Showing
1 - 12
results of
12
for search '
Jiguo Li
'
Skip to content
Home
Collections
High Impact Articles
Jawi Collection
Malay Medicine
Search Options
UiTM Open Access
Search by UiTM Scopus
Advanced Search
Search by Category
Discovery Service
Sources
UiTM Journals
List UiTM Journal in IR
Statistic
About
Open Access
Creative Commons Licenses
COKI | Malaysia Open Access
Report Technical
User Guide
Contact Us
Search Tips
FAQs
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Author
Jiguo Li
Showing
1 - 12
results of
12
for search '
Jiguo Li
'
, query time: 0.11s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks
by
Yang Lu
,
Jiguo
Li
Published 2014-01-01
Get full text
Article
2
Two-Party Attribute-Based Key Agreement Protocol with Constant-Size Ciphertext and Key
by
Jiguo
Li
,
Shengzhou Hu
,
Yichen Zhang
Published 2018-01-01
Get full text
Article
3
SCF-PEPCKS: Secure Channel Free Public Key Encryption With Privacy-Conserving Keyword Search
by
Yang Lu
,
Jiguo
Li
,
Yichen Zhang
Published 2019-01-01
Get full text
Article
4
Expressive Public-Key Encryption With Keyword Search: Generic Construction From KP-ABE and an Efficient Scheme Over Prime-Order Groups
by
Chen Shen
,
Yang Lu
,
Jiguo
Li
Published 2020-01-01
Get full text
Article
5
A Dispersed Multi-Value Attribute-Based Encryption With Mediated Obfuscation
by
Shengzhou Hu
,
Jiguo
Li
,
Yichen Zhang
Published 2019-01-01
Get full text
Article
6
Constant Size Ciphertext Distributed CP-ABE Scheme With Privacy Protection and Fully Hiding Access Structure
by
Yichen Zhang
,
Jiguo
Li
,
Hao Yan
Published 2019-01-01
Get full text
Article
7
Certificate-Based Encryption Resilient to Continual Leakage in the Standard Model
by
Yuyan Guo
,
Jiguo
Li
,
Mingming Jiang
,
Lei Yu
,
Shimin Wei
Published 2020-01-01
Get full text
Article
8
Efficiency and Privacy Enhancement for a Track and Trace System of RFID-Based Supply Chains
by
Xunjun Chen
,
Yuelong Zhu
,
Jiguo
Li
,
Yamin Wen
,
Zheng Gong
Published 2015-06-01
Get full text
Article
9
Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length
by
Jiguo
Li
,
Fengjie Sha
,
Yichen Zhang
,
Xinyi Huang
,
Jian Shen
Published 2017-01-01
Get full text
Article
10
Fuzzy Identity-Based Dynamic Auditing of Big Data on Cloud Storage
by
Chenbin Zhao
,
Li Xu
,
Jiguo
Li
,
Feng Wang
,
He Fang
Published 2019-01-01
Get full text
Article
11
Hierarchical Trust Level Evaluation for Pervasive Social Networking
by
Jian Shen
,
Tianqi Zhou
,
Chin-Feng Lai
,
Jiguo
Li
,
Xiong Li
Published 2017-01-01
Get full text
Article
12
Lightweight Certificate-Based Public/Private Auditing Scheme Based on Bilinear Pairing for Cloud Storage
by
Feng Wang
,
Li Xu
,
Kim-Kwang Raymond Choo
,
Yuexin Zhang
,
Huaqun Wang
,
Jiguo
Li
Published 2020-01-01
Get full text
Article
Search Tools:
Get RSS Feed
—
Email this Search
Loading...