Skip to main content

previous disabled Page of 3
and
  1. Article

    Open Access

    Multiple time servers timed-release encryption based on Shamir secret sharing for EHR cloud system

    Electronic health record (EHR) cloud system, as a primary tool driving the informatization of medical data, have positively impacted both doctors and patients by providing accurate and complete patient informa...

    Ke Yuan, Ziwei Cheng, Keyan Chen, Bozhen Wang, Junyang Sun in Journal of Cloud Computing (2024)

  2. Article

    Open Access

    A multi-layer composite identification scheme of cryptographic algorithm based on hybrid random forest and logistic regression model

    Cryptographic technology can effectively defend against malicious attackers to attack sensitive and private information. The core of cryptographic technology is cryptographic algorithm, and the cryptographic a...

    Ke Yuan, Yabing Huang, Zhanfei Du, Jiabao Li, Chunfu Jia in Complex & Intelligent Systems (2024)

  3. Article

    Open Access

    Timed-release encryption anonymous interaction protocol based on smart contract

    Timed-release encryption (TRE) is a cryptographic primitive that can control the decryption time and has significant application value in time-sensitive scenarios. To solve the reliability issue of nodes in ex...

    Ke Yuan, Zilin Wang, Keyan Chen, Bingcai Zhou, Zheng Li in Journal of Cloud Computing (2024)

  4. Article

    Open Access

    A tamper-resistant timed secure data transmission protocol based on smart contract

    Many time-sensitive scenarios need to decrypt data at a specified time. The timed-release encryption (TRE) primitive can meet this requirement. However, in the single-time server TRE model, there is a single p...

    Ke Yuan, Haowen Cao, Suya Zhang, Chenxu Zhai, **aoyu Du, Chunfu Jia in Scientific Reports (2023)

  5. No Access

    Article

    A Block Cipher Algorithm Identification Scheme Based on Hybrid Random Forest and Logistic Regression Model

    Cryptographic algorithm identification is aimed to analyze the potential feature information in ciphertext data when the ciphertext is known, which belongs to the category of cryptanalysis. This paper takes bl...

    Ke Yuan, Yabing Huang, Jiabao Li, Chunfu Jia, Daoming Yu in Neural Processing Letters (2023)

  6. No Access

    Chapter and Conference Paper

    PII-PSM: A New Targeted Password Strength Meter Using Personally Identifiable Information

    In recent years, unending breaches of users’ personally identifiable information (PII) have become increasingly severe, making targeted password guessing using PII a practical threat. However, to our knowledge...

    Qiying Dong, Ding Wang, Yaosheng Shen in Security and Privacy in Communication Netw… (2023)

  7. No Access

    Article

    Towards Multi-user Searchable Encryption Scheme with Support for SQL Queries

    Due to the tremendous benefits of cloud computing, organizations are highly motivated to store electronic records on clouds. However, outsourcing data to cloud servers separates it from physical control, resul...

    Mingyue Li, Ruizhong Du, Chunfu Jia in Mobile Networks and Applications (2022)

  8. No Access

    Chapter and Conference Paper

    UP-MLE: Efficient and Practical Updatable Block-Level Message-Locked Encryption Scheme Based on Update Properties

    Deduplication is widely used to improve space efficiency in cloud storage. The Updatable block-level Message-Locked Encryption (UMLE) has been proposed to achieve efficient block-level updates for a deduplication...

    Shaoqiang Wu, Chunfu Jia, Ding Wang in ICT Systems Security and Privacy Protection (2022)

  9. No Access

    Chapter and Conference Paper

    Homomorphic Modular Reduction and Improved Bootstrap** for BGV Scheme

    Bootstrap** is a crucial subroutine of fully homomorphic encryption (FHE), where a homomorphic encryption scheme evaluates its own decryption circuits. Homomorphic modular reduction is a crucial part of boot...

    Ruiqi Li, Chunfu Jia in Information Security and Cryptology (2021)

  10. No Access

    Chapter and Conference Paper

    A Multi-user Shared Searchable Encryption Scheme Supporting SQL Query

    Due to the tremendous benefits of cloud computing, organizations are highly motivated to store electronic records on clouds. However, outsourcing data to cloud servers separates it from physical control, resul...

    Mingyue Li, Ruizhong Du, Chunfu Jia in Security and Privacy in New Computing Environments (2021)

  11. No Access

    Chapter and Conference Paper

    Security-Enhanced Timed-Release Encryption in the Random Oracle Model

    Timed-release encryption (TRE) is a cryptographic primitive that the sender specifies the future decryption time of the receiver. At present, most TRE schemes implement the control of decryption time based on ...

    Ke Yuan, Yahui Wang, Yingming Zeng in Security and Privacy in Social Networks an… (2020)

  12. No Access

    Chapter and Conference Paper

    Walls Have Ears: Eavesdrop** User Behaviors via Graphics-Interrupt-Based Side Channel

    Graphics Processing Units (GPUs) are now playing a vital role in many devices and systems including computing devices, data centers, and clouds, making them the next target of side-channel attacks. Unlike thos...

    Haoyu Ma, Jianwen Tian, Debin Gao, Chunfu Jia in Information Security (2020)

  13. No Access

    Chapter and Conference Paper

    Blockchain Based Multi-keyword Similarity Search Scheme over Encrypted Data

    Traditional searchable encryption schemes focus on preventing an honest-but-curious server. In practice, cloud servers may delete user data, perform partial queries and even falsify search results to save comp...

    Mingyue Li, Chunfu Jia, Wei Shao in Security and Privacy in Communication Networks (2020)

  14. No Access

    Chapter and Conference Paper

    Explaining Concept Drift of Deep Learning Models

    Deep learning has been widely used in many fields and has achieved excellent performance, especially in the field of malware detection. Since attackers constantly change malware to avoid being detected by mach...

    **aolu Wang, Zhi Wang, Wei Shao, Chunfu Jia, **ang Li in Cyberspace Safety and Security (2019)

  15. No Access

    Chapter and Conference Paper

    Effective L-Diversity Anonymization Algorithm Based on Improved Clustering

    Mass data has been collected and released everyday, at the same time, the published data contains a lot of sensitive information related to individuals. K-anonymity privacy preserving mechanisms can prevent t...

    Wantong Zheng, Yong Ma, Zhongyue Wang, Chunfu Jia in Cyberspace Safety and Security (2019)

  16. No Access

    Chapter and Conference Paper

    Password Guessing via Neural Language Modeling

    Passwords are the major part of authentication in current social networks. The state-of-the-art password guessing approaches, such as Markov model and probabilistic context-free grammars (PCFG) model, assign a...

    Hang Li, Mengqi Chen, Shengbo Yan, Chunfu Jia in Machine Learning for Cyber Security (2019)

  17. Chapter and Conference Paper

    DynOpVm: VM-Based Software Obfuscation with Dynamic Opcode Map**

    VM-based software obfuscation has emerged as an effective technique for program obfuscation. Despite various attempts in improving its effectiveness and security

    **aoyang Cheng, Yan Lin, Debin Gao, Chunfu Jia in Applied Cryptography and Network Security (2019)

  18. No Access

    Article

    Semantic-integrated software watermarking with tamper-proofing

    The existing works of software watermarking have the intrinsic defects: watermarking is independent of program semantics and have weak strength and resilience to state-of-the-art reverse engineering such as sy...

    Zhe Chen, Zhi Wang, Chunfu Jia in Multimedia Tools and Applications (2018)

  19. No Access

    Chapter and Conference Paper

    Harden Tamper-Proofing to Combat MATE Attack

    The malicious modification on software is a major threat on software copyright. As a common protection method, tamper-proofing can detect and respond the malicious modification. However, existing works conside...

    Zhe Chen, Chunfu Jia, Tongtong Lv, Tong Li in Algorithms and Architectures for Parallel … (2018)

  20. No Access

    Chapter and Conference Paper

    Identifying Bitcoin Users Using Deep Neural Network

    In Bitcoin user identification, an important challenge is to accurately link Bitcoin addresses to their owners. Previously, some heuristics based on transaction structural rules or observations were found and ...

    Wei Shao, Hang Li, Mengqi Chen, Chunfu Jia in Algorithms and Architectures for Parallel … (2018)

previous disabled Page of 3