Qingji Zheng
Qingji Zheng
Unknown affiliation
Verified email at
Cited by
Cited by
VABKS: Verifiable attribute-based keyword search over outsourced encrypted data
Q Zheng, S Xu, G Ateniese
IEEE INFOCOM 2014-IEEE conference on computer communications, 522-530, 2014
Fair and dynamic proofs of retrievability
Q Zheng, S Xu
Proceedings of the first ACM conference on Data and application security and …, 2011
Secure and efficient proof of storage with deduplication
Q Zheng, S Xu
Proceedings of the second ACM conference on Data and Application Security …, 2012
LIVE: Lightweight integrity verification and content access control for named data networking
Q Li, X Zhang, Q Zheng, R Sandhu, X Fu
IEEE Transactions on Information Forensics and Security 10 (2), 308-320, 2014
Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation
Y Shi, Q Zheng, J Liu, Z Han
Information Sciences 295, 221-231, 2015
Method and system for secure multiparty cloud computation
X Zhang, Q Zheng, A Kalker, G Wang
US Patent 9,252,942, 2016
Verifiable Delegated Set Intersection Operations on Outsourced Encrypted Data.
Q Zheng, S Xu
2015 IEEE International Conference on Cloud Engineering 2015, 175-184, 2015
Efficient query integrity for outsourced dynamic databases
Q Zheng, S Xu, G Ateniese
Proceedings of the 2012 ACM Workshop on Cloud computing security workshop, 71-82, 2012
RSPP: A reliable, searchable and privacy-preserving e-healthcare system for cloud-assisted body area networks
L Yang, Q Zheng, X Fan
IEEE INFOCOM 2017-IEEE conference on computer communications, 1-9, 2017
CLKS: Certificateless keyword search on encrypted data
Q Zheng, X Li, A Azgin
Network and System Security: 9th International Conference, NSS 2015, New …, 2015
Attribute-based proxy re-encryption with keyword search
Y Shi, J Liu, Z Han, Q Zheng, R Zhang, S Qiu
PloS one 9 (12), e116325, 2014
Achieving secure and scalable data access control in information-centric networking
Q Zheng, G Wang, R Ravindran, A Azgin
2015 IEEE International Conference on Communications (ICC), 5367-5373, 2015
IoT middleware architecture over information-centric network
S Li, Y Zhang, D Raychaudhuri, R Ravindran, Q Zheng, L Dong, G Wang
2015 IEEE Globecom Workshops (GC Wkshps), 1-7, 2015
Federated cloud security architecture for secure and agile clouds
W Luo, L Xu, Z Zhan, Q Zheng, S Xu
High performance cloud auditing and applications, 169-188, 2014
Multi-processor architectural support for protecting virtual machine privacy in untrusted cloud environment
Y Wen, JH Lee, Z Liu, Q Zheng, W Shi, S Xu, T Suh
Proceedings of the ACM International Conference on Computing Frontiers, 1-10, 2013
Method for faster secure multiparty inner product computation with SPDZ
FAN Xinxin, Q Zheng, JG Merchan
US Patent 11,323,444, 2022
Architectural protection of application privacy against software and physical attacks in untrusted cloud environment
L Xu, JH Lee, SH Kim, Q Zheng, S Xu, T Suh, WW Ro, W Shi
IEEE Transactions on Cloud Computing 6 (2), 478-491, 2015
Method for faster secure multiparty inner product with SPDZ
FAN Xinxin, Q Zheng, JG Merchan
US Patent 11,606,203, 2023
Improved anonymous proxy re-encryption with CCA security
Q Zheng, W Zhu, J Zhu, X Zhang
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
Cloudsafe: Securing data processing within vulnerable virtualization environments in the cloud
H Xiong, Q Zheng, X Zhang, D Yao
2013 IEEE Conference on Communications and Network Security (CNS), 172-180, 2013
The system can't perform the operation now. Try again later.
Articles 1–20