Jinbo Xiong (熊金波)
Jinbo Xiong (熊金波)
Verified email at fjnu.edu.cn - Homepage
Cited by
Cited by
Secure, efficient and revocable multi-authority access control system in cloud storage
Q Li, J Ma, R Li, X Liu, J Xiong, D Chen
Computers & Security 59, 45-59, 2016
A full lifecycle privacy protection scheme for sensitive data in cloud computing
J Xiong, F Li, J Ma, X Liu, Z Yao, PS Chen
Peer-to-peer Networking and Applications 8 (6), 1025-1037, 2015
A secure data self-destructing scheme in cloud computing
J Xiong, X Liu, Z Yao, J Ma, Q Li, K Geng, PS Chen
IEEE Transactions on Cloud Computing 2 (4), 448-458, 2014
Enhancing privacy and availability for data clustering in intelligent electrical service of IoT
J Xiong, J Ren, L Chen, Z Yao, M Lin, D Wu, B Niu
IEEE Internet of Things Journal 6 (2), 1530-1540, 2018
Ciphertext-Policy Hierarchical Attribute-based Encryption for Fine-Grained Access Control of Encryption Data.
X Liu, J Ma, J Xiong, G Liu
IJ Network Security 16 (6), 437-443, 2014
Personal health records integrity verification using attribute based proxy signature in cloud computing
X Liu, J Ma, J Xiong, T Zhang, Q Li
International Conference on Internet and Distributed Computing Systems, 238-251, 2013
Large universe decentralized key‐policy attribute‐based encryption
Q Li, J Ma, R Li, J Xiong, X Liu
Security and Communication Networks 8 (3), 501-509, 2015
RSE-PoW: A role symmetric encryption PoW scheme with authorized deduplication for multimedia data
J Xiong, Y Zhang, X Li, M Lin, Z Yao, G Liu
Mobile Networks and Applications 23 (3), 650-663, 2018
A secure self-destruction scheme with IBE for the internet content privacy
J Xiong, Z Yao, J Ma, F Li, X Liu
Chinese Journal of Computers 37 (1), 139-150, 2014
PRIAM: Privacy Preserving Identity and Access Management Scheme in Cloud.
J Xiong, Z Yao, J Ma, X Liu, Q Li, J Ma
KSII Transactions on Internet & Information Systems 8 (1), 2014
A secure document self-destruction scheme: an ABE approach
J Xiong, Z Yao, J Ma, X Liu, Q Li
2013 IEEE 10th International Conference on High Performance Computing and …, 2013
A secure document self-destruction scheme with identity based encryption
J Xiong, Z Yao, J Ma, X Liu, Q Li
2013 5th International Conference on Intelligent Networking and …, 2013
ms‐PoSW: A multi‐server aided proof of shared ownership scheme for secure deduplication in cloud
J Xiong, Y Zhang, L Lin, J Shen, X Li, M Lin
Concurrency and Computation: Practice and Experience 32 (3), e4252, 2020
A secure self-destruction scheme for composite documents with attribute based encryption
J Xiong, Z Yao, J Ma, F Li, X Liu, Q Li
Acta Electronica Sinica 42 (2), 366-376, 2014
Ciphertext policy weighted attribute based encryption scheme
X Liu, J Ma, J Xiong, Q Li, T Zhang
Journal of Xi'an Jiaotong University 47 (8), 44-48, 2013
DPLK-means: A novel Differential Privacy K-means Mechanism
J Ren, J Xiong, Z Yao, R Ma, M Lin
2017 IEEE Second International Conference on Data Science in Cyberspace (DSC …, 2017
Provably secure unbounded multi‐authority ciphertext‐policy attribute‐based encryption
Q Li, J Ma, R Li, J Xiong, X Liu
Security and Communication Networks 8 (18), 4098-4109, 2015
熊金波, 姚志强, 马建峰, 李凤华, 刘西蒙
计算机学报 37 (1), 139-150, 2014
Ciphertext-policy weighted attribute based encryption for fine-grained access control
X Liu, J Ma, J Xiong, Q Li, J Ma
2013 5th International Conference On Intelligent Networking And …, 2013
熊金波, 陈湘国, 蔡声镇
實驗科學與技術 7 (1), 150-153, 2009
The system can't perform the operation now. Try again later.
Articles 1–20