default search action
Jun Shao 0001
Person information
- affiliation: Zhejiang Gongshang University, Hangzhou, China
Other persons with the same name
- Jun Shao — disambiguation page
- Jun Shao 0002 — LCFC (Hefei) Electronics Technology Co., Ltd., China
- Jun Shao 0003 — Concordia University, Montreal, Canada
- Jun Shao 0004 — Peking University, Beijing, China
- Jun Shao 0005 — National University of Defense Technology, Changsha, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j98]Yunguo Guan, Rongxing Lu, Songnian Zhang, Yandong Zheng, Jun Shao, Guiyi Wei:
Efficient and Privacy-Preserving Aggregate Query Over Public Property Graphs. IEEE Trans. Big Data 10(2): 146-157 (2024) - [j97]Ruixuan Li, Zhenyong Zhang, Jun Shao, Rongxing Lu, Xiaoqi Jia, Guiyi Wei:
The Potential Harm of Email Delivery: Investigating the HTTPS Configurations of Webmail Services. IEEE Trans. Dependable Secur. Comput. 21(1): 125-138 (2024) - [j96]Yi Zhang, Xiaofeng Jia, Bianjing Pan, Jun Shao, Liming Fang, Rongxing Lu, Guiyi Wei:
Anonymous Multi-Hop Payment for Payment Channel Networks. IEEE Trans. Dependable Secur. Comput. 21(1): 476-485 (2024) - [j95]Yandong Zheng, Hui Zhu, Rongxing Lu, Yunguo Guan, Songnian Zhang, Fengwei Wang, Jun Shao, Hui Li:
PHRkNN: Efficient and Privacy-Preserving Reverse kNN Query Over High-Dimensional Data in Cloud. IEEE Trans. Dependable Secur. Comput. 21(4): 1831-1844 (2024) - [j94]Yunguo Guan, Rongxing Lu, Songnian Zhang, Yandong Zheng, Jun Shao, Guiyi Wei:
$k$kTCQ: Achieving Privacy-Preserving $k$k-Truss Community Queries Over Outsourced Data. IEEE Trans. Dependable Secur. Comput. 21(4): 2750-2765 (2024) - [j93]Songnian Zhang, Rongxing Lu, Hui Zhu, Yandong Zheng, Yunguo Guan, Fengwei Wang, Jun Shao, Hui Li:
Performance Enhanced Secure Spatial Keyword Similarity Query With Arbitrary Spatial Ranges. IEEE Trans. Inf. Forensics Secur. 19: 5272-5285 (2024) - [j92]Yandong Zheng, Hui Zhu, Rongxing Lu, Songnian Zhang, Yunguo Guan, Fengwei Wang, Jun Shao, Hui Li:
Secure Similarity Queries Over Vertically Distributed Data via TEE-Enhanced Cloud Computing. IEEE Trans. Inf. Forensics Secur. 19: 6237-6251 (2024) - [j91]Yandong Zheng, Rongxing Lu, Yunguo Guan, Songnian Zhang, Jun Shao, Fengwei Wang, Hui Zhu:
EPSet: Efficient and Privacy-Preserving Set Similarity Range Query Over Encrypted Data. IEEE Trans. Serv. Comput. 17(2): 524-536 (2024) - [c50]Ruixuan Li, Shaodong Xiao, Baojun Liu, Yanzhong Lin, Haixin Duan, Qingfeng Pan, Jianjun Chen, Jia Zhang, Ximeng Liu, Xiuqi Lu, Jun Shao:
Bounce in the Wild: A Deep Dive into Email Delivery Failures from a Large Email Service Provider. IMC 2024: 659-673 - [c49]Ruixuan Li, Baojun Liu, Chaoyi Lu, Haixin Duan, Jun Shao:
A Worldwide View on the Reachability of Encrypted DNS Services. WWW 2024: 1193-1202 - [e3]Jun Shao, Sokratis K. Katsikas, Weizhi Meng:
Emerging Information Security and Applications - 4th International Conference, EISA 2023, Hangzhou, China, December 6-7, 2023, Proceedings. Communications in Computer and Information Science 2004, Springer 2024, ISBN 978-981-99-9613-1 [contents] - 2023
- [j90]Xin Hou, Xiaofeng Jia, Jun Shao:
Public key encryption with public-verifiable decryption delegation and its application. J. Inf. Secur. Appl. 75: 103513 (2023) - [j89]Genhua Lu, Xiaofeng Jia, Yi Zhang, Jun Shao, Guiyi Wei:
A domain name management system based on account-based consortium blockchain. Peer Peer Netw. Appl. 16(2): 1211-1226 (2023) - [j88]Wei Liu, Zhiguo Wan, Jun Shao, Yong Yu:
HyperMaze: Towards Privacy-Preserving and Scalable Permissioned Blockchain. IEEE Trans. Dependable Secur. Comput. 20(1): 360-376 (2023) - [j87]Songnian Zhang, Suprio Ray, Rongxing Lu, Yandong Zheng, Yunguo Guan, Jun Shao:
Towards Efficient and Privacy-Preserving User-Defined Skyline Query Over Single Cloud. IEEE Trans. Dependable Secur. Comput. 20(2): 1319-1334 (2023) - [j86]Songnian Zhang, Suprio Ray, Rongxing Lu, Yandong Zheng, Yunguo Guan, Jun Shao:
Towards Efficient and Privacy-Preserving Interval Skyline Queries Over Time Series Data. IEEE Trans. Dependable Secur. Comput. 20(2): 1348-1363 (2023) - [j85]Yunguo Guan, Rongxing Lu, Yandong Zheng, Songnian Zhang, Jun Shao, Guiyi Wei:
Achieving Efficient and Privacy-Preserving ($\alpha,\beta$α,β)-Core Query Over Bipartite Graphs in Cloud. IEEE Trans. Dependable Secur. Comput. 20(3): 1979-1993 (2023) - [j84]Yunguo Guan, Rongxing Lu, Yandong Zheng, Songnian Zhang, Jun Shao, Guiyi Wei:
Achieving Privacy-Preserving Discrete Fréchet Distance Range Queries. IEEE Trans. Dependable Secur. Comput. 20(3): 2097-2110 (2023) - [j83]Songnian Zhang, Suprio Ray, Rongxing Lu, Yunguo Guan, Yandong Zheng, Jun Shao:
Efficient and Privacy-Preserving Spatial Keyword Similarity Query Over Encrypted Data. IEEE Trans. Dependable Secur. Comput. 20(5): 3770-3786 (2023) - [j82]Yandong Zheng, Rongxing Lu, Songnian Zhang, Yunguo Guan, Fengwei Wang, Jun Shao, Hui Zhu:
PRkNN: Efficient and Privacy-Preserving Reverse kNN Query Over Encrypted Data. IEEE Trans. Dependable Secur. Comput. 20(5): 4387-4402 (2023) - [j81]Yandong Zheng, Rongxing Lu, Hui Zhu, Songnian Zhang, Yunguo Guan, Jun Shao, Fengwei Wang, Hui Li:
SetRkNN: Efficient and Privacy-Preserving Set Reverse kNN Query in Cloud. IEEE Trans. Inf. Forensics Secur. 18: 888-903 (2023) - [j80]Yandong Zheng, Hui Zhu, Rongxing Lu, Yunguo Guan, Songnian Zhang, Fengwei Wang, Jun Shao, Hui Li:
PGSim: Efficient and Privacy-Preserving Graph Similarity Query Over Encrypted Data in Cloud. IEEE Trans. Inf. Forensics Secur. 18: 2030-2045 (2023) - [j79]Xiaofeng Jia, Zhe Yu, Jun Shao, Rongxing Lu, Guiyi Wei, Zhenguang Liu:
Cross-Chain Virtual Payment Channels. IEEE Trans. Inf. Forensics Secur. 18: 3401-3413 (2023) - [j78]Yandong Zheng, Hui Zhu, Rongxing Lu, Yunguo Guan, Songnian Zhang, Fengwei Wang, Jun Shao, Hui Li:
Efficient and Privacy-Preserving Aggregated Reverse kNN Query Over Crowd-Sensed Data. IEEE Trans. Inf. Forensics Secur. 18: 4285-4299 (2023) - [j77]Ruixuan Li, Xiaofeng Jia, Zhenyong Zhang, Jun Shao, Rongxing Lu, Jingqiang Lin, Xiaoqi Jia, Guiyi Wei:
A Longitudinal and Comprehensive Measurement of DNS Strict Privacy. IEEE/ACM Trans. Netw. 31(6): 2793-2808 (2023) - [j76]Yandong Zheng, Rongxing Lu, Yunguo Guan, Songnian Zhang, Jun Shao, Fengwei Wang, Hui Zhu:
Efficient and Privacy-Preserving Spatial-Feature-Based Reverse kNN Query. IEEE Trans. Serv. Comput. 16(4): 2620-2631 (2023) - [j75]Songnian Zhang, Suprio Ray, Rongxing Lu, Yunguo Guan, Yandong Zheng, Jun Shao:
SecBerg: Secure and Practical Iceberg Queries in Cloud. IEEE Trans. Serv. Comput. 16(5): 3696-3710 (2023) - [e2]Jianying Zhou, Lejla Batina, Zengpeng Li, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Daisuke Mashima, Weizhi Meng, Stjepan Picek, Mohammad Ashiqur Rahman, Jun Shao, Masaki Shimaoka, Ezekiel O. Soremekun, Chunhua Su, Je Sen Teh, Aleksei Udovenko, Cong Wang, Leo Yu Zhang, Yury Zhauniarovich:
Applied Cryptography and Network Security Workshops - ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings. Lecture Notes in Computer Science 13907, Springer 2023, ISBN 978-3-031-41180-9 [contents] - 2022
- [j74]Haibo Hong, Jun Shao, Licheng Wang, Mande Xie, Guiyi Wei, Yixian Yang, Song Han, Jianhong Lin:
A CCA secure public key encryption scheme based on finite groups of Lie type. Sci. China Inf. Sci. 65(1) (2022) - [j73]Yandong Zheng, Rongxing Lu, Songnian Zhang, Yunguo Guan, Jun Shao, Hui Zhu:
Toward Privacy-Preserving Healthcare Monitoring Based on Time-Series Activities Over Cloud. IEEE Internet Things J. 9(2): 1276-1288 (2022) - [j72]Xichen Zhang, Rongxing Lu, Jun Shao, Fengwei Wang, Hui Zhu, Ali A. Ghorbani:
FedSky: An Efficient and Privacy-Preserving Scheme for Federated Mobile Crowdsensing. IEEE Internet Things J. 9(7): 5344-5356 (2022) - [j71]Songnian Zhang, Suprio Ray, Rongxing Lu, Yandong Zheng, Yunguo Guan, Jun Shao:
Achieving Efficient and Privacy-Preserving Dynamic Skyline Query in Online Medical Diagnosis. IEEE Internet Things J. 9(12): 9973-9986 (2022) - [j70]Yandong Zheng, Rongxing Lu, Songnian Zhang, Yunguo Guan, Jun Shao, Fengwei Wang, Hui Zhu:
PMRQ: Achieving Efficient and Privacy-Preserving Multidimensional Range Query in eHealthcare. IEEE Internet Things J. 9(18): 17468-17479 (2022) - [j69]Songnian Zhang, Suprio Ray, Rongxing Lu, Yandong Zheng, Yunguo Guan, Jun Shao:
PPAQ: Privacy-Preserving Aggregate Queries for Optimal Location Selection in Road Networks. IEEE Internet Things J. 9(20): 20178-20188 (2022) - [j68]Yunguo Guan, Rongxing Lu, Yandong Zheng, Songnian Zhang, Jun Shao, Guiyi Wei:
EPGQ: Efficient and Private Feature-Based Group Nearest Neighbor Query Over Road Networks. IEEE Internet Things J. 9(20): 20492-20502 (2022) - [j67]Yi-Ru Sun, Xiu-Bo Chen, Jun Shao, Song Han, Haibo Hong, Haiyong Bao, Yixian Yang:
Cyclic preparation of two-qubit state in two noisy environments. Quantum Inf. Process. 21(1): 40 (2022) - [j66]Cong Zuo, Shifeng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk, Lei Xu:
Forward and Backward Private DSSE for Range Queries. IEEE Trans. Dependable Secur. Comput. 19(1): 328-338 (2022) - [j65]Xue Yang, Rongxing Lu, Jun Shao, Xiaohu Tang, Ali A. Ghorbani:
Achieving Efficient Secure Deduplication With User-Defined Access Control in Cloud. IEEE Trans. Dependable Secur. Comput. 19(1): 591-606 (2022) - [j64]Yandong Zheng, Rongxing Lu, Yunguo Guan, Jun Shao, Hui Zhu:
Achieving Efficient and Privacy-Preserving Exact Set Similarity Search over Encrypted Data. IEEE Trans. Dependable Secur. Comput. 19(2): 1090-1103 (2022) - [j63]Yandong Zheng, Rongxing Lu, Yunguo Guan, Jun Shao, Hui Zhu:
Efficient and Privacy-Preserving Similarity Range Query Over Encrypted Time Series Data. IEEE Trans. Dependable Secur. Comput. 19(4): 2501-2516 (2022) - [j62]Yandong Zheng, Rongxing Lu, Yunguo Guan, Jun Shao, Hui Zhu:
Towards Practical and Privacy-Preserving Multi-Dimensional Range Query Over Cloud. IEEE Trans. Dependable Secur. Comput. 19(5): 3478-3493 (2022) - [j61]Yandong Zheng, Rongxing Lu, Yunguo Guan, Songnian Zhang, Jun Shao, Hui Zhu:
Efficient and Privacy-Preserving Similarity Query With Access Control in eHealthcare. IEEE Trans. Inf. Forensics Secur. 17: 880-893 (2022) - [j60]Songnian Zhang, Suprio Ray, Rongxing Lu, Yunguo Guan, Yandong Zheng, Jun Shao:
Toward Privacy-Preserving Aggregate Reverse Skyline Query With Strong Security. IEEE Trans. Inf. Forensics Secur. 17: 2538-2552 (2022) - [j59]Jun Shao, Rongxing Lu, Yunguo Guan, Guiyi Wei:
Achieve Efficient and Verifiable Conjunctive and Fuzzy Queries over Encrypted Data in Cloud. IEEE Trans. Serv. Comput. 15(1): 124-137 (2022) - [j58]Yandong Zheng, Rongxing Lu, Jun Shao, Fan Yin, Hui Zhu:
Achieving Practical Symmetric Searchable Encryption With Search Pattern Privacy Over Cloud. IEEE Trans. Serv. Comput. 15(3): 1358-1370 (2022) - [j57]Yandong Zheng, Rongxing Lu, Yunguo Guan, Jun Shao, Hui Zhu:
Achieving Efficient and Privacy-Preserving Set Containment Search Over Encrypted Data. IEEE Trans. Serv. Comput. 15(5): 2604-2618 (2022) - [j56]Yandong Zheng, Rongxing Lu, Yunguo Guan, Jun Shao, Hui Zhu:
Efficient Privacy-Preserving Similarity Range Query With Quadsector Tree in eHealthcare. IEEE Trans. Serv. Comput. 15(5): 2742-2754 (2022) - [j55]Yunguo Guan, Hui Zheng, Jun Shao, Rongxing Lu, Guiyi Wei:
Fair Outsourcing Polynomial Computation Based on the Blockchain. IEEE Trans. Serv. Comput. 15(5): 2795-2808 (2022) - [c48]Xue Yang, Yan Feng, Weijun Fang, Jun Shao, Xiaohu Tang, Shu-Tao Xia, Rongxing Lu:
An Accuracy-Lossless Perturbation Method for Defending Privacy Attacks in Federated Learning. WWW 2022: 732-742 - [e1]Jianying Zhou, Sridhar Adepu, Cristina Alcaraz, Lejla Batina, Emiliano Casalicchio, Sudipta Chattopadhyay, Chenglu Jin, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Weizhi Meng, Stjepan Picek, Jun Shao, Chunhua Su, Cong Wang, Yury Zhauniarovich, Saman A. Zonouz:
Applied Cryptography and Network Security Workshops - ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings. Lecture Notes in Computer Science 13285, Springer 2022, ISBN 978-3-031-16814-7 [contents] - 2021
- [j54]Guiyi Wei, Xiaohang Mao, Rongxing Lu, Jun Shao, Yunguo Guan, Genhua Lu:
Achieve space-efficient key management in lightning network. Comput. Networks 197: 108346 (2021) - [j53]Fan Yin, Rongxing Lu, Yandong Zheng, Jun Shao, Xue Yang, Xiaohu Tang:
Achieve efficient position-heap-based privacy-preserving substring-of-keyword query over cloud. Comput. Secur. 110: 102432 (2021) - [j52]Xiaopeng Zhao, Zhenfu Cao, Xiaolei Dong, Jun Shao:
Extended Galbraith's test on the anonymity of IBE schemes from higher residuosity. Des. Codes Cryptogr. 89(2): 241-253 (2021) - [j51]Mande Xie, Yingying Ruan, Haibo Hong, Jun Shao:
A CP-ABE scheme based on multi-authority in hybrid clouds for mobile devices. Future Gener. Comput. Syst. 121: 114-122 (2021) - [j50]Hassan Mahdikhani, Rongxing Lu, Jun Shao, Ali A. Ghorbani:
Using Reduced Paths to Achieve Efficient Privacy-Preserving Range Query in Fog-Based IoT. IEEE Internet Things J. 8(6): 4762-4774 (2021) - [j49]Songnian Zhang, Suprio Ray, Rongxing Lu, Yandong Zheng, Jun Shao:
Preserving Location Privacy for Outsourced Most-Frequent Item Query in Mobile Crowdsensing. IEEE Internet Things J. 8(11): 9139-9150 (2021) - [j48]Xichen Zhang, Rongxing Lu, Jun Shao, Hui Zhu, Ali A. Ghorbani:
Continuous Probabilistic Skyline Query for Secure Worker Selection in Mobile Crowdsensing. IEEE Internet Things J. 8(14): 11758-11772 (2021) - [j47]Yunguo Guan, Rongxing Lu, Yandong Zheng, Jun Shao, Guiyi Wei:
Toward Oblivious Location-Based k-Nearest Neighbor Query in Smart Cities. IEEE Internet Things J. 8(18): 14219-14231 (2021) - [j46]Yunguo Guan, Rongxing Lu, Yandong Zheng, Songnian Zhang, Jun Shao, Guiyi Wei:
Toward Privacy-Preserving Cybertwin-Based Spatiotemporal Keyword Query for ITS in 6G Era. IEEE Internet Things J. 8(22): 16243-16255 (2021) - [j45]Fan Zhang, Ziyuan Liang, Cong Zuo, Jun Shao, Jianting Ning, Jun Sun, Joseph K. Liu, Yibao Bao:
hPRESS: A Hardware-Enhanced Proxy Re-Encryption Scheme Using Secure Enclave. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 40(6): 1144-1157 (2021) - [j44]Xue Yang, Rongxing Lu, Jun Shao, Xiaohu Tang, Ali A. Ghorbani:
Achieving Efficient and Privacy-Preserving Multi-Domain Big Data Deduplication in Cloud. IEEE Trans. Serv. Comput. 14(5): 1292-1305 (2021) - [c47]Xichen Zhang, Rongxing Lu, Suprio Ray, Jun Shao, Ali A. Ghorbani:
Spatio-Temporal Similarity based Privacy-Preserving Worker Selection in Mobile Crowdsensing. GLOBECOM 2021: 1-6 - [c46]Yandong Zheng, Rongxing Lu, Yunguo Guan, Songnian Zhang, Jun Shao:
Towards Private Similarity Query based Healthcare Monitoring over Digital Twin Cloud Platform. IWQoS 2021: 1-10 - [i18]Fan Yin, Rongxing Lu, Yandong Zheng, Jun Shao, Xue Yang, Xiaohu Tang:
Achieve Efficient Position-Heap-based Privacy-Preserving Substring-of-Keyword Query over Cloud. CoRR abs/2103.08455 (2021) - [i17]Cong Zuo, Shangqi Lai, Xingliang Yuan, Joseph K. Liu, Jun Shao, Huaxiong Wang:
Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy. IACR Cryptol. ePrint Arch. 2021: 1585 (2021) - 2020
- [j43]Hassan Mahdikhani, Rongxing Lu, Yandong Zheng, Jun Shao, Ali A. Ghorbani:
Achieving O(log³n) Communication-Efficient Privacy-Preserving Range Query in Fog-Based IoT. IEEE Internet Things J. 7(6): 5220-5232 (2020) - [j42]Xichen Zhang, Rongxing Lu, Jun Shao, Hui Zhu, Ali A. Ghorbani:
Secure and Efficient Probabilistic Skyline Computation for Worker Selection in MCS. IEEE Internet Things J. 7(12): 11524-11535 (2020) - [j41]Hui Zheng, Jun Shao, Guiyi Wei:
Attribute-based encryption with outsourced decryption in blockchain. Peer-to-Peer Netw. Appl. 13(5): 1643-1655 (2020) - [j40]Jingcheng Song, Yining Liu, Jun Shao, Chunming Tang:
A Dynamic Membership Data Aggregation (DMDA) Protocol for Smart Grid. IEEE Syst. J. 14(1): 900-908 (2020) - [c45]Xiaopeng Zhao, Zhenfu Cao, Xiaolei Dong, Jun Shao, Licheng Wang, Zhusen Liu:
New Assumptions and Efficient Cryptosystems from the e-th Power Residue Symbol. ACISP 2020: 408-424 - [c44]Yunguo Guan, Rongxing Lu, Yandong Zheng, Jun Shao, Guiyi Wei:
Achieving Privacy-Preserving Vehicle Selection for Effective Content Dissemination in Smart Cities. GLOBECOM 2020: 1-6 - [c43]Yunguo Guan, Rongxing Lu, Yandong Zheng, Jun Shao, Guiyi Wei:
Achieving Efficient and Privacy-Preserving Max Aggregation Query for Time-Series Data. ICC 2020: 1-6 - [c42]Mande Xie, Xiaowei Sheng, Jun Shao, Guoping Zhang, Yingying Ruan:
A User Privacy-Preserving Algorithm in Live Streaming Cloud Platforms. SpaCCS Workshops 2020: 222-232 - [c41]Gangqi Shu, Haibo Hong, Mande Xie, Jun Shao:
A Fuzzy Keywords Enabled Ranked Searchable CP-ABE Scheme for a Public Cloud Environment. SpaCCS Workshops 2020: 357-371 - [i16]Xiaopeng Zhao, Zhenfu Cao, Xiaolei Dong, Jun Shao, Licheng Wang, Zhusen Liu:
New Assumptions and Efficient Cryptosystems from the e-th Power Residue Symbol. IACR Cryptol. ePrint Arch. 2020: 245 (2020) - [i15]Cong Zuo, Shifeng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk, Guiyi Wei:
Forward and Backward Private Dynamic Searchable Symmetric Encryption for Conjunctive Queries. IACR Cryptol. ePrint Arch. 2020: 1357 (2020)
2010 – 2019
- 2019
- [j39]Yue Cong, Haibo Hong, Jun Shao, Song Han, Jianhong Lin, Shuai Zhao:
A New Secure Encryption Scheme Based on Group Factorization Problem. IEEE Access 7: 168728-168735 (2019) - [j38]Haibo Hong, Licheng Wang, Jun Shao, Jianhua Yan, Haseeb Ahmad, Guiyi Wei, Mande Xie, Yixian Yang:
A Miniature CCA Public Key Encryption Scheme Based on Non-abelian Factorization Problem in Finite Groups of Lie Type. Comput. J. 62(12): 1840-1848 (2019) - [j37]Xue Yang, Rongxing Lu, Jun Shao, Xiaohu Tang, Haomiao Yang:
An Efficient and Privacy-Preserving Disease Risk Prediction Scheme for E-Healthcare. IEEE Internet Things J. 6(2): 3284-3297 (2019) - [j36]Yandong Zheng, Rongxing Lu, Beibei Li, Jun Shao, Haomiao Yang, Kim-Kwang Raymond Choo:
Efficient privacy-preserving data merging and skyline computation over multi-source encrypted data. Inf. Sci. 498: 91-105 (2019) - [j35]Yandong Zheng, Rongxing Lu, Jun Shao:
Achieving Efficient and Privacy-Preserving k-NN Query for Outsourced eHealthcare Data. J. Medical Syst. 43(5): 123:1-123:13 (2019) - [j34]Licheng Wang, Xiaoying Shen, Jing Li, Jun Shao, Yixian Yang:
Cryptographic primitives in blockchains. J. Netw. Comput. Appl. 127: 43-58 (2019) - [c40]Cong Zuo, Shifeng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk:
Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy. ESORICS (2) 2019: 283-303 - [c39]Yandong Zheng, Rongxing Lu, Xue Yang, Jun Shao:
Achieving Efficient and Privacy-Preserving Top-k Query Over Vertically Distributed Data Sources. ICC 2019: 1-6 - [c38]Hui Zheng, Jun Shao, Guiyi Wei, Li Hu, Bianjing Pan, Kai Liu, Xiaohang Mao:
Attribute-Based Encryption with Publicly Verifiable Outsourced Decryption. NSS 2019: 552-566 - [c37]Rongxin Zheng, Cuiwen Ying, Jun Shao, Guiyi Wei, Hongyang Yan, Jianmin Kong, Yekun Ren, Hang Zhang, Weiguang Hou:
New Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools with Defence Cost. NSS 2019: 567-580 - [c36]Xichen Zhang, Rongxing Lu, Jun Shao, Hui Zhu, Ali A. Ghorbani:
Achieve Secure and Efficient Skyline Computation for Worker Selection in Mobile Crowdsensing. WCSP 2019: 1-6 - [c35]Yandong Zheng, Rongxing Lu, Jun Shao, Yonggang Zhang, Hui Zhu:
Efficient and Privacy-Preserving Edit Distance Query Over Encrypted Genomic Data. WCSP 2019: 1-6 - [i14]Cong Zuo, Shifeng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk:
Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward/Backward Privacy. CoRR abs/1905.08561 (2019) - [i13]Cong Zuo, Shifeng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk:
Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy. IACR Cryptol. ePrint Arch. 2019: 1055 (2019) - [i12]Cong Zuo, Shifeng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk, Lei Xu:
Forward and Backward Private DSSE for Range Queries. IACR Cryptol. ePrint Arch. 2019: 1240 (2019) - 2018
- [j33]Wei Guo, Jun Shao, Rongxing Lu, Yi-Ning Liu, Ali A. Ghorbani:
A Privacy-Preserving Online Medical Prediagnosis Scheme for Cloud Environment. IEEE Access 6: 48946-48957 (2018) - [j32]Cong Zuo, Jun Shao, Guiyi Wei, Mande Xie, Min Ji:
CCA-secure ABE with outsourced decryption for fog computing. Future Gener. Comput. Syst. 78: 730-738 (2018) - [j31]Jun Shao, Guiyi Wei:
Secure Outsourced Computation in Connected Vehicular Cloud Computing. IEEE Netw. 32(3): 36-41 (2018) - [j30]Yunguo Guan, Jun Shao, Guiyi Wei, Mande Xie:
Data Security and Privacy in Fog Computing. IEEE Netw. 32(5): 106-111 (2018) - [j29]Cong Zuo, Jun Shao, Joseph K. Liu, Guiyi Wei, Yun Ling:
Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage. IEEE Trans. Inf. Forensics Secur. 13(1): 186-196 (2018) - [c34]Cong Zuo, Shifeng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk:
Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) Security. ESORICS (2) 2018: 228-246 - [c33]Mingmei Zheng, Shao-Jun Yang, Wei Wu, Jun Shao, Xinyi Huang:
A New Design of Online/Offline Signatures Based on Lattice. ISPEC 2018: 198-212 - 2017
- [j28]Haibo Hong, Licheng Wang, Haseeb Ahmad, Jun Shao, Yixian Yang:
Minimal logarithmic signatures for one type of classical groups. Appl. Algebra Eng. Commun. Comput. 28(2): 177-192 (2017) - [j27]Khalid Nawaf Alharbi, Xiaodong Lin, Jun Shao:
A Privacy-Preserving Data-Sharing Framework for Smart Grid. IEEE Internet Things J. 4(2): 555-562 (2017) - [j26]Mande Xie, Urmila Bhanja, Jun Shao, Guoping Zhang, Guiyi Wei:
LDSCD: A loss and DoS resistant secure code dissemination algorithm supporting multiple authorized tenants. Inf. Sci. 420: 37-48 (2017) - [j25]Cong Zuo, Kaitai Liang, Zoe Lin Jiang, Jun Shao, Jun-bin Fang:
Cost-effective privacy-preserving vehicular urban sensing system. Pers. Ubiquitous Comput. 21(5): 893-901 (2017) - [j24]Hao Hu, Rongxing Lu, Zonghua Zhang, Jun Shao:
REPLACE: A Reliable Trust-Based Platoon Service Recommendation Scheme in VANET. IEEE Trans. Veh. Technol. 66(2): 1786-1797 (2017) - [c32]Xinxin Ma, Jun Shao, Cong Zuo, Ru Meng:
Efficient Certificate-Based Signature and Its Aggregation. ISPEC 2017: 391-408 - [c31]Cong Zuo, Jun Shao, Zhe Liu, Yun Ling, Guiyi Wei:
Hidden-Token Searchable Public-Key Encryption. TrustCom/BigDataSE/ICESS 2017: 248-254 - 2016
- [j23]Yong Deng, Guiyi Wei, Mande Xie, Jun Shao:
Cooperation Dynamics on Mobile Crowd Networks of Device-to-Device Communications. Mob. Inf. Syst. 2016: 8686945:1-8686945:10 (2016) - [j22]Jun Shao, Rongxing Lu, Xiaodong Lin, Kaitai Liang:
Secure bidirectional proxy re-encryption for cryptographic cloud storage. Pervasive Mob. Comput. 28: 113-121 (2016) - [j21]Lichun Li, Rongxing Lu, Kim-Kwang Raymond Choo, Anwitaman Datta, Jun Shao:
Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases. IEEE Trans. Inf. Forensics Secur. 11(8): 1847-1861 (2016) - [j20]Jun Shao, Xiaodong Lin, Rongxing Lu, Cong Zuo:
A Threshold Anonymous Authentication Protocol for VANETs. IEEE Trans. Veh. Technol. 65(3): 1711-1720 (2016) - [c30]Cong Zuo, Jun Shao, Guiyi Wei, Mande Xie, Min Ji:
Chosen Ciphertext Secure Attribute-Based Encryption with Outsourced Decryption. ACISP (1) 2016: 495-508 - [c29]Cheng Huang, Rongxing Lu, Hui Zhu, Jun Shao, Xiaodong Lin:
FSSR: Fine-Grained EHRs Sharing via Similarity-Based Recommendation in Cloud-Assisted eHealthcare System. AsiaCCS 2016: 95-106 - [c28]Cheng Huang, Rongxing Lu, Hui Zhu, Jun Shao, Abdulrahman Alamer, Xiaodong Lin:
EPPD: Efficient and privacy-preserving proximity testing with differential privacy techniques. ICC 2016: 1-6 - [i11]Haibo Hong, Jun Shao, Licheng Wang, Haseeb Ahmad, Yixian Yang:
Public Key Encryption in Non-Abelian Groups. CoRR abs/1605.06608 (2016) - 2015
- [j19]Jinlin Zhang, Jun Shao, Yun Ling, Min Ji, Guiyi Wei, Bishan Ying:
Efficient multiple sources network coding signature in the standard model. Concurr. Comput. Pract. Exp. 27(10): 2616-2636 (2015) - [j18]Guiyi Wei, Jun Shao, Yang Xiang, Pingping Zhu, Rongxing Lu:
Obtain confidentiality or/and authenticity in Big Data by ID-based generalized signcryption. Inf. Sci. 318: 111-122 (2015) - [c27]Jun Shao, Rongxing Lu, Xiaodong Lin, Cong Zuo:
New threshold anonymous authentication for VANETs. ICCC 2015: 1-6 - [c26]Jun Shao, Rongxing Lu, Xiaodong Lin:
Fine-grained data sharing in cloud computing for mobile devices. INFOCOM 2015: 2677-2685 - 2014
- [j17]Guiyi Wei, Rongxing Lu, Jun Shao:
EFADS: Efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption. J. Comput. Syst. Sci. 80(8): 1549-1562 (2014) - [j16]Rongxing Lu, Hui Zhu, Ximeng Liu, Joseph K. Liu, Jun Shao:
Toward efficient and privacy-preserving computing in big data era. IEEE Netw. 28(4): 46-50 (2014) - [c25]Khalid Nawaf Alharbi, Xiaodong Lin, Jun Shao:
A framework for privacy-preserving data sharing in the Smart Grid. ICCC 2014: 214-219 - [c24]Jun Shao, Rongxing Lu, Xiaodong Lin:
FINE: A fine-grained privacy-preserving location-based service framework for mobile devices. INFOCOM 2014: 244-252 - [c23]Rongxing Lu, Xiaodong Lin, Zhiguo Shi, Jun Shao:
PLAM: A privacy-preserving framework for local-area mobile social networks. INFOCOM 2014: 763-771 - [c22]Rongxing Lu, Xiaodong Lin, Jun Shao, Kaitai Liang:
RCCA-Secure Multi-use Bidirectional Proxy Re-encryption with Master Secret Security. ProvSec 2014: 194-205 - 2013
- [j15]Lihua Wang, Jun Shao, Zhenfu Cao, Masahiro Mambo, Akihiro Yamamura, Licheng Wang:
Certificate-based proxy decryption systems with revocability in the standard model. Inf. Sci. 247: 188-201 (2013) - [j14]Huang Lin, Jun Shao, Chi Zhang, Yuguang Fang:
CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring. IEEE Trans. Inf. Forensics Secur. 8(6): 985-997 (2013) - [c21]Jun Shao, Jinlin Zhang, Yun Ling, Min Ji, Guiyi Wei, Bishan Ying:
Multiple Sources Network Coding Signature in the Standard Model. IDCS 2013: 195-208 - [i10]Zhenfu Cao, Xiaolei Dong, Licheng Wang, Jun Shao:
More Efficient Cryptosystems From k-th Power Residues. IACR Cryptol. ePrint Arch. 2013: 569 (2013) - [i9]Jun Shao, Licheng Wang, Xiaolei Dong, Zhenfu Cao:
New Efficient Identity-Based Encryption From Factorization. IACR Cryptol. ePrint Arch. 2013: 570 (2013) - 2012
- [j13]Jun Shao, Zhenfu Cao:
Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption. Inf. Sci. 206: 83-95 (2012) - [j12]Guiyi Wei, Xianbo Yang, Jun Shao:
Efficient Certificateless Authenticated Asymmetric Group Key Agreement Protocol. KSII Trans. Internet Inf. Syst. 6(12): 3352-3365 (2012) - [j11]Jun Shao, Peng Liu, Yuan Zhou:
Achieving key privacy without losing CCA security in proxy re-encryption. J. Syst. Softw. 85(3): 655-665 (2012) - [j10]Jun Shao, Peng Liu, Guiyi Wei, Yun Ling:
Anonymous proxy re-encryption. Secur. Commun. Networks 5(5): 439-449 (2012) - [c20]Jun Shao:
Anonymous ID-Based Proxy Re-Encryption. ACISP 2012: 364-375 - 2011
- [j9]Jun Shao, Zhenfu Cao, Peng Liu:
SCCR: a generic approach to simultaneously achieve CCA security and collusion-resistance in proxy re-encryption. Secur. Commun. Networks 4(2): 122-135 (2011) - [c19]Miroslaw Kutylowski, Jun Shao:
Signing with multiple ID's and a single key. CCNC 2011: 519-520 - [c18]Miroslaw Kutylowski, Jun Shao:
1-out-of-2 signature. AsiaCCS 2011: 391-395 - [c17]Haiyong Bao, Guiyi Wei, Jun Shao, Zhenfu Cao:
Efficient and secure electronic resume using smart cards. FSKD 2011: 2271-2274 - [c16]Haiyong Bao, Guiyi Wei, Jun Shao, Zhenfu Cao:
Novel conic-based group signature scheme with revocation. FSKD 2011: 2623-2627 - [c15]Jun Shao, Peng Liu, Zhenfu Cao, Guiyi Wei:
Multi-Use Unidirectional Proxy Re-Encryption. ICC 2011: 1-5 - [c14]Jun Shao, Guiyi Wei, Yun Ling, Mande Xie:
Identity-Based Conditional Proxy Re-Encryption. ICC 2011: 1-5 - [c13]Jun Shao, Guiyi Wei, Yun Ling, Mande Xie:
Unidirectional Identity-Based Proxy Re-Signature. ICC 2011: 1-5 - 2010
- [j8]Jun Shao, Zhenfu Cao, Xiaohui Liang, Huang Lin:
Proxy re-encryption with keyword search. Inf. Sci. 180(13): 2576-2587 (2010) - [j7]Huang Lin, Zhenfu Cao, Xiaohui Liang, Jun Shao:
Secure threshold multi authority attribute based encryption without a central authority. Inf. Sci. 180(13): 2618-2632 (2010) - [c12]Xiaoqi Jia, Jun Shao, Jiwu Jing, Peng Liu:
CCA-Secure Type-based Proxy Re-encryption with Invisible Proxy. CIT 2010: 1299-1305 - [c11]Przemyslaw Kubiak, Miroslaw Kutylowski, Jun Shao:
How to Construct State Registries-Matching Undeniability with Public Security. ACIIDS (1) 2010: 64-73 - [c10]Jun Shao, Min Feng, Bin B. Zhu, Zhenfu Cao, Peng Liu:
The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key. ACISP 2010: 216-232 - [c9]Lihua Wang, Licheng Wang, Zhenfu Cao, Eiji Okamoto, Jun Shao:
New Constructions of Public-Key Encryption Schemes from Conjugacy Search Problems. Inscrypt 2010: 1-17 - [i8]Jun Shao, Zhenfu Cao, Peng Liu:
CCA-Secure PRE Scheme without Random Oracles. IACR Cryptol. ePrint Arch. 2010: 112 (2010)
2000 – 2009
- 2009
- [c8]Xiaohui Liang, Zhenfu Cao, Huang Lin, Jun Shao:
Attribute based proxy re-encryption with delegating capabilities. AsiaCCS 2009: 276-286 - [c7]Jun Shao, Zhenfu Cao:
CCA-Secure Proxy Re-encryption without Pairings. Public Key Cryptography 2009: 357-376 - [i7]Jun Shao, Zhenfu Cao:
CCA-Secure Proxy Re-Encryption without Pairings. IACR Cryptol. ePrint Arch. 2009: 164 (2009) - [i6]Licheng Wang, Lihua Wang, Zhenfu Cao, Eiji Okamoto, Jun Shao:
New Cryptosystems From CSP-Based Self-Distributive Systems. IACR Cryptol. ePrint Arch. 2009: 566 (2009) - 2008
- [j6]Rongxing Lu, Xiaodong Lin, Zhenfu Cao, Jun Shao, Xiaohui Liang:
New (t, n) threshold directed signature scheme with provable security. Inf. Sci. 178(3): 756-765 (2008) - [c6]Huang Lin, Zhenfu Cao, Xiaohui Liang, Jun Shao:
Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority. INDOCRYPT 2008: 426-436 - 2007
- [j5]Rongxing Lu, Zhenfu Cao, Jun Shao:
On Security of Two Nonrepudiable Threshold Multi-proxy Multi-signature Schemes with Shared Verification. Int. J. Netw. Secur. 4(3): 248-253 (2007) - [j4]Jun Shao, Zhenfu Cao, Rongxing Lu:
Improvement of Yang et al.'s threshold proxy signature scheme. J. Syst. Softw. 80(2): 172-177 (2007) - [c5]Jun Shao, Zhenfu Cao, Licheng Wang, Rongxing Lu:
Efficient Password-Based Authenticated Key Exchange Without Public Information. ESORICS 2007: 299-310 - [c4]Xiaohui Liang, Zhenfu Cao, Jun Shao, Huang Lin:
Short Group Signature Without Random Oracles. ICICS 2007: 69-82 - [c3]Jun Shao, Zhenfu Cao, Licheng Wang, Xiaohui Liang:
Proxy Re-signature Schemes Without Random Oracles. INDOCRYPT 2007: 197-209 - [c2]Lihua Wang, Jun Shao, Zhenfu Cao, Masahiro Mambo, Akihiro Yamamura:
A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power. INDOCRYPT 2007: 297-311 - [c1]Jun Shao, Min Feng, Bin B. Zhu, Zhenfu Cao:
An Efficient Certified Email Protocol. ISC 2007: 145-157 - [i5]Jun Shao, Zhenfu Cao, Licheng Wang, Rongxing Lu:
Efficient Password-based Authenticated Key Exchange without Public Information. IACR Cryptol. ePrint Arch. 2007: 326 (2007) - [i4]Jun Shao, Zhenfu Cao, Licheng Wang, Xiaohui Liang:
Proxy Re-Signature Schemes without Random Oracles. IACR Cryptol. ePrint Arch. 2007: 396 (2007) - [i3]Xiaohui Liang, Zhenfu Cao, Jun Shao, Huang Lin:
Short Group Signature without Random Oracles. IACR Cryptol. ePrint Arch. 2007: 450 (2007) - 2006
- [j3]Jun Shao, Zhenfu Cao:
A traceable threshold signature scheme with multiple signing policies. Comput. Secur. 25(3): 201-206 (2006) - [j2]Jun Shao, Zhenfu Cao, Rongxing Lu:
An improved deniable authentication protocol. Networks 48(4): 179-181 (2006) - [i2]Jun Shao, Zhenfu Cao, Licheng Wang:
Efficient ID-based Threshold Signature Schemes without Pairings. IACR Cryptol. ePrint Arch. 2006: 308 (2006) - 2005
- [j1]Jun Shao, Zhenfu Cao:
A new efficient (t, n) verifiable multi-secret sharing (VMSS) based on YCH scheme. Appl. Math. Comput. 168(1): 135-140 (2005) - [i1]Rongxing Lu, Zhenfu Cao, Renwang Su, Jun Shao:
Pairing-Based Two-Party Authenticated Key Agreement Protocol. IACR Cryptol. ePrint Arch. 2005: 354 (2005)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint