Jianting Ning
Jianting Ning
Verified email at smu.edu.sg
Title
Cited by
Cited by
Year
White-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes
J Ning, X Dong, Z Cao, L Wei, X Lin
IEEE Transactions on Information Forensics and Security 10 (6), 1274-1288, 2015
1562015
Auditable -Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing
J Ning, Z Cao, X Dong, K Liang, H Ma, L Wei
IEEE Transactions on Information Forensics and Security 13 (1), 94-105, 2017
1082017
Large universe ciphertext-policy attribute-based encryption with white-box traceability
J Ning, Z Cao, X Dong, L Wei, X Lin
European Symposium on Research in Computer Security, 55-72, 2014
752014
White-box traceable CP-ABE for cloud storage service: how to catch people leaking their access credentials effectively
J Ning, Z Cao, X Dong, L Wei
IEEE Transactions on Dependable and Secure Computing 15 (5), 883-897, 2016
562016
Accountable authority ciphertext-policy attribute-based encryption with white-box traceability and public auditing in the cloud
J Ning, X Dong, Z Cao, L Wei
European Symposium on Research in Computer Security, 270-289, 2015
562015
Passive attacks against searchable encryption
J Ning, J Xu, K Liang, F Zhang, EC Chang
IEEE Transactions on Information Forensics and Security 14 (3), 789-802, 2018
552018
Attribute based encryption with privacy protection and accountability for CloudIoT
J Li, Y Zhang, J Ning, X Huang, GS Poh, D Wang
IEEE Transactions on Cloud Computing, 2020
412020
Public auditing for shared cloud data with efficient and secure group management
H Tian, F Nan, H Jiang, CC Chang, J Ning, Y Huang
Information Sciences 472, 107-125, 2019
362019
CryptCloud: Secure and Expressive Data Access Control for Cloud Storage
J Ning, Z Cao, X Dong, K Liang, L Wei, KKR Choo
IEEE Transactions on Services Computing 14 (1), 111-124, 2018
322018
Privacy-preserving personal data operation on mobile cloud—Chances and challenges over advanced persistent threat
MH Au, K Liang, JK Liu, R Lu, J Ning
Future Generation Computer Systems 79, 337-349, 2018
282018
PrivHome: Privacy-preserving authenticated communication in smart home environment
GS Poh, P Gope, J Ning
IEEE Transactions on Dependable and Secure Computing, 2019
222019
Dual access control for cloud-based data storage and sharing
J Ning, X Huang, W Susilo, K Liang, X Liu, Y Zhang
IEEE Transactions on Dependable and Secure Computing, 2020
162020
Lightweight privacy-preserving identity-based verifiable IoT-based health storage system
R Ding, H Zhong, J Ma, X Liu, J Ning
IEEE Internet of Things Journal 6 (5), 8393-8405, 2019
152019
Optimized verifiable fine-grained keyword search in dynamic multi-owner settings
Y Miao, R Deng, KKR Choo, X Liu, J Ning, H Li
IEEE Transactions on Dependable and Secure Computing, 2019
142019
PrivDPI: Privacy-preserving encrypted traffic inspection with reusable obfuscated rules
J Ning, GS Poh, JC Loh, J Chia, EC Chang
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
132019
Secure fine-grained encrypted keyword search for e-healthcare cloud
H Wang, J Ning, X Huang, G Wei, GS Poh, X Liu
IEEE Transactions on Dependable and Secure Computing, 2019
132019
Traceable and revocable CP-ABE with shorter ciphertexts
J Ning, Z Cao, X Dong, L Wei
Science China Information Sciences 59 (11), 1-3, 2016
132016
Match in my way: Fine-grained bilateral access control for secure cloud-fog computing
S Xu, J Ning, Y Li, Y Zhang, G Xu, X Huang, R Deng
IEEE Transactions on Dependable and Secure Computing, 2020
122020
Traceable CP-ABE with short ciphertexts: How to catch people selling decryption devices on ebay efficiently
J Ning, Z Cao, X Dong, J Gong, J Chen
European Symposium on Research in Computer Security, 551-569, 2016
122016
An efficient key-policy attribute-based searchable encryption in prime-order groups
R Meng, Y Zhou, J Ning, K Liang, J Han, W Susilo
International Conference on Provable Security, 39-56, 2017
102017
The system can't perform the operation now. Try again later.
Articles 1–20