Issue Date |
Title |
Author(s) |
2015 |
Attribute-based encryption without key escrow |
Zhang, Xing;Jin, Cancan;Wen, Zilong;Shen, Qingni;Fang, Yuejian;Wu, Zhonghai |
2015 |
Ciphertext-policy attribute-based encryption with user and authority accountability |
Zhang, Xing;Jin, Cancan;Li, Cong;Wen, Zilong;Shen, Qingni;Fang, Yuejian;Wu, Zhonghai |
2010 |
Design and Implementation of Fiber Channel System in Avionics Environment |
Fang, Yuejian;Wu, Zhonghai;Duan, Xiaohui;Yang, Jianqiang;Liu, Bei;Zhang, Xing |
2022 |
EFFICIENT IDENTITY-BASED CHAMELEON HASH FOR MOBILE DEVICES |
Li, Cong;Shen, Qingni;Xie, Zhikang;Dong, Jisheng;Fang, Yuejian;Wu, Zhonghai |
2018 |
Fully secure hidden ciphertext-policy attribute-based proxy re-encryption |
Feng, Xinyu;Li, Cong;Li, Dan;Fang, Yuejian;Shen, Qingni |
Sep-2022 |
Hierarchical and non-monotonic key-policy attribute-based encryption and its application |
Li, Cong;Shen, Qingni;Xie, Zhikang;Dong, Jisheng;Feng, Xinyu;Fang, Yuejian;Wu, Zhonghai |
2021 |
Identity-Based Chameleon Hash without Random Oracles and Application in the Mobile Internet |
Xie, Zhikang;Shen, Qingni;Li, Cong;Dong, Jisheng;Fang, Yuejian |
2022 |
Interactive Latent Knowledge Selection for E-commerce Product Copywriting Generation |
Wang, Zeming;Zou, Yanyan;Fang, Yuejian;Chen, Hongshen;Ma, Mian;Ding, Zhuoye;Long, Bo |
Apr-2021 |
Large Universe CCA2 CP-ABE With Equality and Validity Test in the Standard Model |
Li, Cong;Shen, Qingni;Xie, Zhikang;Feng, Xinyu;Fang, Yuejian;Wu, Zhonghai |
2012 |
A New Parallel Processor Architecture for Genus 2 Hyperelliptic Curve Cryptosystems |
Fang, Yuejian;Wu, Zhonghai |
2013 |
A parallel architecture for FPGA based hyperelliptic curve cryptoprocessor |
Fang, Yuejian;Shen, Qingni;Wu, Zhonghai |
2015 |
POSTER: Ciphertext-policy attribute-based encryption method with secure decryption key generation and outsourcing decryption of ABE ciphertexts |
Fang, Yuejian;Wen, Zilong;Shen, Qingni;Yang, Yahui;Wu, Zhonghai |
2017 |
A practical construction for large universe hierarchical attribute-based encryption |
Li, Cong;Fang, Yuejian;Zhang, Xing;Jin, Cancan;Shen, Qingni;Wu, Zhonghai |
2017 |
A practical construction for large universe hierarchical attribute-based encryption |
Li, Cong;Fang, Yuejian;Zhang, Xing;Jin, Cancan;Shen, Qingni;Wu, Zhonghai |
2018 |
Practical large universe attribute-set based encryption in the standard model |
Feng, Xinyu;Jin, Cancan;Li, Cong;Fang, Yuejian;Shen, Qingni;Wu, Zhonghai |
2010 |
The research and implemention of device login in FC-2 of Fibre Channel |
Liu, Bei;Fang, Yuejian;Wu, Zhonghai |
2015 |
SEDOSN: A Secure Decentralized Online Social Networking Framework |
Fang, Yuejian;Wen, Zilong;Shen, Qingni;Yang, Yahui;Wu, Zhonghai |