What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Jianfeng Wang
Google Scholar
ORCID:
0000-0001-5297-0293
17
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/asiaccs
Fair Server-Aided Multiparty Private Set Intersection from OKVS and OPRF.
Fei Xiao
Chunyang Lv
Jianfeng Wang
2024
journals/istr
Self-sovereign identity management in ciphertext policy attribute based encryption for IoT protocols.
Weichu Deng
Jin Li
Hongyang Yan
Arthur Sandor Voundi Koe
Teng Huang
Jianfeng Wang
Cong Peng
2024
conf/ccs
Scalable Equi-Join Queries over Encrypted Database.
Kai Du
Jianfeng Wang
Jiaojiao Wu
Yunling Wang
2024
conf/ccs
Practical Non-interactive Encrypted Conjunctive Search with Leakage Suppression.
Yunling Wang
Shi-Feng Sun
Jianfeng Wang
Xiaofeng Chen
Joseph K. Liu
Dawu Gu
2024
conf/sec
Xproofs: New Aggregatable and Maintainable Matrix Commitment with Optimal Proof Size.
Xinwei Yong
Jiaojiao Wu
Jianfeng Wang
2024
conf/provsec
Compressed Cookies: Practical Wildcard Symmetric Searchable Encryption with Optimized Storage.
Jiaojiao Wu
Kai Du
Jianfeng Wang
Shi-Feng Sun
Yunling Wang
Yong Li
Wenyuan Tian
Yusen Wang
2022
journals/tifs
Rphx: Result Pattern Hiding Conjunctive Query Over Private Compressed Index Using Intel SGX.
Qin Jiang
Ee-Chien Chang
Yong Qi
Saiyu Qi
Pengfei Wu
Jianfeng Wang
2022
conf/ccs
Practical Volume-Hiding Encrypted Multi-Maps with Optimal Overhead and Beyond.
Jianfeng Wang
Shifeng Sun
Tianci Li
Saiyu Qi
Xiaofeng Chen
2022
conf/sec
Efficient Volume-Hiding Encrypted Multi-Maps with Support for Conjunctive Queries.
Tianci Li
Jiaojiao Wu
Jianfeng Wang
2022
conf/acns
Efficient Verifiable Boolean Range Query for Light Clients on Blockchain Database.
Jianpeng Gong
Jiaojiao Wu
Jianfeng Wang
Shichong Tan
2022
conf/esorics
New Unbounded Verifiable Data Streaming for Batch Query with Almost Optimal Overhead.
Jiaojiao Wu
Jianfeng Wang
Xinwei Yong
Xinyi Huang
Xiaofeng Chen
2021
conf/esorics
Efficient Multi-client Order-Revealing Encryption and Its Applications.
Chunyang Lv
Jianfeng Wang
Shifeng Sun
Yunling Wang
Saiyu Qi
Xiaofeng Chen
2019
conf/esorics
Towards Efficient Verifiable Forward Secure Searchable Symmetric Encryption.
Zhongjun Zhang
Jianfeng Wang
Yunling Wang
Yaping Su
Xiaofeng Chen
2019
conf/esorics
Forward-Secure Puncturable Identity-Based Encryption for Securing Cloud Emails.
Jianghong Wei
Xiaofeng Chen
Jianfeng Wang
Xuexian Hu
Jianfeng Ma
2018
conf/esorics
Towards Efficient Verifiable Conjunctive Keyword Search for Large Encrypted Database.
Jianfeng Wang
Xiaofeng Chen
Shifeng Sun
Joseph K. Liu
Man Ho Au
Zhi-Hui Zhan
2018
conf/icics
Publicly Verifiable Data Transfer and Deletion Scheme for Cloud Storage.
Changsong Yang
Jianfeng Wang
Xiaoling Tao
Xiaofeng Chen
2017
conf/provsec
Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption.
Yunling Wang
Jianfeng Wang
Shifeng Sun
Joseph K. Liu
Willy Susilo
Xiaofeng Chen
Coauthors
Arthur Sandor Voundi Koe
(1)
Changsong Yang
(1)
Chunyang Lv
(2)
Cong Peng
(1)
Dawu Gu
(1)
Ee-Chien Chang
(1)
Fei Xiao
(1)
Hongyang Yan
(1)
Jianfeng Ma
(1)
Jianfeng Wang
(17)
Jianghong Wei
(1)
Jianpeng Gong
(1)
Jiaojiao Wu
(6)
Jin Li
(1)
Joseph K. Liu
(3)
Kai Du
(2)
Man Ho Au
(1)
Pengfei Wu
(1)
Qin Jiang
(1)
Saiyu Qi
(3)
Shi-Feng Sun
(2)
Shichong Tan
(1)
Shifeng Sun
(4)
Teng Huang
(1)
Tianci Li
(2)
Weichu Deng
(1)
Wenyuan Tian
(1)
Willy Susilo
(1)
Xiaofeng Chen
(9)
Xiaoling Tao
(1)
Xinwei Yong
(2)
Xinyi Huang
(1)
Xuexian Hu
(1)
Yaping Su
(1)
Yong Li
(1)
Yong Qi
(1)
Yunling Wang
(6)
Yusen Wang
(1)
Zhi-Hui Zhan
(1)
Zhongjun Zhang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to