JOURNAL

2025

  1. Yandong Zheng, Hui Zhu, Rongxing Lu, Songnian Zhang, Yunguo Guan, Fengwei Wang, Jun Shao, Hui Li
    Efficient and Privcy-Preserving Weighted Range Set Sampling in Cloud
    IEEE Transactions on Dependable and Secure Computing 22(1): 534-548 (2025) Paper Link

2024

  1. Yandong Zheng, Rongxing Lu, Yunguo Guan, Songnian Zhang, Jun Shao, Fengwei Wang, Hui Zhu
    EPSet: Efficient and Privacy-Preserving Set Similarity Range Query over Encrypted Data
    IEEE Transactions on Services Computing 17(2): 524-536 (2024) Paper Link
  2. Yandong Zheng, Rongxing Lu, Songnian Zhang, Jun Shao, Hui Zhu
    Achieving Practical and Privacy-Preserving kNN Query over Encrypted Data
    IEEE Transactions on Dependable and Secure Computing 21(6): 5479-5492 (2024) Paper Link
  3. Yunguo Guan, Rongxing Lu*, Songnian Zhang, Yandong Zheng, Jun Shao, Guiyi Wei
    kTCQ: Achieving Privacy-Preserving k-Truss Community Queries Over Outsourced Data
    IEEE Transactions on Dependable and Secure Computing 21(4): 2750-2765 (2024) Paper Link
  4. Yandong Zheng, Hui Zhu, Rongxing Lu, Yunguo Guan, Songnian Zhang, Fengwei Wang, Jun Shao, Hui Li
    PHRkNN: Efficient and Privacy-Preserving Reverse kNN Query Over High-Dimensional Data in Cloud
    IEEE Transactions on Dependable and Secure Computing 21(4): 1831-1844 (2024) Paper Link
  5. Yunguo Guan, Rongxing Lu*, Songnian Zhang, Yandong Zheng, Jun Shao, Guiyi Wei
    Efficient and Privacy-Preserving Aggregate Query over Public Property Graphs
    IEEE Transactions on Big Data 10(2): 146-157 (2024) Paper Link
  6. Qinglei Kong, Yifan Wang, Songnian Zhang, Bo Chen, Sudong Xiao, Haiyong Bao, Jun Shao
    Achieving Secure On-Orbit Comparison in LEO Satellite-Enabled Offshore Wind Farm Surveillance
    IEEE Internet of Things Journal 11(23): 38790-38802 (2024) Paper Link
  7. Yandong Zheng, Hui Zhu, Rongxing Lu, Songnian Zhang, Yunguo Guan, Fengwei Wang, Jun Shao, Hui Li
    Secure Similarity Queries over Vertically Distributed Data via TEE-Enhanced Cloud Computing
    IEEE Transactions on Information Forensics and Security 19: 1556-6013 (2024) Paper Link
  8. Songnian Zhang, Rongxing Lu, Hui Zhu, Yandong Zheng, Yunguo Guan, Fengwei Wang, Jun Shao, Hui Li
    Performance Enhanced Secure Spatial Keyword Similarity Query with Arbitrary Spatial Ranges
    IEEE Transactions on Information Forensics and Security 19: 5272-5285 (2024) Paper Link
  9. Yi Zhang, Xiaofeng Jia, Bianjing Pan, Jun Shao*, Liming Fang, Rongxing Lu, Guiyi Wei
    Anonymous Multi-Hop Payment for Payment Channel Networks
    IEEE Transactions on Dependable and Secure Computing 21(1): 476-485 (2024) Paper Link
  10. Ruixuan Li, Zhenyong Zhang, Jun Shao*, Rongxing Lu, Xiaoqi Jia, Guiyi Wei
    The Potential Harm of Email Delivery: Investigating the HTTPS Configurations of Webmail Services
    IEEE Transactions on Dependable and Secure Computing 21(1): 125-138 (2024) Paper Link

2023

  1. Songnian Zhang, Suprio Ray, Rongxing Lu, Yunguo Guan, Yandong Zheng, Jun Shao
    SecBerg: Secure and Practical Iceberg Queries in Cloud
    IEEE Transactions on Services Computing 16(5): 3696-3710 (2023) Paper Link
  2. Ruixuan Li, Xiaofeng Jia, Zhenyong Zhang, Jun Shao*, Rongxing Lu, Jingqiang Lin, Xiaoqi Jia, Guiyi Wei
    A Longitudinal and Comprehensive Measurement of DNS Strict Privacy
    IEEE/ACM Transactions on Networking 31(6): 2793-2808 (2023) Paper Link
  3. Yandong Zheng, Rongxing Lu*, Yunguo Guan, Songnian Zhang, Jun Shao, Fengwei Wang, Hui Zhu
    Efficient and Privacy-Preserving Spatial-Feature-Based Reverse kNN Query
    IEEE Transactions on Services Computing 16(4): 2620-2631 (2023) Paper Link
  4. Yandong Zheng, Rongxing Lu*, Songnian Zhang, Yunguo Guan, Fengwei Wang, Jun Shao, Hui Zhu
    PRkNN: Efficient and Privacy-Preserving Reverse kNN Query Over Encrypted Data
    IEEE Transactions on Dependable and Secure Computing 20(5): 4387-4402 (2023) Paper Link
  5. Songnian Zhang, Suprio Ray, Rongxing Lu, Yandong Zheng, Yunguo Guan, Jun Shao
    Efficient and Privacy-Preserving Spatial Keyword Similarity Query Over Encrypted Data
    IEEE Transactions on Dependable and Secure Computing 20(5): 3770-3786 (2023) Paper Link
  6. Yunguo Guan, Rongxing Lu*, Yandong Zheng, Songnian Zhang, Jun Shao, Guiyi Wei
    Achieving Privacy-Preserving Discrete Frchet Distance Range Queries
    IEEE Transactions on Dependable and Secure Computing 20(3): 2097-2110 (2023) Paper Link
  7. Yunguo Guan, Rongxing Lu*, Yandong Zheng, Songnian Zhang, Jun Shao, Guiyi Wei
    Achieving Efficient and Privacy-Preserving (\alpha,\beta)-Core Query over Bipartite Graphs in Cloud
    IEEE Transactions on Dependable and Secure Computing 20(3): 1979-1993 (2023) Paper Link
  8. Songnian Zhang, Suprio Ray, Rongxing Lu, Yandong Zheng, Yunguo Guan, Jun Shao
    Towards Efficient and Privacy-Preserving Interval Skyline Queries over Time Series Data
    IEEE Transactions on Dependable and Secure Computing 20(2): 1348-1363 (2023) Paper Link
  9. Songnian Zhang, Suprio Ray, Rongxing Lu, Yandong Zheng, Yunguo Guan, Jun Shao
    Towards Efficient and Privacy-Preserving User-Defined Skyline Query over Single Cloud
    IEEE Transactions on Dependable and Secure Computing 20(2): 1319-1334 (2023) Paper Link
  10. Yandong Zheng, Hui Zhu, Rongxing Lu, Yunguo Guan, Songnian Zhang, Fengwei Wang, Jun Shao, Hui Li
    Efficient and Privacy-Preserving Aggregated Reverse kNN Query over Crowd-sensed Data
    IEEE Transactions on Information Forensics and Security 18: 4285-4299 (2023) Paper Link
  11. Xiaofeng Jia, Zhe Yu, Jun Shao*, Rongxing Lu, Guiyi Wei, Zhenguang Liu
    Cross-Chain Virtual Payment Channels
    IEEE Transactions on Information Forensics and Security 18: 3401-3413 (2023) Paper Link
  12. Xin Hou, Xiaofeng Jia*, Jun Shao
    Public key encryption with public-verifiable decryption delegation and its application
    Journal of Information Security and Applications 75: 103513 (2023) Paper Link
  13. Genhua Lu, Xiaofeng Jia, Yi Zhang, Jun Shao*, Guiyi Wei
    A domain name management system based on account-based consortium blockchain
    Peer-to-Peer Networking and Applications 16: 1211–1226 (2023) Paper Link
  14. Yandong Zheng, Hui Zhu, Rongxing Lu, Yunguo Guan, Songnian Zhang, Fengwei Wang, Jun Shao, Hui Li
    PGSim: Efficient and Privacy-Preserving Graph Similarity Query over Encrypted Data in Cloud
    IEEE Transactions on Information Forensics and Security 18: 2030-2045 (2023) Paper Link
  15. Yandong Zheng, Rongxing Lu*, Hui Zhu, Songnian Zhang, Yunguo Guan, Jun Shao, Fengwei Wang, Hui Li
    SetRkNN: Efficient and Privacy-Preserving Set Reverse kNN Query in Cloud
    IEEE Transactions on Information Forensics and Security 18: 888-903 (2023) Paper Link
  16. Wei Liu, Zhiguo Wan*, Jun Shao, Yong Yu
    HyperMaze: Towards Privacy-Preserving and Scalable Permissioned Blockchain
    IEEE Transactions on Dependable and Secure Computing 20(1): 360-376 (2023) Paper Link

2022

  1. Yunguo Guan, Rongxing Lu*, Yandong Zheng, Songnian Zhang, Jun Shao, Guiyi Wei
    EPGQ: Efficient and Private Feature-based Group Nearest Neighbor Query over Road Networks
    IEEE Internet of Things Journal 9(20): 20492-20502 (2022) Paper Link
  2. Songnian Zhang, Suprio Ray, Rongxing Lu, Yandong Zheng, Yunguo Guan, Jun Shao
    PPAQ: Privacy-Preserving Aggregate Queries for Optimal Location Selection in Road Networks
    IEEE Internet of Things Journal 9(20): 20178-20188 (2022) Paper Link
  3. Yandong Zheng, Rongxing Lu*, Yunguo Guan, Jun Shao, Hui Zhu
    Towards Practical and Privacy-Preserving Multi-dimensional Range Query over Cloud
    IEEE Transactions on Dependable and Secure Computing 19(5): 3478-3493 (2022) Paper Link
  4. Yandong Zheng, Rongxing Lu*, Yunguo Guan, Jun Shao, Hui Zhu
    Efficient Privacy-Preserving Similarity Range Query with Quadsector Tree in eHealthcare.
    IEEE Transactions on Services Computing 15(5): 2742-2754 (2022) Paper Link
  5. Yandong Zheng, Rongxing Lu*, Yunguo Guan, Jun Shao, Hui Zhu
    Achieving Efficient and Privacy-Preserving Set Containment Search over Encrypted Data.
    IEEE Transactions on Services Computing 15(5): 2604-2618 (2022) Paper Link
  6. Yandong Zheng, Rongxing Lu*, Yunguo Guan, Jun Shao, Hui Zhu
    Efficient and Privacy-Preserving Similarity Range Query over Encrypted Time Series Data.
    IEEE Transactions on Dependable and Secure Computing 19(4): 2501-2516 (2022) Paper Link
  7. Yunguo Guan, Hui Zheng, Jun Shao*, Rongxing Lu, Guiyi Wei
    Fair Outsourcing Polynomial Computation Based on the Blockchain.
    IEEE Transactions on Services Computing 15(5): 2795-2808 (2022) Paper Link Demo
  8. Yandong Zheng, Rongxing Lu*, Songnian Zhang, Yunguo Guan, Jun Shao, Fengwei Wang, Hui Zhu
    PMRQ: Achieving Efficient and Privacy-Preserving Multi-Dimensional Range Query in eHealthcare
    IEEE Internet of Things Journal 9(18): 17468-17479 (2022) Paper Link
  9. Songnian Zhang, Suprio Ray, Rongxing Lu, Yunguo Guan, Yandong Zheng, Jun Shao
    Toward Privacy-Preserving Aggregate Reverse Skyline Query with Strong Security
    IEEE Transactions on Information Forensics and Security 17: 2538-2552 (2022) Paper Link
  10. Yandong Zheng, Rongxing Lu*, Jun Shao, Fan Yin, Hui Zhu
    Achieving Practical Symmetric Searchable Encryption with Search Pattern Privacy over Cloud
    IEEE Transactions on Services Computing 15(3): 1358-1370 (2022) Paper Link
  11. Songnian Zhang, Suprio Ray, Rongxing Lu*, Yandong Zheng, Yunguo Guan, Jun Shao
    Achieving Efficient and Privacy-Preserving Dynamic Skyline Query in Online Medical Diagnosis
    IEEE Internet of Things Journal 9(12): 9973-9986 (2022) Paper Link
  12. Xichen Zhang, Rongxing Lu*, Jun Shao, Fengwei Wang, Hui Zhu, Ali A. Ghorbani
    FedSky: An Efficient and Privacy-preserving Scheme for Federated Mobile Crowdsensing
    IEEE Internet of Things Journal 9(7): 5344-5356 (2022) Paper Link
  13. Yandong Zheng, Rongxing Lu*, Yunguo Guan, Songnian Zhang, Jun Shao, Hui Zhu
    Efficient and Privacy-Preserving Similarity Query with Access Control in eHealthcare
    IEEE Transactions on Information Forensics and Security 17(2): 880-893 (2022) Paper Link
  14. Yandong Zheng, Rongxing Lu*, Yunguo Guan, Jun Shao, Hui Zhu
    Achieving Efficient and Privacy-Preserving Exact Set Similarity Search over Encrypted Data
    IEEE Transactions on Dependable and Secure Computing 19(2): 1090-1103 (2022) Paper Link
  15. Jun Shao, Rongxing Lu, Yunguo Guan, Guiyi Wei
    Achieve Efficient and Verifiable Conjunctive and Fuzzy Queries over Encrypted Data in Cloud
    IEEE Transactions on Services Computing 15(1): 124-137 (2022) Paper Link Demo
  16. Xue Yang, Rongxing Lu*, Jun Shao, Xiaohu Tang, Ali Ghorbani
    Achieving Efficient Secure Deduplication with User-Defined Access Control in Cloud
    IEEE Transactions on Dependable and Secure Computing 19(1): 591-606 (2022) Paper Link
  17. Cong Zuo, Shifeng Sun*, Joseph K. Liu*, Jun Shao, Josef Pieprzyk, Lei Xu
    Forward and Backward Private DSSE for Range Queries
    IEEE Transactions on Dependable and Secure Computing 19(1): 328-338 (2022) Paper Link
  18. Yandong Zheng, Rongxing Lu*, Songnian Zhang, Yunguo Guan, Jun Shao, Hui Zhu
    Toward Privacy-Preserving Healthcare Monitoring based on Time-Series Activities over Cloud.
    IEEE Internet of Things Journal 9(2): 1276-1288. (2022) Paper Link

2021

  1. Yunguo Guan, Rongxing Lu*, Yandong Zheng, Songnian Zhang, Jun Shao, Guiyi Wei
    Toward Privacy-Preserving Cybertwin-Based Spatio-Temporal Keyword Query for ITS in 6G Era.
    IEEE Internet of Things Journal 8(22): 16243-16255. (2021) Paper Link
  2. Xue Yang, Rongxing Lu, Jun Shao, Xiaohu Tang, Ali Ghorbani
    Achieving Efficient and Privacy-Preserving Multi-Domain Big Data Deduplication in Cloud
    IEEE Transactions on Services Computing 14(5): 1292-1305. (2021) Paper Link
  3. Yunguo Guan, Rongxing Lu*, Yandong Zheng, Jun Shao, Guiyi Wei
    Toward Oblivious Location-Based k-Nearest Neighbor Query in Smart Cities.
    IEEE Internet of Things Journal 8(18): 14219-14231 (2021) Paper Link
  4. Fan Yin, Rongxing Lu*, Yandong Zheng, Jun Shao, Xue Yang, Xiaohu Tang
    Achieve efficient position-heap-based privacy-preserving substring-of-keyword query over cloud.
    Computers & Security 110, 2021, 102432 Paper Link
  5. Guiyi Wei, Xiaohang Mao, Rongxing Lu, Jun Shao*, Yunguo Guan, Genhua Lu
    Achieve space-efficient key management in lightning network.
    Computer Networks 108346 (2021) Paper Link
  6. Xichen Zhang, Rongxing Lu*, Jun Shao, Hui Zhu, Ali A. Ghorbani
    Continuous probabilistic skyline query for secure worker selection in mobile crowdsensing.
    IEEE Internet of Things Journal 8(14): 11758-11772 (2021) Paper Link
  7. Fan Zhang, Ziyuan Liang, Cong Zuo, Jun Shao, Jianting Ning*, Jun Sun, Joseph K. Liu, Yibao Bao
    hPRESS: A Hardware-enhanced Proxy Re-encryption Scheme using Secure Enclave
    IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 40(6): 1144-1157 (2021) Paper Link
  8. Songnian Zhang, Suprio Ray, Rongxing Lu*, Yandong Zheng, Jun Shao
    Preserving Location Privacy for Outsourced Most-Frequent Item Query in Mobile Crowdsensing
    IEEE Internet of Things Journal 8(11): 9139-9150 (2021) Paper Link
  9. Hassan Mahdikhani, Rongxing Lu*, Jun Shao, Ali Ghorbani
    Using Reduced Paths to Achieve Efficient Privacy-Preserving Range Query in Fog-Based IoT
    IEEE Internet of Things Journal 8(6): 4762-4774 (2021) Paper Link
  10. Xiaopeng Zhao, Zhenfu Cao*, Xiaolei Dong, Jun Shao
    Extended Galbraith's test on the anonymity of IBE schemes from higher residuosity
    Designs, Codes and Cryptography 89(2): 241-253 (2021) Paper Link

2020

  1. Xichen Zhang, Rongxing Lu*, Jun Shao, Hui Zhu, Ali A. Ghorbani
    Secure and Efficient Probabilistic Skyline Computation for Worker Selection in MCS
    IEEE Internet of Things Journal 7(12): 11524-11535 (2020) Paper Link
  2. Hui Zheng, Jun Shao*, Guiyi Wei
    Attribute-based encryption with outsourced decryption in blockchain
    Peer-to-Peer Networking and Applications 13(5): 1643-1655 (2020) Paper Link
  3. Hassan Mahdikhani, Rongxing Lu, Yandong Zheng, Jun Shao, Ali Ghorbani
    Achieving ${O(\log^3n)}$ Communication-Efficient Privacy-Preserving Range Query in Fog-Based IoT
    IEEE Internet of Things Journal 7(6): 5220-5232 (2020) Paper Link
  4. Jingcheng Song, Yining Liu, Jun Shao, Chunming Tang
    A Dynamic Membership Data Aggregation (DMDA) Protocol for Smart Grid
    IEEE Systems Journal 14(1): 900-908 (2020) Paper Link

2019

  1. Haibo Hong, Licheng Wang, Jun Shao, Jianhua Yan, Haseeb Ahmad, Guiyi Wei, Mande Xie, Yixian Yang
    A Miniature CCA Public Key Encryption Scheme Based on Non-abelian Factorization Problem in Finite Groups of Lie Type
    The Computer Journal 62(12): 1840-1848 (2019) Paper Link
  2. Xue Yang, Rongxing Lu, Jun Shao, Xiaohu Tang, Haomiao Yang
    An Efficient and Privacy-Preserving Disease Risk Prediction Scheme for E-Healthcare
    IEEE Internet of Things Journal 6(2): 3284-3297 (2019) Paper Link
  3. Yandong Zheng, Rongxing Lu, Beibei Li, Jun Shao, Haomiao Yang, Kim-Kwang Raymond Choo
    Efficient privacy-preserving data merging and skyline computation over multi-source encrypted data
    Information Sciences 498: 91-105 (2019) Paper Link
  4. Yandong Zheng, Rongxing Lu, Jun Shao
    Achieving Efficient and Privacy-Preserving k-NN Query for Outsourced eHealthcare Data
    Journal of Medical Systems 43(5): 123:1-123:13 (2019) Paper Link
  5. Licheng Wang, Xiaoying Shen, Jing Li, Jun Shao, Yixian Yang
    Cryptographic primitives in blockchains
    Journal of Network and Computer Applications 127: 43-58 (2019) Paper Link

2018

  1. Wei Guo, Jun Shao, Rongxing Lu, Yining Liu, Ali A. Ghorbani
    A Privacy-Preserving Online Medical Prediagnosis Scheme for Cloud Environment
    IEEE Access 6: 48946-48957 (2018) Paper Link
  2. Cong Zuo, Jun Shao*, Guiyi Wei, Mande Xie, Min Ji
    CCA-secure ABE with outsourced decryption for fog computing
    Future Generation Computer Systems 78: 730-738 (2018) Paper Link
  3. Jun Shao, Guiyi Wei
    Secure Outsourced Computation in Connected Vehicular Cloud Computing
    IEEE Network 32(3): 36-41 (2018) Paper Link
  4. Yunguo Guan, Jun Shao, Guiyi Wei*, Mande Xie
    Data Security and Privacy in Fog Computing
    IEEE Network 32(5): 106-111 (2018) Paper Link
  5. Cong Zuo, Jun Shao*, Joseph K. Liu, Guiyi Wei, Yun Ling
    Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage
    IEEE Transactions on Information Forensics and Security 13(1): 186-196 (2018) Paper Link

2017

  1. Haibo Hong, Licheng Wang, Haseeb Ahmad, Jun Shao, Yixian Yang
    Minimal logarithmic signatures for one type of classical groups
    Applicable Algebra in Engineering, Communication and Computing 28(2): 177-192 (2017) Paper Link
  2. Khalid Alharbi, Xiaodong Lin, Jun Shao
    A Privacy-Preserving Data-Sharing Framework for Smart Grid
    IEEE Internet of Things Journal 4(2): 555-562 (2017) Paper Link
  3. Mande Xie, Urmila Bhanja, Jun Shao, Guoping Zhang, Guiyi Wei
    LDSCD: A loss and DoS resistant secure code dissemination algorithm supporting multiple authorized tenants
    Information Sciences 420: 37-48 (2017) Paper Link
  4. Cong Zuo, Kaitai Liang, Zoe L. Jiang*, Jun Shao, Jun-bin Fang
    Cost-effective privacy-preserving vehicular urban sensing system
    Personal and Ubiquitous Computing 21(5): 893-901 (2017) Paper Link
  5. Hao Hu, Rongxing Lu, Zonghua Zhang, Jun Shao
    REPLACE: A Reliable Trust-Based Platoon Service Recommendation Scheme in VANET
    IEEE Transactions on Vehicular Technology 66(2): 1786-1797 (2017) Paper Link

2016

  1. Yong Deng, Guiyi Wei, Mande Xie, Jun Shao
    Cooperation Dynamics on Mobile Crowd Networks of Device-to-Device Communications
    Mobile Information Systems 2016: 8686945:1-8686945:10 (2016) Paper Link
  2. Jun Shao, Rongxing Lu, Xiaodong Lin, Kaitai Liang
    Secure bidirectional proxy re-encryption for cryptographic cloud storage
    Pervasive and Mobile Computing 28: 113-121 (2016) Paper Link
  3. Lichun Li, Rongxing Lu, Kim-Kwang Raymond Choo, Anwitaman Datta, Jun Shao
    Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases
    IEEE Transactions on Information Forensics and Security 11(8): 1847-1861 (2016) Paper Link
  4. Jun Shao, Xiaodong Lin, Rongxing Lu, Cong Zuo
    A Threshold Anonymous Authentication Protocol for VANETs
    IEEE Transactions on Vehicular Technology 65(3): 1711-1720 (2016) Paper Link

2015

  1. Jinlin Zhang, Jun Shao*, Yun Ling, Min Ji, Guiyi Wei, Bishan Ying
    Efficient multiple sources network coding signature in the standard model
    Concurrency and Computation: Practice and Experience 27(10): 2616-2636 (2015) Paper Link
  2. Guiyi Wei, Jun Shao*, Yang Xiang, Pingping Zhu, Rongxing Lu
    Obtain confidentiality or/and authenticity in Big Data by ID-based generalized signcryption
    Information Sciences 318: 111-122 (2015) Paper Link
  3. Kai Chen, Jun Shao
    Preface to special issue on miscellaneous emerging security problems
    EAI Endorsed Transactions on Security and Safety 2(4): e1 (2015) Paper Link

2014

  1. Jun Shao
    Efficient verifiable multi-secret sharing scheme based on hash function
    Information Sciences 278: 104-109 (2014) Paper Link
  2. Guiyi Wei, Rongxing Lu, Jun Shao*
    EFADS: Efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption
    Journal of Computer and System Sciences 80(8): 1549-1562 (2014) Paper Link
  3. Rongxing Lu, Hui Zhu, Ximeng Liu, Joseph K. Liu, Jun Shao
    Toward efficient and privacy-preserving computing in big data era
    IEEE Network 28(4): 46-50 (2014) Paper Link

2013

  1. Lihua Wang, Jun Shao, Zhenfu Cao, Masahiro Mambo, Akihiro Yamamura, Licheng Wang
    Certificate-based proxy decryption systems with revocability in the standard model
    Information Sciences 247: 188-201 (2013) Paper Link
  2. Huang Lin, Jun Shao, Chi Zhang, Yuguang Fang
    CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
    IEEE Transactions on Information Forensics and Security 8(6): 985-997 (2013) Paper Link

2012

  1. Jun Shao, Zhenfu Cao
    Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
    Information Sciences 206: 83-95 (2012) Paper Link
  2. Guiyi Wei, Xianbo Yang, Jun Shao
    Efficient Certificateless Authenticated Asymmetric Group Key Agreement Protocol
    KSII Transactions on Internet and Information Systems 6(12): 3352-3365 (2012) Paper Link
  3. Jun Shao, Peng Liu, Yuan Zhou
    Achieving key privacy without losing CCA security in proxy re-encryption
    Journal of Systems and Software 85(3): 655-665 (2012) Paper Link
  4. Jun Shao, Peng Liu, Guiyi Wei, Yun Ling
    Anonymous proxy re-encryption
    Security and Communication Networks 5(5): 439-449 (2012) Paper Link

2011

  1. Jun Shao, Zhenfu Cao, Peng Liu
    SCCR: a generic approach to simultaneously achieve CCA security and collusion-resistance in proxy re-encryption
    Security and Communication Networks 4(2): 122-135 (2011) Paper Link

2010

  1. Jun Shao, Zhenfu Cao, Xiaohui Liang, Huang Lin
    Proxy re-encryption with keyword search
    Information Sciences 180(13): 2576-2587 (2010) Paper Link
  2. Huang Lin, Zhenfu Cao, Xiaohui Liang, Jun Shao
    Secure threshold multi authority attribute based encryption without a central authority
    Information Sciences 180(13): 2618-2632 (2010) Paper Link

2008

  1. Rongxing Lu, Xiaodong Lin, Zhenfu Cao, Jun Shao, Xiaohui Liang
    New (t, n) threshold directed signature scheme with provable security
    Information Sciences 178(3): 756-765 (2008) Paper Link

2007

  1. Rongxing Lu, Zhenfu Cao, Jun Shao
    On Security of Two Nonrepudiable Threshold Multi-proxy Multi-signature Schemes with Shared Verification
    International Journal of Network Security 4(3): 248-253 (2007) Paper Link
  2. Jun Shao, Zhenfu Cao, Rongxing Lu
    Improvement of Yang et al.'s threshold proxy signature scheme
    Journal of Systems and Software 80(2): 172-177 (2007) Paper Link

2006

  1. Jun Shao, Zhenfu Cao
    A traceable threshold signature scheme with multiple signing policies
    Computers & Security 25(3): 201-206 (2006) Paper Link
  2. Jun Shao, Zhenfu Cao, Rongxing Lu
    An improved deniable authentication protocol
    Networks 48(4): 179-181 (2006) Paper Link

2005

  1. Jun Shao, Zhenfu Cao
    A new efficient (t, n) verifiable multi-secret sharing (VMSS) based on YCH scheme
    Applied Mathematics and Computation 168(1): 135-140 (2005) Paper Link

Menu

  • ABOUT ME
  • PUBLICATIONS
    • JOURNAL
    • CONFERENCE
  • DEMO
  • SUPERVISION
  • PUBLIC SERVICE
  • 中文主页