default search action
Rong Hao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j54]Guoqing Chen, Rong Hao, Ming Yang:
Popularity-based multiple-replica cloud storage integrity auditing for big data. Future Gener. Comput. Syst. 163: 107534 (2025) - 2024
- [j53]Xuan Zhao, Jia Yu, Xinrui Ge, Rong Hao:
Towards efficient Secure Boolean Range Query over encrypted spatial data. Comput. Secur. 136: 103544 (2024) - [j52]Yunjiao Song, Jia Yu, Xinrui Ge, Rong Hao:
Enabling Privacy-Preserving Boolean kNN Query Over Cloud-Based Spatial Data. IEEE Internet Things J. 11(23): 38262-38272 (2024) - [j51]Wenjing Gao, Wei Liang, Rong Hao, Jia Yu:
Enabling privacy-preserving non-interactive computation for Hamming distance. Inf. Sci. 670: 120592 (2024) - [j50]Yunfeng Zhang, Rong Hao, Xinrui Ge, Jia Yu:
Privacy-preserving verifiable fuzzy phrase search over cloud-based data. J. Inf. Secur. Appl. 87: 103910 (2024) - [j49]Xinrui Ge, Jia Yu, Rong Hao:
Privacy-Preserving Graph Matching Query Supporting Quick Subgraph Extraction. IEEE Trans. Dependable Secur. Comput. 21(3): 1286-1300 (2024) - [j48]Min Wang, Jia Yu, Wenting Shen, Rong Hao:
Privacy-Preserving Time-Based Auditing for Secure Cloud Storage. IEEE Trans. Inf. Forensics Secur. 19: 7866-7878 (2024) - [j47]Li Guo, Rong Hao, Jia Yu, Ming Yang:
Privacy-Preserving Naïve Bayesian Classification for Health Monitoring Systems. IEEE Trans. Ind. Informatics 20(10): 11622-11634 (2024) - [j46]Yunjiao Song, Xinrui Ge, Jia Yu, Rong Hao, Ming Yang:
Enabling Privacy-Preserving $K$K-Hop Reachability Query Over Encrypted Graphs. IEEE Trans. Serv. Comput. 17(3): 893-904 (2024) - 2023
- [j45]Zhiqiang Wang, Wenjing Gao, Ming Yang, Rong Hao:
Enabling Secure Data sharing with data deduplication and sensitive information hiding in cloud-assisted Electronic Medical Systems. Clust. Comput. 26(6): 3839-3854 (2023) - [j44]Wenjing Gao, Jia Yu, Rong Hao, Fanyu Kong, Xiaodong Liu:
Privacy-Preserving Face Recognition With Multi-Edge Assistance for Intelligent Security Systems. IEEE Internet Things J. 10(12): 10948-10958 (2023) - [j43]Yunfeng Zhang, Rong Hao, Xinrui Ge, Jia Yu:
Verifiable fuzzy keyword search supporting sensitive information hiding for data sharing in cloud-assisted e-healthcare systems. J. Syst. Archit. 142: 102940 (2023) - [j42]Min Wang, Lujun Xu, Rong Hao, Ming Yang:
Secure auditing and deduplication with efficient ownership management for cloud storage. J. Syst. Archit. 142: 102953 (2023) - [j41]Fangyuan Sun, Jia Yu, Rong Hao, Ming Yang, Fanyu Kong:
Privacy-Preserving Shortest Distance Query for Dynamic Large-Scale Road Network. IEEE Syst. J. 17(2): 1729-1740 (2023) - [j40]Zhiqiang Wang, Wenjing Gao, Jia Yu, Wengting Shen, Rong Hao:
Lightweight Secure Deduplication Based on Data Popularity. IEEE Syst. J. 17(4): 5531-5542 (2023) - 2022
- [j39]Hanlin Zhang, Jia Yu, Mohammad S. Obaidat, Pandi Vijayakumar, Linqiang Ge, Jie Lin, Jianxi Fan, Rong Hao:
Secure Edge-Aided Computations for Social Internet-of-Things Systems. IEEE Trans. Comput. Soc. Syst. 9(1): 76-87 (2022) - [j38]Xinrui Ge, Jia Yu, Rong Hao, Haibin Lv:
Verifiable Keyword Search Supporting Sensitive Information Hiding for the Cloud-Based Healthcare Sharing System. IEEE Trans. Ind. Informatics 18(8): 5573-5583 (2022) - [c15]Zhiqiang Wang, Wenjing Gao, Xinliang Li, Rong Hao:
A Secure Encrypted Data Deduplication Scheme Based on Data Popularity Supporting Dynamic Ownership Management. ICBDT 2022: 120-124 - 2021
- [j37]Wenting Shen, Jing Qin, Jia Yu, Rong Hao, Jiankun Hu, Jixin Ma:
Data Integrity Auditing without Private Key Storage for Secure Cloud Storage. IEEE Trans. Cloud Comput. 9(4): 1408-1421 (2021) - [j36]Xinrui Ge, Jia Yu, Hanlin Zhang, Chengyu Hu, Zengpeng Li, Zhan Qin, Rong Hao:
Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification. IEEE Trans. Dependable Secur. Comput. 18(1): 490-504 (2021) - [j35]Jia Yu, Rong Hao:
Comments on "SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage". IEEE Trans. Serv. Comput. 14(6): 2090-2092 (2021) - [c14]Jiawei Hou, Yaru Liu, Rong Hao:
Privacy-Preserving Phrase Search over Encrypted Data. ICBDT 2021: 154-159 - 2020
- [j34]Wenting Shen, Ye Su, Rong Hao:
Lightweight Cloud Storage Auditing With Deduplication Supporting Strong Privacy Protection. IEEE Access 8: 44359-44372 (2020) - [j33]Qianqian Su, Rong Hao, Shaoxia Duan, Fanyu Kong, Xiaodong Liu, Jia Yu:
Secure Computation Outsourcing for Inversion in Finite Field. J. Internet Serv. Inf. Secur. 10(2): 35-48 (2020) - [j32]Yue Zhang, Jia Yu, Rong Hao, Cong Wang, Kui Ren:
Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data. IEEE Trans. Dependable Secur. Comput. 17(3): 608-619 (2020) - [j31]Jianli Bai, Rong Hao:
Comment on "Privacy-preserving public auditing for non-manager group shared data". J. Supercomput. 76(7): 5563-5577 (2020)
2010 – 2019
- 2019
- [j30]Chengyu Hu, Xiangfu Song, Pengtao Liu, Yue Xin, Yuqin Xu, Yuyu Duan, Rong Hao:
Forward Secure Conjunctive-Keyword Searchable Encryption. IEEE Access 7: 35035-35048 (2019) - [j29]Huiying Hou, Jia Yu, Rong Hao:
Cloud storage auditing with deduplication supporting different security levels according to data popularity. J. Netw. Comput. Appl. 134: 26-39 (2019) - [j28]Wenting Shen, Jing Qin, Jia Yu, Rong Hao, Jiankun Hu:
Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage. IEEE Trans. Inf. Forensics Secur. 14(2): 331-346 (2019) - [c13]Xiaoran Li, Rong Hao:
A Note on "Enhancing cloud storage security against a new replay attack with an efficient public auditing scheme". ICBDT 2019: 48-51 - 2018
- [j27]Xinrui Ge, Jia Yu, Chengyu Hu, Hanlin Zhang, Rong Hao:
Enabling Efficient Verifiable Fuzzy Keyword Search Over Encrypted Data in Cloud Computing. IEEE Access 6: 45725-45739 (2018) - [j26]Huiying Hou, Jia Yu, Hanlin Zhang, Yan Xu, Rong Hao:
Enabling secure auditing and deduplicating data without owner-relationship exposure in cloud storage. Clust. Comput. 21(4): 1849-1863 (2018) - [j25]Huiying Hou, Jia Yu, Rong Hao:
Provable Multiple-Replica Dynamic Data Possession for Big Data Storage in Cloud Computing. Int. J. Netw. Secur. 20(3): 575-584 (2018) - [j24]Jia Yu, Rong Hao, Hui Xia, Hanlin Zhang, Xiangguo Cheng, Fanyu Kong:
Intrusion-resilient identity-based signatures: Concrete scheme in the standard model and generic construction. Inf. Sci. 442-443: 158-172 (2018) - [c12]Rong Hao, Jia Zhang, Bin Xin, Chen Chen, Lihua Dou:
A hybrid differential evolution and estimation of distribution algorithm for the multi-point dynamic aggregation problem. GECCO (Companion) 2018: 251-252 - 2017
- [j23]Wenting Shen, Guangyang Yang, Jia Yu, Hanlin Zhang, Fanyu Kong, Rong Hao:
Remote data possession checking with privacy-preserving authenticators for cloud storage. Future Gener. Comput. Syst. 76: 136-145 (2017) - [j22]Xiuxiu Jiang, Jia Yu, Jingbo Yan, Rong Hao:
Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data. Inf. Sci. 403: 22-41 (2017) - [j21]Xiuxiu Jiang, Xinrui Ge, Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao:
An Efficient Symmetric Searchable Encryption Scheme for Cloud Storage. J. Internet Serv. Inf. Secur. 7(2): 1-18 (2017) - [j20]Wenting Shen, Jia Yu, Hui Xia, Hanlin Zhang, Xiuqing Lu, Rong Hao:
Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium. J. Netw. Comput. Appl. 82: 56-64 (2017) - [j19]Qianqian Su, Jia Yu, Chengliang Tian, Hanlin Zhang, Rong Hao:
How to securely outsource the inversion modulo a large composite number. J. Syst. Softw. 129: 26-34 (2017) - 2016
- [j18]Wenting Shen, Jia Yu, Rong Hao, Xu An Wang:
A public cloud storage auditing scheme for resource-constrained clients. Int. J. High Perform. Syst. Archit. 6(3): 121-130 (2016) - [j17]Jia Yu, Rong Hao, Huawei Zhao, Minglei Shu, Jianxi Fan:
IRIBE: Intrusion-resilient identity-based encryption. Inf. Sci. 329: 90-104 (2016) - [j16]Wenting Shen, Jia Yu, Guangyang Yang, Yue Zhang, Zhangjie Fu, Rong Hao:
Access-Authorizing and Privacy-Preserving Auditing with Group Dynamic for Shared Cloud Data. KSII Trans. Internet Inf. Syst. 10(7): 3319-3338 (2016) - [j15]Guangyang Yang, Jia Yu, Wenting Shen, Qianqian Su, Zhangjie Fu, Rong Hao:
Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability. J. Syst. Softw. 113: 130-139 (2016) - [j14]Jia Yu, Hui Xia, Huawei Zhao, Rong Hao, Zhangjie Fu, Xiangguo Cheng:
Forward-Secure Identity-Based Signature Scheme in Untrusted Update Environments. Wirel. Pers. Commun. 86(3): 1467-1491 (2016) - [c11]Wenting Shen, Jia Yu, Hui Xia, Rong Hao:
A Note on "IPad: ID-Based Public Auditing for the Outsourced Data in the Standard Model". ICCCS (1) 2016: 335-342 - 2015
- [c10]Wenting Shen, Jia Yu, Rong Hao, Xu An Wang:
A Public Cloud Storage Auditing Scheme with Lightweight Authenticator Generation. 3PGCIC 2015: 36-39 - [c9]Xiuxiu Jiang, Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao:
A Novel Privacy Preserving Keyword Search Scheme over Encrypted Cloud Data. 3PGCIC 2015: 836-839 - 2014
- [j13]Huiyan Zhao, Jia Yu, Shaoxia Duan, Xiangguo Cheng, Rong Hao:
Key-insulated aggregate signature. Frontiers Comput. Sci. 8(5): 837-846 (2014) - [j12]Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Guowen Li:
One forward-secure signature scheme using bilinear maps and its applications. Inf. Sci. 279: 60-76 (2014) - 2013
- [j11]Jia Yu, Rong Hao, Xiangguo Cheng:
Security analysis and improvement of two verifiable multi-secret sharing schemes. Int. J. Secur. Networks 8(4): 200-206 (2013) - 2012
- [j10]Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Jianxi Fan:
Erratum to the paper: Forward-Secure Identity-Based Public-Key Encryption without Random Oracles. Fundam. Informaticae 114(1): 103 (2012) - [j9]Jia Yu, Fanyu Kong, Huawei Zhao, Xiangguo Cheng, Rong Hao, Xiang-Fa Guo:
Non-Interactive Forward-Secure Threshold Signature without Random Oracles. J. Inf. Sci. Eng. 28(3): 571-586 (2012) - [j8]Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Jianxi Fan:
Intrusion-resilient identity-based signature: Security definition and construction. J. Syst. Softw. 85(2): 382-391 (2012) - 2011
- [j7]Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Jianxi Fan:
Forward-Secure Identity-Based Public-Key Encryption without Random Oracles. Fundam. Informaticae 111(2): 241-256 (2011) - [j6]Jia Yu, Rong Hao, Fanyu Kong, Xiangguo Cheng, Jianxi Fan, Yangkui Chen:
Forward-secure identity-based signature: Security notions and construction. Inf. Sci. 181(3): 648-660 (2011) - [j5]Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Jianxi Fan:
New Forward-Secure Signature Scheme with Untrusted Update. J. Inf. Sci. Eng. 27(4): 1435-1448 (2011) - [c8]Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao:
Two Protocols for Member Revocation in Secret Sharing Schemes. PAISI 2011: 64-70 - 2010
- [j4]Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Yangkui Chen, Xuliang Li, Guowen Li:
Forward-Secure Multisignature, Threshold Signature and Blind Signature Schemes. J. Networks 5(6): 634-641 (2010)
2000 – 2009
- 2009
- [j3]Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao:
A Forward Secure Threshold Signature Scheme Based on the Structure of Binary Tree. J. Softw. 4(1): 73-80 (2009) - 2008
- [j2]Jia Yu, Fanyu Kong, Rong Hao, Dexiang Zhang, Guowen Li:
How to Construct Forward Secure Single-Server, Multi-Server and Threshold-Server Assisted Signature Schemes Using Bellare-Miner Scheme. J. Commun. 3(7): 28-35 (2008) - [j1]Jia Yu, Fanyu Kong, Rong Hao, Xuliang Li, Guowen Li:
Publicly Verifiable Secret Sharing Member-join Protocol For Threshold Signatures. J. Commun. 3(7): 36-43 (2008) - [c7]Jia Yu, Fanyu Kong, Rong Hao, Dexiang Zhang:
Construction of Server-assisted Forward Secure Signature Using Bellare-Miner Scheme. ISECS 2008: 558-561 - [c6]Jia Yu, Fanyu Kong, Rong Hao, Xuliang Li:
How to Publicly Verifiably Expand a Member without Changing Old Shares in a Secret Sharing Scheme. ISI Workshops 2008: 138-148 - [c5]Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Guowen Li:
Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps. ProvSec 2008: 83-97 - [c4]Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Guowen Li:
Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005. ProvSec 2008: 176-184 - [c3]Jia Yu, Fanyu Kong, Rong Hao, Zhen Cheng:
A Publicly Verifiable Dynamic Sharing Protocol for Data Secure Storage. WAIM 2008: 471-472 - 2007
- [c2]Jia Yu, Fanyu Kong, Rong Hao:
Publicly Verifiable Secret Sharing with Enrollment Ability. SNPD (3) 2007: 194-199 - 2006
- [c1]Jia Yu, Fanyu Kong, Rong Hao:
Forward Secure Threshold Signature Scheme from Bilinear Pairings. CIS 2006: 587-597
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-27 00:50 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint