31 results on '"Li, Yingjiu"'
Search Results
2. AnoPay: Anonymous Payment for Vehicle Parking with Updatable Credential
3. Message Control for Blockchain Rewriting
4. A Robustness-Assured White-Box Watermark in Neural Networks
5. SparkAC: Fine-Grained Access Control in Spark for Secure Data Sharing and Analytics
6. Identifiable, But Not Visible: A Privacy-Preserving Person Reidentification Scheme
7. ACB-Vote: Efficient, Flexible, and Privacy- Preserving Blockchain-Based Score Voting With Anonymously Convertible Ballots
8. Accountable Fine-Grained Blockchain Rewriting in the Permissionless Setting
9. CrowdFA: A Privacy-Preserving Mobile Crowdsensing Paradigm via Federated Analytics
10. Accountable and Fine-Grained Controllable Rewriting in Blockchains
11. A Secure EMR Sharing System With Tamper Resistance and Expressive Access Control
12. Threshold Attribute-Based Credentials With Redactable Signature
13. Untouchable Once Revoking: A Practical and Secure Dynamic EHR Sharing System via Cloud
14. Lightweight and Expressive Fine-Grained Access Control for Healthcare Internet-of-Things
15. DeepMnemonic: Password Mnemonic Generation via Deep Attentive Encoder-Decoder Model
16. ShieldFL: Mitigating Model Poisoning Attacks in Privacy-Preserving Federated Learning
17. Designing Leakage-Resilient Password Entry on Head-Mounted Smart Wearable Glass Devices
18. Editing-Enabled Signatures: A New Tool for Editing Authenticated Data
19. Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing
20. Lightweight Sharable and Traceable Secure Mobile Health System
21. SDAC: A Slow-Aging Solution for Android Malware Detection Using Semantic Distance Based API Clustering
22. $LiveForen$ : Ensuring Live Forensic Integrity in the Cloud
23. Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud
24. Server-Aided Attribute-Based Signature With Revocation for Resource-Constrained Industrial-Internet-of-Things Devices
25. Efficient and Expressive Keyword Search Over Encrypted Data in Cloud
26. Every Step You Take, I’ll Be Watching You: Practical StepAuth-Entication of RFID Paths
27. Empirical Study of Face Authentication Systems Under OSNFD Attacks
28. An Efficient Privacy-Preserving Outsourced Computation over Public Data
29. A Secure, Usable, and Transparent Middleware for Permission Managers on Android
30. ICCDetector: ICC-Based Malware Detection on Android
31. Universally Composable RFID Mutual Authentication
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.