Jia XU  (徐佳)
Cited by
Cited by
Leakage-Resilient Client-side Deduplication of Encrypted Data in Cloud Storage (Old Title: Secure Cloud Storage with Encrypted Data using File-Based Authentication)
J Xu, EC Chang, J Zhou
Cryptology ePrint Archive, Report 2011/538, 0
Weak Leakage-Resilient Client-side Deduplication of Encrypted Data in Cloud Storage
J Xu, EC Chang, J Zhou
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
Remote integrity check with dishonest storage server
EC Chang, J Xu
Computer Security-ESORICS 2008, 223-237, 2008
Towards Efficient Proofs of Retrievability
J Xu, EC Chang
AsiaCCS, 2012
Security concerns in popular cloud storage services
CK Chu, WT Zhu, J Han, JK Liu, J Xu, J Zhou
IEEE Pervasive Computing 12 (4), 50-57, 2013
Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage
A Yang, J Xu, J Weng, J Zhou, DS Wong
IEEE Transactions on Cloud Computing, 2018
Passive attacks against searchable encryption
J Ning, J Xu, K Liang, F Zhang, EC Chang
IEEE Transactions on Information Forensics and Security 14 (3), 789-802, 2018
Short redactable signatures using random trees
EC Chang, C Lim, J Xu
Topics in Cryptology–CT-RSA 2009, 133-147, 2009
HAtt: Hybrid Remote Attestation for the Internet of Things with High Availability
MN Aman, MH Basheer, S Dash, JW Wong, J Xu, HW Lim, B Sikdar
IEEE Internet of Things Journal, 2020
ID repetition in Kad
J Yu, C Fang, J Xu, EC Chang, Z Li
Peer-to-Peer Computing, 2009. P2P'09. IEEE Ninth International Conference on …, 2009
Leakage-resilient clientside deduplication of encrypted data in cloud storage. Cryptology ePrint Archive, Report 2011/538
J Xu, E Chang, J Zhou
Leakage Resilient Proofs of Ownership in Cloud Storage, Revisited
J Xu, J Zhou
International Conference on Applied Cryptography and Network Security (ACNS …, 2013
cuNH: Efficient GPU Implementations of Post-Quantum KEM NewHope
Y Gao, J Xu, H Wang
IEEE Transactions on Parallel and Distributed Systems, 2021
Lightweight Delegatable Proofs of Storage
J Xu, A Yang, J Zhou, DS Wong
European Symposium on Research in Computer Security, 324-343, 2016
: Privacy-Preserving Integration and Sharing of Datasets
HW Lim, GS Poh, J Xu, V Chittawar
IEEE Transactions on Information Forensics and Security 15, 564-577, 2019
Auditing the Auditor: Secure Delegation of Auditing Operation over Cloud Storage
J Xu, 2011
On Directed Transitive Signature.
J Xu
IACR Cryptology ePrint Archive 2009, 209, 2009
Authenticating Aggregate Range Queries over Multidimensional Dataset.
J Xu, EC Chang
IACR Cryptology ePrint Archive 2010, 50, 2010
Towards Efficient Provable Data Possession.
J Xu, EC Chang
IACR Cryptology ePrint Archive 2011, 574, 2011
PSI-Stats: Private Set Intersection Protocols Supporting Secure Statistical Functions
JHM Ying, S Cao, GS Poh, J Xu, HW Lim
Applied Cryptography and Network Security, 585–604, 2022
The system can't perform the operation now. Try again later.
Articles 1–20