What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Jianting Ning
Google Scholar
40
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
RevokAll: Hardware-Assisted Revocable Data Sharing Framework for Full Data Traffic With Rapid Deployment in Cloud-Edge.
Shuaishuai Chang
Hui Ma
Jianting Ning
Yuzhe Li
Lin Su
Bo Li
Weiping Wang
2025
journals/tifs
Unveiling the Superiority of Unsupervised Learning on GPU Cryptojacking Detection: Practice on Magnetic Side Channel-Based Mechanism.
Hangcheng Cao
Guowen Xu
Ziyang He
Shaoqing Shi
Shengmin Xu
Cong Wu
Jianting Ning
2025
journals/tifs
TLARDA: Threshold Label-Aggregating Remote Data Auditing in Decentralized Environment.
Kuan Liu
Jianting Ning
Pengfei Wu
Shengmin Xu
Rongmao Chen
2025
conf/asiaccs
Infiltrated Selfish Mining: Think Win-Win to Escape Dilemmas.
Xuelian Cao
Zheng Yang
Tao Xiang
Jianting Ning
Yuhan Liu
Zhiming Liu
Jianying Zhou
2024
journals/istr
Designated server proxy re-encryption with boolean keyword search for E-Health Clouds.
Boli Hu
Kai Zhang
Junqing Gong
Lifei Wei
Jianting Ning
2024
journals/tifs
Communication-Efficient Privacy-Preserving Neural Network Inference via Arithmetic Secret Sharing.
Renwan Bi
Jinbo Xiong
Changqing Luo
Jianting Ning
Ximeng Liu
Youliang Tian
Yan Zhang
2024
journals/tifs
Dynamic Group Time-Based One-Time Passwords.
Xuelian Cao
Zheng Yang
Jianting Ning
Chenglu Jin
Rongxing Lu
Zhiming Liu
Jianying Zhou
2024
journals/tifs
Practical Searchable Symmetric Encryption for Arbitrary Boolean Query-Join in Cloud Storage.
Jiawen Wu
Kai Zhang
Lifei Wei
Junqing Gong
Jianting Ning
2024
journals/tifs
FACOS: Enabling Privacy Protection Through Fine-Grained Access Control With On-Chain and Off-Chain System.
Chao Liu
Cankun Hou
Tianyu Jiang
Jianting Ning
Hui Qiao
Yusen Wu
2024
journals/tifs
DTACB: Dynamic Threshold Anonymous Credentials With Batch-Showing.
Chen Li
Jianting Ning
Shengmin Xu
Chao Lin
Jiguo Li
Jian Shen
2024
journals/tifs
FIBNet: Privacy-Enhancing Approach for Face Biometrics Based on the Information Bottleneck Principle.
Zheyu Chen
Zhiqiang Yao
Biao Jin
Mingwei Lin
Jianting Ning
2023
journals/tifs
An Adaptively Secure and Efficient Data Sharing System for Dynamic User Groups in Cloud.
Guowen Xu
Shengmin Xu
Jinhua Ma
Jianting Ning
Xinyi Huang
2023
journals/tifs
Efficient Construction of Verifiable Timed Signatures and Its Application in Scalable Payments.
Xiaotong Zhou
Debiao He
Jianting Ning
Min Luo
Xinyi Huang
2023
journals/tifs
Secure Cloud-Assisted Data Pub/Sub Service With Fine-Grained Bilateral Access Control.
Kai Zhang
Xiwen Wang
Jianting Ning
Junqing Gong
Xinyi Huang
2023
journals/tifs
AADEC: Anonymous and Auditable Distributed Access Control for Edge Computing Services.
Xiaotong Zhou
Debiao He
Jianting Ning
Min Luo
Xinyi Huang
2023
journals/tifs
Dual-Server Boolean Data Retrieval for Highly-Scalable Secure File Sharing Services.
Kai Zhang
Xiwen Wang
Jianting Ning
Xinyi Huang
2023
conf/asiacrypt
Improved Fully Adaptive Decentralized MA-ABE for NC1 from MDDH.
Jie Chen
Qiaohan Chu
Ying Gao
Jianting Ning
Luping Wang
2022
journals/tifs
VILS: A Verifiable Image Licensing System.
Haixia Chen
Xinyi Huang
Jianting Ning
Futai Zhang
Chao Lin
2022
journals/tifs
Redactable Blockchain in Decentralized Setting.
Jinhua Ma
Shengmin Xu
Jianting Ning
Xinyi Huang
Robert H. Deng
2022
journals/tifs
Subversion-Resistant and Consistent Attribute-Based Keyword Search for Secure Cloud Storage.
Kai Zhang
Zhe Jiang
Jianting Ning
Xinyi Huang
2022
conf/esorics
VAL: Volume and Access Pattern Leakage-Abuse Attack with Leaked Documents.
Steven Lambregts
Huanhuan Chen
Jianting Ning
Kaitai Liang
2022
conf/ndss
Hybrid Trust Multi-party Computation with Trusted Execution Environment.
Pengfei Wu
Jianting Ning
Jiamin Shen
Hongbing Wang
Ee-Chien Chang
2021
journals/tifs
K-Time Modifiable and Epoch-Based Redactable Blockchain.
Shengmin Xu
Jianting Ning
Jinhua Ma
Xinyi Huang
Robert H. Deng
2021
journals/tifs
Server-Aided Bilateral Access Control for Secure Data Sharing With Dynamic User Groups.
Shengmin Xu
Jianting Ning
Xinyi Huang
Jianying Zhou
Robert H. Deng
2021
conf/ccs
LEAP: Leakage-Abuse Attack on Efficiently Deployable, Efficiently Searchable Encryption with Partially Known Dataset.
Jianting Ning
Xinyi Huang
Geong Sen Poh
Jiaming Yuan
Yingjiu Li
Jian Weng
Robert H. Deng
2021
conf/esorics
Revocable Policy-Based Chameleon Hash.
Shengmin Xu
Jianting Ning
Jinhua Ma
Guowen Xu
Jiaming Yuan
Robert H. Deng
2021
conf/asiacrypt
Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-Secure IBE.
Yi Wang
Rongmao Chen
Xinyi Huang
Jianting Ning
Baosheng Wang
Moti Yung
2021
conf/acsac
Group Time-based One-time Passwords and its Application to Efficient Privacy-Preserving Proof of Location.
Zheng Yang
Chenglu Jin
Jianting Ning
Zengpeng Li
Tien Tuan Anh Dinh
Jianying Zhou
2020
journals/compsec
Privacy preserving search services against online attack.
Yi Zhao
Jianting Ning
Kaitai Liang
Yanqi Zhao
Liqun Chen
Bo Yang
2020
conf/esorics
Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment.
Jianting Ning
Xinyi Huang
Geong Sen Poh
Shengmin Xu
Jia-Ch'ng Loh
Jian Weng
Robert H. Deng
2020
conf/acsac
Secure and Verifiable Inference in Deep Neural Networks.
Guowen Xu
Hongwei Li
Hao Ren
Jianfei Sun
Shengmin Xu
Jianting Ning
Haomiao Yang
Kan Yang
Robert H. Deng
2019
journals/tifs
Passive Attacks Against Searchable Encryption.
Jianting Ning
Jia Xu
Kaitai Liang
Fan Zhang
Ee-Chien Chang
2019
conf/ccs
PrivDPI: Privacy-Preserving Encrypted Traffic Inspection with Reusable Obfuscated Rules.
Jianting Ning
Geong Sen Poh
Jia-Ch'ng Loh
Jason Chia
Ee-Chien Chang
2019
conf/provsec
Secure Online/Offline Attribute-Based Encryption for IoT Users in Cloud Computing.
Xiang Li
Hui Tian
Jianting Ning
2018
journals/tifs
Auditable σ-Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing.
Jianting Ning
Zhenfu Cao
Xiaolei Dong
Kaitai Liang
Hui Ma
Lifei Wei
2017
conf/provsec
An Efficient Key-Policy Attribute-Based Searchable Encryption in Prime-Order Groups.
Ru Meng
Yanwei Zhou
Jianting Ning
Kaitai Liang
Jinguang Han
Willy Susilo
2016
conf/esorics
Traceable CP-ABE with Short Ciphertexts: How to Catch People Selling Decryption Devices on eBay Efficiently.
Jianting Ning
Zhenfu Cao
Xiaolei Dong
Junqing Gong
Jie Chen
2015
journals/tifs
White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes.
Jianting Ning
Xiaolei Dong
Zhenfu Cao
Lifei Wei
Xiaodong Lin
2015
conf/esorics
Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud.
Jianting Ning
Xiaolei Dong
Zhenfu Cao
Lifei Wei
2014
conf/esorics
Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability.
Jianting Ning
Zhenfu Cao
Xiaolei Dong
Lifei Wei
Xiaodong Lin
Coauthors
Baosheng Wang
(1)
Biao Jin
(1)
Bo Li
(1)
Bo Yang
(1)
Boli Hu
(1)
Cankun Hou
(1)
Changqing Luo
(1)
Chao Lin
(2)
Chao Liu
(1)
Chen Li
(1)
Chenglu Jin
(2)
Cong Wu
(1)
Debiao He
(2)
Ee-Chien Chang
(3)
Fan Zhang
(1)
Futai Zhang
(1)
Geong Sen Poh
(3)
Guowen Xu
(4)
Haixia Chen
(1)
Hangcheng Cao
(1)
Hao Ren
(1)
Haomiao Yang
(1)
Hongbing Wang
(1)
Hongwei Li
(1)
Huanhuan Chen
(1)
Hui Ma
(2)
Hui Qiao
(1)
Hui Tian
(1)
Jason Chia
(1)
Jia Xu
(1)
Jia-Ch'ng Loh
(2)
Jiamin Shen
(1)
Jiaming Yuan
(2)
Jian Shen
(1)
Jian Weng
(2)
Jianfei Sun
(1)
Jianting Ning
(40)
Jianying Zhou
(4)
Jiawen Wu
(1)
Jie Chen
(2)
Jiguo Li
(1)
Jinbo Xiong
(1)
Jinguang Han
(1)
Jinhua Ma
(4)
Junqing Gong
(4)
Kai Zhang
(5)
Kaitai Liang
(5)
Kan Yang
(1)
Kuan Liu
(1)
Lifei Wei
(6)
Lin Su
(1)
Liqun Chen
(1)
Luping Wang
(1)
Min Luo
(2)
Mingwei Lin
(1)
Moti Yung
(1)
Pengfei Wu
(2)
Qiaohan Chu
(1)
Renwan Bi
(1)
Robert H. Deng
(7)
Rongmao Chen
(2)
Rongxing Lu
(1)
Ru Meng
(1)
Shaoqing Shi
(1)
Shengmin Xu
(10)
Shuaishuai Chang
(1)
Steven Lambregts
(1)
Tao Xiang
(1)
Tianyu Jiang
(1)
Tien Tuan Anh Dinh
(1)
Weiping Wang
(1)
Willy Susilo
(1)
Xiang Li
(1)
Xiaodong Lin
(2)
Xiaolei Dong
(5)
Xiaotong Zhou
(2)
Ximeng Liu
(1)
Xinyi Huang
(13)
Xiwen Wang
(2)
Xuelian Cao
(2)
Yan Zhang
(1)
Yanqi Zhao
(1)
Yanwei Zhou
(1)
Yi Wang
(1)
Yi Zhao
(1)
Ying Gao
(1)
Yingjiu Li
(1)
Youliang Tian
(1)
Yuhan Liu
(1)
Yusen Wu
(1)
Yuzhe Li
(1)
Zengpeng Li
(1)
Zhe Jiang
(1)
Zhenfu Cao
(5)
Zheng Yang
(3)
Zheyu Chen
(1)
Zhiming Liu
(2)
Zhiqiang Yao
(1)
Ziyang He
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to