CPDA: A confidentiality-preserving deduplication cloud storage with public cloud auditing J Wu, Y Li, T Wang, Y Ding IEEE Access 7, 160482-160497, 2019 | 36 | 2019 |
Verifiable data streaming with efficient update for intelligent automation systems M Miao, J Wei, J Wu, KC Li, W Susilo International Journal of Intelligent Systems 37 (2), 1322-1338, 2022 | 13 | 2022 |
Robust and auditable distributed data storage with scalability in edge computing J Wu, Y Li, F Ren, B Yang Ad Hoc Networks 117, 102494, 2021 | 13 | 2021 |
New unbounded verifiable data streaming for batch query with almost optimal overhead J Wu, J Wang, X Yong, X Huang, X Chen European Symposium on Research in Computer Security, 346-366, 2022 | 4 | 2022 |
Blockchain‐Based Self‐Auditing Scheme with Batch Verification for Decentralized Storage Z Yuan, J Wu, J Gong, Y Liu, G Tian, J Wang Wireless Communications and Mobile Computing 2022 (1), 6998046, 2022 | 2 | 2022 |
Efficient Volume-Hiding Encrypted Multi-Maps with Support for Conjunctive Queries T Li, J Wu, J Wang IFIP International Conference on ICT Systems Security and Privacy Protection …, 2022 | 1 | 2022 |
Scalable Equi-Join Queries over Encrypted Database K Du, J Wang, J Wu, Y Wang Proceedings of the 2024 on ACM SIGSAC Conference on Computer and …, 2024 | | 2024 |
Xproofs: new aggregatable and maintainable matrix commitment with optimal proof size X Yong, J Wu, J Wang IFIP International Conference on ICT Systems Security and Privacy Protection …, 2024 | | 2024 |
One for all: Efficient verifiable dynamic multi-user searchable encryption in the presence of corrupted users X Wang, J Wu, J Wang Journal of King Saud University-Computer and Information Sciences 35 (8), 101703, 2023 | | 2023 |
Publicly Verifiable Conjunctive Keyword Search with Balanced Verification Overhead Q Sheng, J Wu, J Wang International Symposium on Cyberspace Safety and Security, 3-16, 2022 | | 2022 |
Efficient Verifiable Boolean Range Query for Light Clients on Blockchain Database J Gong, J Wu, J Wang, S Tan International Conference on Applied Cryptography and Network Security, 15-35, 2022 | | 2022 |