关注
huang lin
huang lin
Shanghai Jiao Tong University/University of florida
在 ufl.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Attribute based proxy re-encryption with delegating capabilities
X Liang, Z Cao, H Lin, J Shao
Proceedings of the 4th International Symposium on Information, Computer, and …, 2009
3632009
Proxy re-encryption with keyword search
J Shao, Z Cao, X Liang, H Lin
Information Sciences 180 (13), 2576-2587, 2010
2272010
FairTest: Discovering unwarranted associations in data-driven applications
F Tramer, V Atlidakis, R Geambasu, D Hsu, JP Hubaux, M Humbert, ...
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 401-416, 2017
2062017
Secure threshold multi authority attribute based encryption without a central authority
H Lin, Z Cao, X Liang, J Shao
International Conference on Cryptology in India, 426-436, 2008
2062008
Provably secure and efficient bounded ciphertext policy attribute based encryption
X Liang, Z Cao, H Lin, D Xing
Proceedings of the 4th International Symposium on Information, Computer, and …, 2009
1912009
Secure threshold multi authority attribute based encryption without a central authority
H Lin, Z Cao, X Liang, J Shao
Information Sciences 180 (13), 2618-2632, 2010
1722010
CAM: cloud-assisted privacy preserving mobile health monitoring
H Lin, J Shao, C Zhang, Y Fang
IEEE Transactions on Information Forensics and Security 8 (6), 985-997, 2013
1562013
Sealed-glass proofs: Using transparent enclaves to prove and sell knowledge
F Tramer, F Zhang, H Lin, JP Hubaux, A Juels, E Shi
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 19-34, 2017
1282017
Towards practical lattice-based one-time linkable ring signatures
C Baum, H Lin, S Oechsner
International Conference on Information and Communications Security, 303-322, 2018
842018
Short group signature without random oracles
X Liang, Z Cao, J Shao, H Lin
International Conference on Information and Communications Security, 69-82, 2007
722007
Efficient Range Proofs with Transparent Setup from Bounded Integer Commitments
G Couteau, M Klooß, H Lin, M Reichle
Annual International Conference on the Theory and Applications of …, 2021
452021
A privacy-preserving solution for compressed storage and selective retrieval of genomic data
Z Huang, E Ayday, H Lin, RS Aiyar, A Molyneaux, Z Xu, J Fellay, ...
Genome Research 26 (12), 1687-1696, 2016
412016
Discovering unwarranted associations in data-driven applications with the fairtest testing toolkit
F Tramèr, V Atlidakis, R Geambasu, DJ Hsu, JP Hubaux, M Humbert, ...
CoRR, abs/1510.02377, 2015
332015
Privacy preserving friend search over online social networks
H Lin, SSM Chow, D Xing, Y Fang, Z Cao
Cryptology ePrint Archive, Report 2011/445, 2011
152011
Efficient trust based information sharing schemes over distributed collaborative networks
H Lin, X Zhu, Y Fang, D Xing, C Zhang, Z Cao
IEEE Journal on Selected Areas in Communications 31 (9), 279-290, 2013
142013
How to design space efficient revocable IBE from non-monotonic ABE
H Lin, Z Cao, Y Fang, M Zhou, H Zhu
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
142011
SQC: secure quality control for meta-analysis of genome-wide association studies
Z Huang, H Lin, J Fellay, Z Kutalik, JP Hubaux
Bioinformatics 33 (15), 2273-2280, 2017
132017
Privacy-aware profiling and statistical data extraction for smart sustainable energy systems
H Lin, Y Fang
IEEE Transactions on Smart Grid 4 (1), 332-340, 2012
132012
How to construct interval encryption from binary tree encryption
H Lin, Z Cao, X Liang, M Zhou, H Zhu, D Xing
International Conference on Applied Cryptography and Network Security, 19-34, 2010
82010
Methods and apparatuses for key generation, encryption and decryption in broadcast encryption
Z Cao, H Lin, X Dong, X Liang, D Xing
US Patent 8,290,154, 2012
32012
系统目前无法执行此操作,请稍后再试。
文章 1–20