Follow
Jingwei Li
Title
Cited by
Cited by
Year
Secure deduplication with efficient and reliable convergent key management
J Li, X Chen, M Li, J Li, PPC Lee, W Lou
IEEE transactions on parallel and distributed systems 25 (6), 1615-1625, 2013
7082013
Securely outsourcing attribute-based encryption with checkability
J Li, X Huang, J Li, X Chen, Y Xiang
IEEE Transactions on Parallel and Distributed Systems 25 (8), 2201-2210, 2013
4432013
Identity-based encryption with outsourced revocation in cloud computing
J Li, J Li, X Chen, C Jia, W Lou
Ieee Transactions on computers 64 (2), 425-437, 2013
4032013
Fine-grained access control system based on outsourced attribute-based encryption
J Li, X Chen, J Li, C Jia, J Ma, W Lou
European Symposium on Research in Computer Security, 592-609, 2013
1862013
Secure auditing and deduplicating data in cloud
J Li, J Li, D Xie, Z Cai
IEEE Transactions on Computers 65 (8), 2386-2396, 2015
1742015
Outsourcing encryption of attribute-based encryption with mapreduce
J Li, C Jia, J Li, X Chen
International Conference on Information and Communications Security, 191-201, 2012
1372012
Secure outsourced attribute-based signatures
X Chen, J Li, X Huang, J Li, Y Xiang, DS Wong
IEEE transactions on parallel and distributed systems 25 (12), 3285-3294, 2014
1262014
CDStore: Toward Reliable, Secure, and Cost-Efficient Cloud Storage via Convergent Dispersal
M Li, C Qin, J Li, PPC Lee
IEEE Internet Computing 20 (3), 45-53, 2016
1142016
Designing cloud-based electronic health record system with attribute-based encryption
F Xhafa, J Li, G Zhao, J Li, X Chen, DS Wong
Multimedia Tools and Applications 74 (10), 3441-3458, 2015
812015
Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid Cloud
J Li, J Li, X Chen, C Jia, Z Liu
Network and System Security, 490-502, 2012
702012
Rekeying for encrypted deduplication storage
J Li, C Qin, PPC Lee, J Li
2016 46th Annual IEEE/IFIP International Conference on Dependable Systems …, 2016
552016
Privacy-preserving data utilization in hybrid clouds
J Li, J Li, X Chen, Z Liu, C Jia
Future Generation Computer Systems 30, 98-106, 2014
432014
Survey on the searchable encryption
J Li, CF Jia, Z Liu, J Li, M Li
Journal of Software 26 (1), 109-128, 2015
402015
Format-preserving encryption for datetime
Z Liu, C Jia, J Li, X Cheng
2010 IEEE International Conference on Intelligent Computing and Intelligent …, 2010
402010
The design and implementation of a rekeying-aware encrypted deduplication storage system
C Qin, J Li, PPC Lee
ACM Transactions on Storage (TOS) 13 (1), 1-30, 2017
372017
Towards privacy-preserving storage and retrieval in multiple clouds
J Li, D Lin, AC Squicciarini, J Li, C Jia
IEEE Transactions on Cloud Computing 5 (3), 499-509, 2015
372015
可搜索加密技术研究综述
李经纬, 贾春福, 刘哲理, 李进, 李敏
软件学报 1, 2015
362015
Enabling efficient and secure data sharing in cloud computing
J Li, J Li, Z Liu, C Jia
Concurrency and computation: practice and experience 26 (5), 1052-1066, 2014
332014
MobiShare+: Security Improved System for Location Sharing in Mobile Online Social Networks.
J Li, J Li, X Chen, Z Liu, C Jia
J. Internet Serv. Inf. Secur. 4 (1), 25-36, 2014
302014
MMB -Tree: Authenticated Index for Verifiable Cloud Service Selection
J Li, AC Squicciarini, D Lin, S Sundareswaran, C Jia
IEEE Transactions on Dependable and Secure computing 14 (2), 185-198, 2015
292015
The system can't perform the operation now. Try again later.
Articles 1–20