Follow
Shuo Qiu
Title
Cited by
Year
2EPV‐ApproCom: Enhanced Effective, Private, and Verifiable Approximate Similarity Computation with Server Aided over Scalable Datasets for IoT
S Qiu, Y Shi, Y Liu, H Yan, Z Zhang
Mathematical Problems in Engineering 2023 (1), 4267309, 2023
2023
可抵抗关键字猜测攻击的隐藏策略属性基可检索加密方案
S Qiu, J Liu, Y Shi, R Zhang
Science China Information Sciences 60, 1-12, 2017
2017
An efficient lattice-based ibe scheme using combined public key
Y Shi, S Qiu, J Liu
Big Data and Security: First International Conference, ICBDS 2019, Nanjing …, 2020
12020
Attribute-based proxy re-encryption with keyword search
Y Shi, J Liu, Z Han, Q Zheng, R Zhang, S Qiu
PloS one 9 (12), e116325, 2014
412014
Authentication and Key Distribution Scheme for Two-Tiered IoT Based on PUF
Y Liu, S Qiu, R Dong, Z Bian
Fuzzy Systems and Data Mining V, 997-1003, 2019
2019
Ciphertext-policy attribute-based encryption with outsourced set intersection in multimedia cloud computing
Y Shi, S Qiu
Electronics 10 (21), 2685, 2021
22021
Comments on a dynamic cloud data integrity verification scheme: security analysis and improvement
H Yan, Z Zhang, Y Liu, S Qiu, Q Wu
International Journal of Security and Networks 18 (2), 125-132, 2023
2023
Creditcoin: A privacy-preserving blockchain-based incentive announcement network for communications of smart vehicles
L Li, J Liu, L Cheng, S Qiu, W Wang, X Zhang, Z Zhang
IEEE Transactions on Intelligent Transportation Systems 19 (7), 2204-2220, 2018
5732018
Delegated Key‐Policy Attribute‐Based Set Intersection over Outsourced Encrypted Data Sets for CloudIoT
Y Shi, S Qiu
Security and Communication Networks 2021 (1), 5595243, 2021
72021
Fast, Private and Verifiable
S Qiu, B Wang, M Li, J Victors, J Liu, Y Shi, W Wang
Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, 2016
2016
Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack
S Qiu, J Liu, Y Shi, R Zhang
Sci. China Inf. Sci 60 (5), 1-12, 2017
1132017
Identity-based symmetric private set intersection
S Qiu, J Liu, Y Shi
2013 International Conference on Social Computing, 653-658, 2013
72013
Locally private Jaccard similarity estimation
Z Yan, Q Wu, M Ren, J Liu, S Liu, S Qiu
Concurrency and Computation: Practice and Experience 31 (24), e4889, 2019
152019
Multi-party identity-based symmetric privacy-preserving matching with cloud storage
S Qiu, J Liu, Y Shi, Z Han
Wuhan University Journal of Natural Sciences 19 (5), 426-432, 2014
12014
Novel efficient lattice-based IBE schemes with CPK for fog computing
Y Shi, S Qiu, J Liu, T Ma
Mathematical Biosciences and Engineering 17 (6), 8105-8122, 2020
12020
PPSI: Practical private set intersection over large-scale datasets
S Qiu, Z Dai, D Zha, Z Zhang, Y Liu
2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced …, 2019
32019
Privmin: Differentially private minhash for jaccard similarity computation
Z Yan, J Liu, G Li, Z Han, S Qiu
arXiv preprint arXiv:1705.07258, 2017
92017
Public Data Integrity Checking for Cloud Storage with Privacy Preserving
H Yan, Z Zhang, S Qiu, H Qian, Z Bian, Y Liu
2019 IEEE 19th International Conference on Communication Technology (ICCT …, 2019
12019
Public Integrity Verification for Cloud Storage with Efficient Key-update
H Yan, Y Liu, D Huang, S Qiu, Z Zhang
Journal of Internet Technology 24 (6), 1263-1271, 2023
2023
PUF-based key distribution in wireless sensor networks
Z Zhang, Y Liu, Q Zuo, L Harn, S Qiu, Y Cheng
Computers, Materials & Continua 64 (2), 1261-1280, 2020
52020
The system can't perform the operation now. Try again later.
Articles 1–20