Shi, Jiaoli
49  Ergebnisse:
Personensuche X
?
2

Secure and Fast Query Approach for High-Precision Multi-dim..:

, In: Edge Computing – EDGE 2023; Lecture Notes in Computer Science,
Cheng, Zhengxiang ; Mao, Weixuan ; Wen, Ruwang... - p. 69-81 , 2024
 
?
3

A Lightweight Access Control Scheme Supporting Policy Hidde..:

, In: Information Security and Cryptology; Lecture Notes in Computer Science,
Luo, Chao ; Shi, Jiaoli ; Xie, Minchen... - p. 433-451 , 2024
 
?
4

A Location Recommendation Model Based on User Behavior and ..:

, In: Lecture Notes in Computer Science; Internet of Things – ICIOT 2023,
Mao, Weixuan ; Wen, Ruwang ; Cheng, Zhengxiang... - p. 18-30 , 2024
 
?
5

A Secure and Fast Range Query Scheme for Encrypted Multi-Di..:

Mei, Zhuolin ; Zou, Huilai ; Huang, Jinzhou...
International Journal of Web Services Research.  21 (2024)  1 - p. 1-17 , 2024
 
?
6

Secure Cloud Storage and Retrieval of Personal Health Data ..:

Mei, Zhuolin ; Yu, Jing ; Huang, Jinzhou...
International Journal of Web Services Research.  20 (2023)  1 - p. 1-18 , 2023
 
?
7

HMGR: A Hybrid Model for Geolocation Recommendation:

, In: Big Data – BigData 2023; Lecture Notes in Computer Science,
Wen, Ruwang ; Cheng, Zhengxiang ; Mao, Weixuan... - p. 48-62 , 2023
 
?
8

Optimizing Read Performance in Lightweight Blockchain with ..:

, In: 2023 Fifth International Conference on Blockchain Computing and Applications (BCCA),
Wang, Han ; Li, Hui ; Wang, Zixian... - p. 150-157 , 2023
 
?
9

An Emergency Information Broadcast Routing in VANET:

, In: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Wireless Internet,
Xu, Liya ; Ge, Mingzhu ; Deng, Anyuan.. - p. 144-155 , 2023
 
?
10

An Identity-Based Proxy Re-Encryption Scheme With Single-Ho..:

Yao, Shimao ; Dayot, Ralph Voltaire J. ; Ra, In-Ho...
IEEE Transactions on Information Forensics and Security.  18 (2023)  - p. 3833-3848 , 2023
 
?
11

A Lightening Fine-grained Access Control Scheme Supporting ..:

, In: 2023 IEEE 29th International Conference on Parallel and Distributed Systems (ICPADS),
Shi, Jiaoli ; Hu, Chao ; Yao, Shimao... - p. 2875-2878 , 2023
 
?
12

User Log Anomaly Detection System Based on Isolation Forest:

, In: 2023 2nd International Joint Conference on Information and Communication Engineering (JCICE),
Yang, Zhenyuan ; Li, Hui ; Yang, Xin... - p. 79-84 , 2023
 
?
13

A Collusion-Resistant Blockchain-Enabled Data Sharing Schem..:

Shen, Xieyang ; Huang, Chuanhe ; Shen, Xiajiong...
Security and Communication Networks.  2021 (2021)  - p. 1-11 , 2021
 
?
 
?
15

A Privacy-Preserving Attribute-Based Encryption System for ..:

Shen, Xieyang ; Huang, Chuanhe ; Wang, Danxin..
Wireless Communications and Mobile Computing.  2021 (2021)  - p. 1-15 , 2021
 
1-15