default search action
Qingji Zheng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [j5]Lei Xu, Jong-Hyuk Lee, Seung Hun Kim, Qingji Zheng, Shouhuai Xu, Taeweon Suh, Won Woo Ro, Weidong Shi:
Architectural Protection of Application Privacy against Software and Physical Attacks in Untrusted Cloud Environment. IEEE Trans. Cloud Comput. 6(2): 478-491 (2018) - 2017
- [c16]Qingji Zheng, Qi Li, Aytac Azgin, Jian Weng:
Data verification in information-centric networking with efficient revocable certificateless signature. CNS 2017: 1-9 - [c15]Lei Yang, Qingji Zheng, Xinxin Fan:
RSPP: A reliable, searchable and privacy-preserving e-healthcare system for cloud-assisted body area networks. INFOCOM 2017: 1-9 - [i7]Lei Yang, Qingji Zheng, Xinxin Fan:
RSPP: A Reliable, Searchable and Privacy-Preserving e-Healthcare System for Cloud-Assisted Body Area Networks. CoRR abs/1702.03467 (2017) - 2016
- [c14]Qingji Zheng, Qi Li, Aytac Azgin, Syed Obaid Amin:
Hey, I know you are moving: producer movement status privacy in information-centric networking. CCNC 2016: 1080-1085 - [c13]Syed Obaid Amin, Qingji Zheng, Ravishankar Ravindran, Guoqiang Wang:
Leveraging ICN for Secure Content Distribution in IP Networks. ACM Multimedia 2016: 765-767 - 2015
- [j4]Yanfeng Shi, Qingji Zheng, Jiqiang Liu, Zhen Han:
Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation. Inf. Sci. 295: 221-231 (2015) - [j3]Qi Li, Xinwen Zhang, Qingji Zheng, Ravi S. Sandhu, Xiaoming Fu:
LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking. IEEE Trans. Inf. Forensics Secur. 10(2): 308-320 (2015) - [c12]Sugang Li, Yanyong Zhang, Dipankar Raychaudhuri, Ravishankar Ravindran, Qingji Zheng, Lijun Dong, Guoqiang Wang:
IoT Middleware Architecture over Information-Centric Network. GLOBECOM Workshops 2015: 1-7 - [c11]Qingji Zheng, Shouhuai Xu:
Verifiable Delegated Set Intersection Operations on Outsourced Encrypted Data. IC2E 2015: 175-184 - [c10]Qingji Zheng, Guoqiang Wang, Ravishankar Ravindran, Aytac Azgin:
Achieving secure and scalable data access control in information-centric networking. ICC 2015: 5367-5373 - [c9]Qingji Zheng, Xiangxue Li, Aytac Azgin:
CLKS: Certificateless Keyword Search on Encrypted Data. NSS 2015: 239-253 - [i6]Qingji Zheng, Xiangxue Li, Aytac Azgin:
CLKS: Certificateless Keyword Search on Encrypted Data. IACR Cryptol. ePrint Arch. 2015: 814 (2015) - 2014
- [j2]Xiangxue Li, Qingji Zheng, Haifeng Qian, Dong Zheng, Kefei Chen:
PWG: Progressive Weight-Growth Algorithm for LDPC Codes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(2): 685-689 (2014) - [c8]Qingji Zheng, Wei Zhu, Jiafeng Zhu, Xinwen Zhang:
Improved anonymous proxy re-encryption with CCA security. AsiaCCS 2014: 249-258 - [c7]Qingji Zheng, Shouhuai Xu, Giuseppe Ateniese:
VABKS: Verifiable attribute-based keyword search over outsourced encrypted data. INFOCOM 2014: 522-530 - [i5]Qingji Zheng, Shouhuai Xu:
Verifiable Delegated Set Intersection Operations on Outsourced Encrypted Data. IACR Cryptol. ePrint Arch. 2014: 178 (2014) - 2013
- [c6]Yuanfeng Wen, Jong-Hyuk Lee, Ziyi Liu, Qingji Zheng, Weidong Shi, Shouhuai Xu, Taeweon Suh:
Multi-processor architectural support for protecting virtual machine privacy in untrusted cloud environment. Conf. Computing Frontiers 2013: 25:1-25:10 - [c5]Huijun Xiong, Qingji Zheng, Xinwen Zhang, Danfeng Yao:
CloudSafe: Securing data processing within vulnerable virtualization environments in the cloud. CNS 2013: 172-180 - [i4]Qingji Zheng, Shouhuai Xu, Giuseppe Ateniese:
VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data. IACR Cryptol. ePrint Arch. 2013: 462 (2013) - 2012
- [c4]Qingji Zheng, Shouhuai Xu, Giuseppe Ateniese:
Efficient query integrity for outsourced dynamic databases. CCSW 2012: 71-82 - [c3]Qingji Zheng, Shouhuai Xu:
Secure and efficient proof of storage with deduplication. CODASPY 2012: 1-12 - [i3]Qingji Zheng, Xinwen Zhang:
Multiparty Cloud Computation. CoRR abs/1206.3717 (2012) - [i2]Qingji Zheng, Shouhuai Xu, Giuseppe Ateniese:
Efficient Query Integrity for Outsourced Dynamic Databases. IACR Cryptol. ePrint Arch. 2012: 493 (2012) - 2011
- [c2]Qingji Zheng, Shouhuai Xu:
Fair and dynamic proofs of retrievability. CODASPY 2011: 237-248 - [i1]Qingji Zheng, Shouhuai Xu:
Secure and Efficient Proof of Storage with Deduplication. IACR Cryptol. ePrint Arch. 2011: 529 (2011) - 2010
- [c1]Qingji Zheng, Xiangxue Li, Dong Zheng, Baoan Guo:
Regular Quasi-cyclic LDPC Codes with Girth 6 from Prime Fields. IIH-MSP 2010: 470-473
2000 – 2009
- 2009
- [j1]Xiangxue Li, Qingji Zheng, Haifeng Qian, Dong Zheng, Jianhua Li:
Toward optimizing cauchy matrix for cauchy reed-solomon code. IEEE Commun. Lett. 13(8): 603-605 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-21 20:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint