lin, Y Zhang, J Han
IEEE Transactions on Services Computing 10 (5), 715-725, 2016
1312016
Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation
H Qian, J Li, Y Zhang, J Han
International Journal of Information Security 14 (6), 487-497, 2015
1132015
Anonymous and traceable group data sharing in cloud computing
J Shen, T Zhou, X Chen, J Li, W Susilo
IEEE Transactions on Information Forensics and Security 13 (4), 912-925, 2017
1102017
Present situation and progress of proxy signature
J LI, Z CAO, J LI, Y ZHANG
Journal of China Institute of Communications 24 (10), 114-124, 2003
91*2003
Searchable ciphertext‐policy attribute‐based encryption with revocation in cloud storage
J Li, Y Shi, Y Zhang
International Journal of Communication Systems 30 (1), e2942, 2017
892017
User collusion avoidance CP-ABE with efficient attribute revocation for cloud storage
J Li, W Yao, J Han, Y Zhang, J Shen
IEEE Systems Journal 12 (2), 1767-1777, 2017
712017
An efficient short certificate-based signature scheme
J Li, X Huang, Y Zhang, L Xu
Journal of Systems and Software 85 (2), 314-322, 2012
712012
An Efficient and Provably Secure Identity-Based Signature Scheme in the Standard Model
JG LI, PJ JIANG
Chinese Journal of Computers 11 (11), 2130-2136, 2009
59*2009
A novel efficient remote data possession checking protocol in cloud storage
H Yan, J Li, J Han, Y Zhang
IEEE Transactions on Information Forensics and Security 12 (1), 78-88, 2016
562016
Improvement of a threshold proxy signature scheme
JG Li, ZF Cao
Journal of Computer Research and Development 39 (11), 515-518, 2002
55*2002
Full verifiability for outsourced decryption in attribute based encryption
J Li, Y Wang, Y Zhang, J Han
IEEE transactions on services computing, 2017
462017
Constructions of certificate-based signature secure against key replacement attacks
J Li, X Huang, Y Mu, W Susilo, Q Wu
Journal of Computer Security 18 (3), 421-449, 2010
452010
Commissioning of electron cooling in CSRe
Y Xiao-Dong, M Li-Jun, L Guo-Hong, L Jie, M Xiao-Ming, Y Tai-Lai, ...
Chinese Physics C 34 (7), 998, 2010
422010
A leakage-resilient CCA-secure identity-based encryption scheme
J Li, M Teng, Y Zhang, Q Yu
The Computer Journal 59 (7), 1066-1075, 2016
412016
Provably secure certificate-based signature scheme without pairings
J Li, Z Wang, Y Zhang
Information Sciences 233, 313-320, 2013
412013
Cryptographic analysis and modification of proxy multi-signature scheme
JG Li, ZF Cao, YC Zhang, JZ Li
High Technology Letters 13 (4), 1-5, 2003
41*2003
Nonrepudiable proxy multi-signature scheme
JG Li, ZF Cao, YC Zhang
Journal of Computer Science and Technology 18 (3), 399-402, 2003
402003
Certificateless public integrity checking of group shared data on cloud storage
J Li, H Yan, Y Zhang
IEEE Transactions on Services Computing, 2018
382018
The system can't perform the operation now. Try again later.
Articles 1–20