default search action
Jing Qin 0002
Person information
- affiliation (PhD 2004): Shandong University, School of Mathematics, Jinan, China
Other persons with the same name
- Jing Qin — disambiguation page
- Harry Qin (aka: Jing Qin 0001) — Hong Kong Polytechnic University, School of Nursing, Centre for Smart Health, Hong Kong (and 3 more)
- Jing Qin 0003 — University of Kentucky, Department of Mathematics, Lexington, KY, USA (and 3 more)
- Jing Qin 0004 — Chinese University of Hong Kong, School of Life Sciences, Hong Kong (and 1 more)
- Jing Qin 0005 — Northeastern University, School of Computer Science and Engineering, Shenyang, China
- Jing Qin 0006 — University of Southern Denmark, Department of Mathematics and Computer Science, Odense, Denmark (and 2 more)
- Jing Qin 0007 — Dalian University, School of Software Engineering, Dalian, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j46]Xi Zhang, Ye Su, Jing Qin, Jiameng Sun:
SDTA: Secure Decentralized Trading Alliance for Electronic Medical Data. Comput. J. 67(8): 2573-2585 (2024) - [j45]Yinghui Huang, Wenting Shen, Jing Qin:
Certificateless cloud storage auditing supporting data ownership transfer. Comput. Secur. 139: 103738 (2024) - [j44]Leixiao Cheng, Jing Qin, Fei Meng:
Privacy leakage of certificateless public key authenticated searchable encryption via frequency analysis: Attacks and revises. Comput. Stand. Interfaces 87: 103762 (2024) - [j43]Jinlu Liu, Jing Qin, Wenchao Wang, Lin Mei, Huaxiong Wang:
Key-aggregate based access control encryption for flexible cloud data sharing. Comput. Stand. Interfaces 88: 103800 (2024) - [j42]Jiewang Cai, Wenting Shen, Jing Qin:
ESVFL: Efficient and secure verifiable federated learning with privacy-preserving. Inf. Fusion 109: 102420 (2024) - [j41]Jinlu Liu, Jing Qin, Xi Zhang, Huaxiong Wang:
Efficient Key-Aggregate Cryptosystem With User Revocation for Selective Group Data Sharing in Cloud Storage. IEEE Trans. Knowl. Data Eng. 36(11): 6042-6055 (2024) - [j40]Xi Zhang, Cheng Huang, Ye Su, Jing Qin:
Secure, Dynamic, and Efficient Keyword Search With Flexible Merging for Cloud Storage. IEEE Trans. Serv. Comput. 17(5): 2822-2835 (2024) - 2023
- [j39]Qing Wang, Xi Zhang, Jing Qin, Jixin Ma, Xinyi Huang:
A Verifiable Symmetric Searchable Encryption Scheme Based on the AVL Tree. Comput. J. 66(1): 174-183 (2023) - [j38]Jinlu Liu, Bo Zhao, Jing Qin, Xi Zhang, Jixin Ma:
Multi-Keyword Ranked Searchable Encryption with the Wildcard Keyword for Data Sharing in Cloud Computing. Comput. J. 66(1): 184-196 (2023) - [j37]Yinghui Huang, Wenting Shen, Jing Qin, Huiying Hou:
Privacy-preserving certificateless public auditing supporting different auditing frequencies. Comput. Secur. 128: 103181 (2023) - [j36]Wei Cao, Wenting Shen, Zhixiang Zhang, Jing Qin:
Privacy-preserving healthcare monitoring for IoT devices under edge computing. Comput. Secur. 134: 103464 (2023) - [j35]Ye Su, Xi Zhang, Jing Qin, Jixin Ma:
Efficient and Flexible Multiauthority Attribute-Based Authentication for IoT Devices. IEEE Internet Things J. 10(15): 13945-13958 (2023) - [j34]Jinlu Liu, Bo Zhao, Jing Qin, Xinyi Hou, Jixin Ma:
Key-aggregate searchable encryption supporting conjunctive queries for flexible data sharing in the cloud. Inf. Sci. 645: 119336 (2023) - [j33]Leixiao Cheng, Jing Qin, Feng Feng, Fei Meng:
Security-enhanced public-key authenticated searchable encryption. Inf. Sci. 647: 119454 (2023) - [j32]Haining Yang, Dengguo Feng, Jing Qin:
Efficient Verifiable Unbounded-Size Database From Authenticated Matrix Commitment. IEEE Trans. Dependable Secur. Comput. 20(5): 3873-3889 (2023) - [j31]Jinlu Liu, Zhongkai Wei, Jing Qin, Bo Zhao, Jixin Ma:
Verifiable Key-Aggregate Searchable Encryption With a Designated Server in Multi-Owner Setting. IEEE Trans. Serv. Comput. 16(6): 4233-4247 (2023) - 2022
- [j30]Ye Su, Jiameng Sun, Jing Qin, Jiankun Hu:
Publicly Verifiable Shared Dynamic Electronic Health Record Databases With Functional Commitment Supporting Privacy-Preserving Integrity Auditing. IEEE Trans. Cloud Comput. 10(3): 2050-2065 (2022) - [j29]Haining Yang, Ye Su, Jing Qin, Huaxiong Wang:
Privacy-Preserving Outsourced Inner Product Computation on Encrypted Database. IEEE Trans. Dependable Secur. Comput. 19(2): 1320-1337 (2022) - 2021
- [j28]Xi Zhang, Bo Zhao, Jing Qin, Wei Hou, Ye Su, Haining Yang:
Practical wildcard searchable encryption with tree-based index. Int. J. Intell. Syst. 36(12): 7475-7499 (2021) - [j27]Jiameng Sun, Ye Su, Jing Qin, Jiankun Hu, Jixin Ma:
Outsourced Decentralized Multi-Authority Attribute Based Signature and Its Application in IoT. IEEE Trans. Cloud Comput. 9(3): 1195-1209 (2021) - [j26]Wenting Shen, Jing Qin, Jia Yu, Rong Hao, Jiankun Hu, Jixin Ma:
Data Integrity Auditing without Private Key Storage for Secure Cloud Storage. IEEE Trans. Cloud Comput. 9(4): 1408-1421 (2021) - 2020
- [j25]Ke Huang, Xiaosong Zhang, Yi Mu, Fatemeh Rezaeibagha, Xiaofen Wang, Jingwei Li, Qi Xia, Jing Qin:
EVA: Efficient Versatile Auditing Scheme for IoT-Based Datamarket in Jointcloud. IEEE Internet Things J. 7(2): 882-892 (2020) - [j24]Haining Yang, Ye Su, Jing Qin, Huaxiong Wang, Yongcheng Song:
Verifiable inner product computation on outsourced database for authenticated multi-user data sharing. Inf. Sci. 539: 295-311 (2020) - [j23]Xi Zhang, Ye Su, Jing Qin:
A Dynamic Searchable Symmetric Encryption Scheme for Multiuser with Forward and Backward Security. Secur. Commun. Networks 2020: 8893016:1-8893016:13 (2020) - 2019
- [j22]Haining Yang, Jiameng Sun, Jing Qin, Jixin Ma:
An improved scheme for outsourced computation with attribute-based encryption. Concurr. Comput. Pract. Exp. 31(21) (2019) - [j21]Dawei Xie, Haining Yang, Jing Qin, Jixin Ma:
Privacy-Preserving and Publicly Verifiable Protocol for Outsourcing Polynomials Evaluation to a Malicious Cloud. Int. J. Digit. Crime Forensics 11(4): 14-27 (2019) - [j20]Binrui Zhu, Jiameng Sun, Jing Qin, Jixin Ma:
A Secure Data Sharing Scheme with Designated Server. Secur. Commun. Networks 2019: 4268731:1-4268731:16 (2019) - [j19]Wenting Shen, Jing Qin, Jixin Ma:
A Lightweight Identity-Based Cloud Storage Auditing Supporting Proxy Update and Workload-Based Payment. Secur. Commun. Networks 2019: 8275074:1-8275074:15 (2019) - [j18]Binrui Zhu, Willy Susilo, Jing Qin, Fuchun Guo, Zhen Zhao, Jixin Ma:
A Secure and Efficient Data Sharing and Searching Scheme in Wireless Sensor Networks. Sensors 19(11): 2583 (2019) - [j17]Binrui Zhu, Jiameng Sun, Jing Qin, Jixin Ma:
Fuzzy matching: multi-authority attribute searchable encryption without central authority. Soft Comput. 23(2): 527-536 (2019) - [j16]Wenting Shen, Jing Qin, Jia Yu, Rong Hao, Jiankun Hu:
Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage. IEEE Trans. Inf. Forensics Secur. 14(2): 331-346 (2019) - 2018
- [j15]Jiameng Sun, Binrui Zhu, Jing Qin, Jiankun Hu, Jixin Ma:
Confidentiality-Preserving Publicly Verifiable Computation Schemes for Polynomial Evaluation and Matrix-Vector Multiplication. Secur. Commun. Networks 2018: 5275132:1-5275132:15 (2018) - 2017
- [j14]Huawei Zhao, Minglei Shu, Jing Qin, Jiankun Hu:
Key negotiation schemes for body sensor networks on the surface of the human body. Int. J. Auton. Adapt. Commun. Syst. 10(1): 55-66 (2017) - [j13]Jiameng Sun, Binrui Zhu, Jing Qin, Jiankun Hu, Qianhong Wu:
Confidentiality-Preserving Publicly Verifiable Computation. Int. J. Found. Comput. Sci. 28(6): 799-818 (2017) - 2016
- [j12]Yue Zhang, Jing Qin, Lihua Du:
A secure biometric authentication based on PEKS. Concurr. Comput. Pract. Exp. 28(4): 1111-1123 (2016) - [j11]Fei Han, Jing Qin, Jiankun Hu:
Secure searches in the cloud: A survey. Future Gener. Comput. Syst. 62: 66-75 (2016) - [j10]Haibin Zheng, Jing Qin, Jiankun Hu, Qianhong Wu:
Threshold attribute-based signcryption and its application to authenticated key agreement. Secur. Commun. Networks 9(18): 4914-4923 (2016) - 2015
- [j9]Huawei Zhao, Chi Chen, Jiankun Hu, Jing Qin:
Securing Body Sensor Networks with Biometric Methods: A New Key Negotiation Method and a Key Sampling Method for Linear Interpolation Encryption. Int. J. Distributed Sens. Networks 11: 764919:1-764919:11 (2015) - [j8]Guoyan Zhang, Jing Qin:
Lattice-based threshold cryptography and its applications in distributed cloud computing. Int. J. High Perform. Comput. Netw. 8(2): 176-185 (2015) - [j7]Guoyan Zhang, Jing Qin, Shams Qazi:
Multi-Authority Attribute-Based Encryption Scheme from Lattices. J. Univers. Comput. Sci. 21(3): 483-501 (2015) - 2014
- [j6]Fei Han, Jing Qin, Huawei Zhao, Jiankun Hu:
A general transformation from KP-ABE to searchable encryption. Future Gener. Comput. Syst. 30: 107-115 (2014) - [j5]Fei Han, Jing Qin:
A Function Private Attribute-Based Encryption. Int. J. Distributed Sens. Networks 10 (2014) - [j4]Jing Qin, Hongwei Duan, Huawei Zhao, Jiankun Hu:
A new Lagrange solution to the privacy-preserving general geometric intersection problem. J. Netw. Comput. Appl. 46: 94-99 (2014) - 2013
- [j3]Huawei Zhao, Jing Qin, Jiankun Hu:
An Energy Efficient Key Management Scheme for Body Sensor Networks. IEEE Trans. Parallel Distributed Syst. 24(11): 2202-2210 (2013) - 2012
- [j2]Xuan Zhang, Jing Qin, Qiaoyan Wen, Jie Zhang:
A General Construction of Sequences with Good Autocorrelation over the 16-QAM Constellation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(10): 1801-1805 (2012) - 2010
- [j1]Jing Qin, Huawei Zhao:
k out of n Oblivious Transfer Protocols from Bilinear Pairings. J. Softw. 5(1): 65-72 (2010)
Conference and Workshop Papers
- 2023
- [c14]Wenchao Wang, Jing Qin, Jinlu Liu, Xi Zhang, Xinyi Hou, Zhongkai Wei:
The Analysis of Schnorr Multi-Signatures and the Application to AI. AIS&P (1) 2023: 114-130 - [c13]Xi Zhang, Ye Su, Zhongkai Wei, Wenting Shen, Jing Qin:
Efficient Wildcard Searchable Symmetric Encryption with Forward and Backward Security. AIS&P (1) 2023: 342-357 - 2022
- [c12]Xi Zhang, Cheng Huang, Ye Su, Jing Qin, Xuemin Shen:
Divertible Searchable Symmetric Encryption for Secure Cloud Storage. GLOBECOM 2022: 3785-3790 - 2020
- [c11]Haining Yang, Ye Su, Jing Qin, Jinhua Ma, Huaxiong Wang:
An Efficient Public Batch Auditing Scheme for Data Integrity in Standard Model. ML4CS (1) 2020: 578-592 - 2017
- [c10]Jiameng Sun, Jing Qin, Jixin Ma:
Securely Outsourcing Decentralized Multi-authority Attribute Based Signature. CSS 2017: 86-102 - [c9]Binrui Zhu, Jiameng Sun, Jing Qin, Jixin Ma:
The Public Verifiability of Public Key Encryption with Keyword Search. MONAMI 2017: 299-312 - [c8]Jiameng Sun, Binrui Zhu, Jing Qin, Jixin Ma:
A confidentiality preserving publicly verifiable computation for multivariate polynomials. SERA 2017: 5-12 - 2015
- [c7]Haibin Zheng, Jing Qin, Jiankun Hu, Qianhong Wu:
Threshold Attribute-Based Signcryption in Standard Model. CSCloud 2015: 187-193 - 2013
- [c6]Huawei Zhao, Minglei Shu, Jing Qin, Jiankun Hu:
A Key Management Scheme between Body Sensor Networks and the Base Station. CIS 2013: 743-747 - 2012
- [c5]Fei Han, Jing Qin, Huawei Zhao, Jiankun Hu:
A General Transformation from KP-ABE to Searchable Encryption. CSS 2012: 165-178 - [c4]Huawei Zhao, Jing Qin, Minglei Shu, Jiankun Hu:
A Hash Chains Based Key Management Scheme for Wireless Sensor Networks. CSS 2012: 296-308 - [c3]Jing Qin, Jiankun Hu, Huawei Zhao:
Simulatable Oblivious Transfer Protocols Based on Blind Signature. TrustCom 2012: 466-473 - [c2]Huawei Zhao, Jiankun Hu, Jing Qin, Vijay Varadharajan, Haishan Wan:
Hashed Random Key Pre-distribution Scheme for Large Heterogeneous Sensor Networks. TrustCom 2012: 706-713 - 2008
- [c1]Huawei Zhao, Jing Qin, Zhifeng Fang:
Converters for Designing Applied Cryptographic Protocols. EUC (2) 2008: 139-143
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 21:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint