Jian Weng
Jian Weng
Professor, Department of Computer Science, Jinan University
Verified email at jnu.edu.cn
Title
Cited by
Cited by
Year
Attribute-based encryption with verifiable outsourced decryption
J Lai, RH Deng, C Guan, J Weng
IEEE Transactions on information forensics and security 8 (8), 1343-1354, 2013
3792013
Efficient unidirectional proxy re-encryption
SSM Chow, J Weng, Y Yang, RH Deng
International Conference on Cryptology in Africa, 316-332, 2010
3642010
Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings
J Weng, RH Deng, S Liu, K Chen
Information Sciences 180 (24), 5077-5089, 2010
331*2010
Verifiable computation over large database with incremental updates
X Chen, J Li, J Weng, J Ma, W Lou
IEEE transactions on Computers 65 (10), 3184-3195, 2015
2512015
Conditional proxy re-encryption secure against chosen-ciphertext attack
J Weng, RH Deng, X Ding, CK Chu, J Lai
Proceedings of the 4th International Symposium on Information, Computer, and …, 2009
1932009
Enabling semantic search based on conceptual graphs over encrypted outsourced data
Z Fu, F Huang, X Sun, A Vasilakos, CN Yang
IEEE Transactions on Services Computing, 2016
1532016
Conditional proxy broadcast re-encryption
CK Chu, J Weng, SSM Chow, J Zhou, RH Deng
Australasian conference on information security and privacy, 327-342, 2009
1412009
Crowdbc: A blockchain-based decentralized framework for crowdsourcing
M Li, J Weng, A Yang, W Lu, Y Zhang, L Hou, JN Liu, Y Xiang, RH Deng
IEEE Transactions on Parallel and Distributed Systems 30 (6), 1251-1266, 2018
1292018
Privacy-preserving smart semantic search based on conceptual graphs over encrypted outsourced data
Z Fu, F Huang, K Ren, J Weng, C Wang
IEEE Transactions on Information Forensics and Security 12 (8), 1874-1884, 2017
1192017
An efficient privacy-preserving outsourced calculation toolkit with multiple keys
X Liu, RH Deng, KKR Choo, J Weng
IEEE Transactions on Information Forensics and Security 11 (11), 2401-2414, 2016
1192016
Efficient and privacy-preserving outsourced calculation of rational numbers
X Liu, KKR Choo, RH Deng, R Lu, J Weng
IEEE Transactions on Dependable and Secure Computing 15 (1), 27-39, 2016
1082016
Multi-user private keyword search for cloud computing
Y Yang, H Lu, J Weng
2011 IEEE Third International Conference on Cloud Computing Technology and …, 2011
1062011
Efficient conditional proxy re-encryption with chosen-ciphertext security
J Weng, Y Yang, Q Tang, RH Deng, F Bao
International Conference on Information Security, 151-166, 2009
1022009
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles
J Weng, M Chen, Y Yang, R Deng, K Chen, F Bao
Science China Information Sciences 53 (3), 593-606, 2010
892010
Cost-friendly differential privacy for smart meters: Exploiting the dual roles of the noise
Z Zhang, Z Qin, L Zhu, J Weng, K Ren
IEEE Transactions on Smart Grid 8 (2), 619-626, 2016
802016
Copy-move forgery detection based on hybrid features
F Yang, J Li, W Lu, J Weng
Engineering Applications of Artificial Intelligence 59, 73-83, 2017
782017
Cloud based data sharing with fine-grained proxy re-encryption
Y Yang, H Zhu, H Lu, J Weng, Y Zhang, KKR Choo
Pervasive and Mobile Computing 28, 122-134, 2016
762016
Generic and efficient constructions of attribute-based encryption with verifiable outsourced decryption
X Mao, J Lai, Q Mei, K Chen, J Weng
IEEE Transactions on dependable and secure computing 13 (5), 533-546, 2015
742015
Cryptanalysis of a certificateless signcryption scheme in the standard model
J Weng, G Yao, RH Deng, MR Chen, X Li
Information Sciences 181 (3), 661-667, 2011
742011
Generic construction of chosen ciphertext secure proxy re-encryption
G Hanaoka, Y Kawai, N Kunihiro, T Matsuda, J Weng, R Zhang, Y Zhao
Cryptographers’ Track at the RSA Conference, 349-364, 2012
672012
The system can't perform the operation now. Try again later.
Articles 1–20