Personal information

No personal information available

Activities

Works (6)

NEMO: Practical Distributed Boolean Queries With Minimal Leakage

IEEE Transactions on Information Forensics and Security
2024 | Journal article
Contributors: Jianhao Li; Jiabei Wang; Rui Zhang; Yansen Xin; Wenhan Xu
Source: check_circle
Crossref

Gringotts: An Encrypted Version Control System With Less Trust on Servers

IEEE Transactions on Dependable and Secure Computing
2024-03 | Journal article
Contributors: Wenhan Xu; Hui Ma; Zishuai Song; Jianhao Li; Rui Zhang
Source: check_circle
Crossref

Everything Under Control: Secure Data Sharing Mechanism for Cloud-Edge Computing

IEEE Transactions on Information Forensics and Security
2023 | Journal article
Contributors: Zishuai Song; Hui Ma; Rui Zhang; Wenhan Xu; Jianhao Li
Source: check_circle
Crossref

Wolverine: A Scalable and Transaction-Consistent Redactable Permissionless Blockchain

IEEE Transactions on Information Forensics and Security
2023 | Journal article
Contributors: Jianhao Li; Hui Ma; Jiabei Wang; Zishuai Song; Wenhan Xu; Rui Zhang
Source: check_circle
Crossref

Owner-Enabled Secure Authorized Keyword Search Over Encrypted Data With Flexible Metadata

IEEE Transactions on Information Forensics and Security
2022 | Journal article
Contributors: Jiabei Wang; Rui Zhang; Jianhao Li; Yuting Xiao
Source: check_circle
Crossref

SeUpdate: Secure Encrypted Data Update for Multi-User Environments

IEEE Transactions on Dependable and Secure Computing
2022-11-01 | Journal article
Contributors: Jiabei Wang; Rui Zhang; Jianhao Li; Yuting Xiao; Hui Ma
Source: check_circle
Crossref