Остановите войну!
for scientists:
default search action
Jiaoli Shi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j5]Zhuolin Mei, Huilai Zou, Jinzhou Huang, Caicai Zhang, Bin Wu, Jiaoli Shi, Zhengxiang Cheng:
A Secure and Fast Range Query Scheme for Encrypted Multi-Dimensional Data. Int. J. Web Serv. Res. 21(1): 1-17 (2024) - 2023
- [j4]Shimao Yao, Ralph Voltaire J. Dayot, In-Ho Ra, Liya Xu, Zhuolin Mei, Jiaoli Shi:
An Identity-Based Proxy Re-Encryption Scheme With Single-Hop Conditional Delegation and Multi-Hop Ciphertext Evolution for Secure Cloud Data Sharing. IEEE Trans. Inf. Forensics Secur. 18: 3833-3848 (2023) - [c12]Han Wang, Hui Li, Zixian Wang, Feng Zhao, Yao Yao, Yuhong Chen, Tuanfa Qin, Ping Lu, Jiaoli Shi:
Optimizing Read Performance in Lightweight Blockchain with Cooperative Storage Scheme. BCCA 2023: 150-157 - [c11]Ruwang Wen, Zhengxiang Cheng, Weixuan Mao, Zhuolin Mei, Jiaoli Shi, Xiao Cheng:
HMGR: A Hybrid Model for Geolocation Recommendation. BigData 2023: 48-62 - [c10]Chao Luo, Jiaoli Shi, Minchen Xie, Chao Hu, Lihua Wang, Zhuolin Mei, Shimao Yao, Hui Li:
A Lightweight Access Control Scheme Supporting Policy Hidden Based on Path Bloom Filter. Inscrypt (1) 2023: 433-451 - [c9]Zhengxiang Cheng, Weixuan Mao, Ruwang Wen, Zhuolin Mei, Bin Wu, Jiaoli Shi, Xiao Cheng:
Secure and Fast Query Approach for High-Precision Multi-dimensional Satellite Remote Sensing Data. EDGE 2023: 69-81 - [c8]Jiaoli Shi, Chao Hu, Shimao Yao, Zhuolin Mei, Bin Wu, Hui Li:
A Lightening Fine-grained Access Control Scheme Supporting Full Policy Hiding in Cloud Storage. ICPADS 2023: 2875-2878 - 2022
- [c7]Liya Xu, Mingzhu Ge, Anyuan Deng, Jiaoli Shi, Shimao Yao:
An Emergency Information Broadcast Routing in VANET. WiCON 2022: 144-155 - 2021
- [j3]Kai He, Chunxiao Huang, Jiaoli Shi, Xinrong Hu, Xiying Fan:
Enabling Decentralized and Dynamic Data Integrity Verification for Secure Cloud Storage via T-Merkle Hash Tree Based Blockchain. Mob. Inf. Syst. 2021: 9977744:1-9977744:17 (2021) - [j2]Xieyang Shen, Chuanhe Huang, Xiajiong Shen, Jiaoli Shi, Danxin Wang:
A Collusion-Resistant Blockchain-Enabled Data Sharing Scheme with Decryption Outsourcing under Time Restriction. Secur. Commun. Networks 2021: 7249470:1-7249470:11 (2021) - 2020
- [c6]Kai He, Jiaoli Shi, Chunxiao Huang, Xinrong Hu:
Blockchain Based Data Integrity Verification for Cloud Storage with T-Merkle Tree. ICA3PP (3) 2020: 65-80 - [c5]Anyuan Deng, Jiaoli Shi, Kai He, Fang Xu:
IM-ACS: An Access Control Scheme Supporting Informal Non-malleable Security in Mobile Media Sharing System. ICA3PP (3) 2020: 81-92
2010 – 2019
- 2016
- [j1]Jiaoli Shi, Chuanhe Huang, Jing Wang, Kai He, Xieyang Shen:
An access control scheme with dynamic user management and cloud-aided decryption. Secur. Commun. Networks 9(18): 5659-5672 (2016) - [c4]Kai He, Chuanhe Huang, Zongpeng Li, Aiwu Shi, Jiaoli Shi:
An Online Auction for Deadline-Aware Dynamic Cloud Resource Provisioning. ICPADS 2016: 677-684 - [c3]Kai He, Chuanhe Huang, Jiaoli Shi, Jinhai Wang:
Public integrity auditing for dynamic regenerating code based cloud storage. ISCC 2016: 581-588 - 2015
- [c2]Kai He, Chuanhe Huang, Kan Yang, Jiaoli Shi:
Identity-preserving public auditing for shared cloud data. IWQoS 2015: 159-164 - 2014
- [c1]Jiaoli Shi, Chuanhe Huang, Jing Wang, Kai He, Jinhai Wang:
An Access Control Scheme with Direct Cloud-Aided Attribute Revocation Using Version Key. ICA3PP (1) 2014: 429-442
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-21 17:06 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint