Остановите войну!
for scientists:
default search action
Jianfeng Wang
- > Home > Persons > Jianfeng Wang
Publications
- 2023
- [j146]Jianghong Wei, Xiaofeng Chen, Jianfeng Wang, Willy Susilo, Ilsun You:
Towards secure asynchronous messaging with forward secrecy and mutual authentication. Inf. Sci. 626: 114-132 (2023) - [j138]Saiyu Qi, Jianfeng Wang, Meixia Miao, Meng Zhang, Xiaofeng Chen:
TinyEnc: Enabling Compressed and Encrypted Big Data Stores With Rich Query Support. IEEE Trans. Dependable Secur. Comput. 20(1): 176-192 (2023) - [j134]Jianghong Wei, Xiaofeng Chen, Jianfeng Wang, Xinyi Huang, Willy Susilo:
Securing Fine-Grained Data Sharing and Erasure in Outsourced Storage Systems. IEEE Trans. Parallel Distributed Syst. 34(2): 552-566 (2023) - 2022
- [j119]Jianghong Wei, Xiaofeng Chen, Jianfeng Wang, Xuexian Hu, Jianfeng Ma:
Enabling (End-to-End) Encrypted Cloud Emails With Practical Forward Secrecy. IEEE Trans. Dependable Secur. Comput. 19(4): 2318-2332 (2022) - [j112]Haoran Yuan, Xiaofeng Chen, Jin Li, Tao Jiang, Jianfeng Wang, Robert H. Deng:
Secure Cloud Data Deduplication with Efficient Re-Encryption. IEEE Trans. Serv. Comput. 15(1): 442-456 (2022) - [j111]Yunling Wang, Shifeng Sun, Jianfeng Wang, Joseph K. Liu, Xiaofeng Chen:
Achieving Searchable Encryption Scheme With Search Pattern Hidden. IEEE Trans. Serv. Comput. 15(2): 1012-1025 (2022) - [c115]Jianfeng Wang, Shifeng Sun, Tianci Li, Saiyu Qi, Xiaofeng Chen:
Practical Volume-Hiding Encrypted Multi-Maps with Optimal Overhead and Beyond. CCS 2022: 2825-2839 - [c106]Jiaojiao Wu, Jianfeng Wang, Xinwei Yong, Xinyi Huang, Xiaofeng Chen:
New Unbounded Verifiable Data Streaming for Batch Query with Almost Optimal Overhead. ESORICS (1) 2022: 346-366 - [i40]Jiaojiao Wu, Jianfeng Wang, Xinwei Yong, Xinyi Huang, Xiaofeng Chen:
New Unbounded Verifiable Data Streaming for Batch Query with Almost Optimal Overhead. IACR Cryptol. ePrint Arch. 2022: 1028 (2022) - 2021
- [c90]Chunyang Lv, Jianfeng Wang, Shifeng Sun, Yunling Wang, Saiyu Qi, Xiaofeng Chen:
Efficient Multi-client Order-Revealing Encryption and Its Applications. ESORICS (2) 2021: 44-63 - 2020
- [j100]Hui Huang, Xiaofeng Chen, Jianfeng Wang:
Blockchain-based multiple groups data sharing with anonymity and traceability. Sci. China Inf. Sci. 63(3) (2020) - [j94]Haoran Yuan, Xiaofeng Chen, Jianfeng Wang, Jiaming Yuan, Hongyang Yan, Willy Susilo:
Blockchain-based public auditing and secure deduplication with fair arbitration. Inf. Sci. 541: 409-425 (2020) - [j92]Xu Ma, Cunmei Ji, Xiaoyu Zhang, Jianfeng Wang, Jin Li, Kuan-Ching Li, Xiaofeng Chen:
Secure multiparty learning from the aggregation of locally trained models. J. Netw. Comput. Appl. 167: 102754 (2020) - 2019
- [j86]Yunling Wang, Jianfeng Wang, Shifeng Sun, Meixia Miao, Xiaofeng Chen:
Toward Forward Secure SSE Supporting Conjunctive Keyword Search. IEEE Access 7: 142762-142772 (2019) - [j81]Kamil Kluczniak, Jianfeng Wang, Xiaofeng Chen, Miroslaw Kutylowski:
Multi-device anonymous authentication. Int. J. Inf. Sec. 18(2): 181-197 (2019) - [j78]Yunling Wang, Jianfeng Wang, Shifeng Sun, Joseph K. Liu, Willy Susilo, Joonsang Baek, Ilsun You, Xiaofeng Chen:
Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption. J. Univers. Comput. Sci. 25(3): 222-244 (2019) - [c73]Jianghong Wei, Xiaofeng Chen, Jianfeng Wang, Xuexian Hu, Jianfeng Ma:
Forward-Secure Puncturable Identity-Based Encryption for Securing Cloud Emails. ESORICS (2) 2019: 134-150 - [c72]Zhongjun Zhang, Jianfeng Wang, Yunling Wang, Yaping Su, Xiaofeng Chen:
Towards Efficient Verifiable Forward Secure Searchable Symmetric Encryption. ESORICS (2) 2019: 304-321 - 2018
- [j66]Xiaoyu Zhang, Xiaofeng Chen, Jianfeng Wang, Zhihui Zhan, Jin Li:
Verifiable privacy-preserving single-layer perceptron training scheme in cloud computing. Soft Comput. 22(23): 7719-7732 (2018) - [c64]Jianfeng Wang, Xiaofeng Chen, Shifeng Sun, Joseph K. Liu, Man Ho Au, Zhi-Hui Zhan:
Towards Efficient Verifiable Conjunctive Keyword Search for Large Encrypted Database. ESORICS (2) 2018: 83-100 - [c61]Changsong Yang, Jianfeng Wang, Xiaoling Tao, Xiaofeng Chen:
Publicly Verifiable Data Transfer and Deletion Scheme for Cloud Storage. ICICS 2018: 445-458 - [c58]Jingjing Guo, Jianfeng Wang, Zhiwei Zhang, Xiaofeng Chen:
An Almost Non-interactive Order Preserving Encryption Scheme. ISPEC 2018: 87-100 - 2017
- [j62]Jianfeng Wang, Xiaofeng Chen, Jin Li, Jiaolian Zhao, Jian Shen:
Towards achieving flexible and verifiable search for outsourced database in cloud computing. Future Gener. Comput. Syst. 67: 266-275 (2017) - [j61]Jianfeng Wang, Xiaofeng Chen, Jin Li, Kamil Kluczniak, Miroslaw Kutylowski:
TrDup: enhancing secure data deduplication with user traceability in cloud computing. Int. J. Web Grid Serv. 13(3): 270-289 (2017) - [j58]Qin Zou, Jianfeng Wang, Jun Ye, Jian Shen, Xiaofeng Chen:
Efficient and secure encrypted image search in mobile cloud computing. Soft Comput. 21(11): 2959-2969 (2017) - [c52]Yunling Wang, Jianfeng Wang, Shifeng Sun, Joseph K. Liu, Willy Susilo, Xiaofeng Chen:
Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption. ProvSec 2017: 24-38 - 2016
- [j54]Jianfeng Wang, Xiaofeng Chen:
Efficient and Secure Storage for Outsourced Data: A Survey. Data Sci. Eng. 1(3): 178-188 (2016) - [j53]Yunling Wang, Jianfeng Wang, Xiaofeng Chen:
Secure searchable encryption: a survey. J. Commun. Inf. Networks 1(4): 52-65 (2016) - [j51]Jianfeng Wang, Meixia Miao, Yaqian Gao, Xiaofeng Chen:
Enabling efficient approximate nearest neighbor search for outsourced database in cloud computing. Soft Comput. 20(11): 4487-4495 (2016) - [c51]Zhiwei Zhang, Yunling Wang, Jianfeng Wang, Xiaofeng Chen, Jianfeng Ma:
Location-Sensitive Data Sharing in Mobile Cloud Computing. BWCCA 2016: 799-805 - [c47]Miroslaw Kutylowski, Jacek Cichon, Lucjan Hanzlik, Kamil Kluczniak, Xiaofeng Chen, Jianfeng Wang:
Protecting Electronic Signatures in Case of Key Leakage. Mycrypt 2016: 252-274 - [c46]Kamil Kluczniak, Jianfeng Wang, Xiaofeng Chen, Miroslaw Kutylowski:
Multi-device Anonymous Authentication. NSS 2016: 21-36 - 2015
- [j48]Meixia Miao, Jianfeng Wang, Hui Li, Xiaofeng Chen:
Secure multi-server-aided data deduplication in cloud computing. Pervasive Mob. Comput. 24: 129-137 (2015) - [j47]Jianfeng Wang, Xiaofeng Chen, Xinyi Huang, Ilsun You, Yang Xiang:
Verifiable Auditing for Outsourced Database in Cloud Computing. IEEE Trans. Computers 64(11): 3293-3303 (2015) - [c44]Jianfeng Wang, Xiaofeng Chen, Jin Li, Kamil Kluczniak, Miroslaw Kutylowski:
A New Secure Data Deduplication Approach Supporting User Traceability. BWCCA 2015: 120-124 - [c43]Jianfeng Wang, Xiaofeng Chen, Jin Li:
Verifiable Search for Dynamic Outsourced Database in Cloud Computing. BWCCA 2015: 568-571 - [c42]Qin Zou, Jianfeng Wang, Xiaofeng Chen:
Secure Encrypted Image Search in Mobile Cloud Computing. BWCCA 2015: 572-575 - 2014
- [j44]Fatos Xhafa, Jianfeng Wang, Xiaofeng Chen, Joseph K. Liu, Jin Li, Paul Krause:
An efficient PHR service system supporting fuzzy keyword search and fine-grained access control. Soft Comput. 18(9): 1795-1802 (2014) - [c35]Haixin Nie, Hua Ma, Jianfeng Wang, Xiaofeng Chen:
Verifiable Algorithm for Secure Outsourcing of Systems of Linear Equations in the Case of No Solution. BWCCA 2014: 572-577 - [c34]Yaqian Gao, Meixia Miao, Jianfeng Wang, Xiaofeng Chen:
Secure Approximate Nearest Neighbor Search over Encrypted Data. BWCCA 2014: 578-583 - [c32]Zhenyu Zhang, Wujun Zhang, Jianfeng Wang, Xiaofeng Chen:
An Effective Cloud-Based Active Defense System against Malicious Codes. ICT-EurAsia 2014: 690-695 - 2013
- [j40]Jianfeng Wang, Hua Ma, Qiang Tang, Jin Li, Hui Zhu, Siqi Ma, Xiaofeng Chen:
Efficient verifiable fuzzy keyword search over encrypted data in cloud computing. Comput. Sci. Inf. Syst. 10(2): 667-684 (2013) - 2012
- [j35]Jianfeng Wang, Xiaofeng Chen, Hua Ma, Qiang Tang, Jin Li, Hui Zhu:
A Verifiable Fuzzy Keyword Search Scheme Over Encrypted Data. J. Internet Serv. Inf. Secur. 2(1/2): 49-58 (2012) - [j34]Jianfeng Wang, Hua Ma, Qiang Tang, Jin Li, Hui Zhu, Siqi Ma, Xiaofeng Chen:
A New Efficient Verifiable Fuzzy Keyword Search Scheme. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3(4): 61-71 (2012)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 23:37 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint