Qingji Zheng
Qingji Zheng
Unknown affiliation
Verified email at my.utsa.edu
Cited by
Cited by
VABKS: verifiable attribute-based keyword search over outsourced encrypted data
Q Zheng, S Xu, G Ateniese
IEEE INFOCOM 2014-IEEE conference on computer communications, 522-530, 2014
Fair and dynamic proofs of retrievability
Q Zheng, S Xu
Proceedings of the first ACM conference on Data and application security and …, 2011
Secure and efficient proof of storage with deduplication
Q Zheng, S Xu
Proceedings of the second ACM conference on Data and Application Security …, 2012
Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation
Y Shi, Q Zheng, J Liu, Z Han
Information Sciences 295, 221-231, 2015
LIVE: Lightweight integrity verification and content access control for named data networking
Q Li, X Zhang, Q Zheng, R Sandhu, X Fu
IEEE Transactions on Information Forensics and Security 10 (2), 308-320, 2014
Efficient query integrity for outsourced dynamic databases
Q Zheng, S Xu, G Ateniese
Proceedings of the 2012 ACM Workshop on Cloud computing security workshop, 71-82, 2012
Verifiable Delegated Set Intersection Operations on Outsourced Encrypted Data.
Q Zheng, S Xu
2015 IEEE International Conference on Cloud Engineering 2015, 175-184, 2015
Method and system for secure multiparty cloud computation
X Zhang, Q Zheng, A Kalker, G Wang
US Patent 9,252,942, 2016
Attribute-based proxy re-encryption with keyword search
Y Shi, J Liu, Z Han, Q Zheng, R Zhang, S Qiu
PloS one 9 (12), e116325, 2014
CLKS: Certificateless keyword search on encrypted data
Q Zheng, X Li, A Azgin
International Conference on Network and System Security, 239-253, 2015
RSPP: A reliable, searchable and privacy-preserving e-healthcare system for cloud-assisted body area networks
L Yang, Q Zheng, X Fan
IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017
IoT middleware architecture over information-centric network
S Li, Y Zhang, D Raychaudhuri, R Ravindran, Q Zheng, L Dong, G Wang
2015 IEEE Globecom Workshops (GC Wkshps), 1-7, 2015
Federated cloud security architecture for secure and agile clouds
W Luo, L Xu, Z Zhan, Q Zheng, S Xu
High performance cloud auditing and applications, 169-188, 2014
Achieving secure and scalable data access control in information-centric networking
Q Zheng, G Wang, R Ravindran, A Azgin
2015 IEEE International Conference on Communications (ICC), 5367-5373, 2015
Multi-processor architectural support for protecting virtual machine privacy in untrusted cloud environment
Y Wen, JH Lee, Z Liu, Q Zheng, W Shi, S Xu, T Suh
Proceedings of the ACM International Conference on Computing Frontiers, 1-10, 2013
Improved anonymous proxy re-encryption with CCA security
Q Zheng, W Zhu, J Zhu, X Zhang
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
Spongy moldings comprising water-soluble polymeric material and method of controlling pores thereof
T Sugie, H Yanagawa, Y Baba
US Patent App. 10/181,949, 2003
Toward optimizing cauchy matrix for cauchy reed-solomon code
X Li, Q Zheng, H Qian, D Zheng, J Li
IEEE communications letters 13 (8), 603-605, 2009
Cloudsafe: Securing data processing within vulnerable virtualization environments in the cloud
H Xiong, Q Zheng, X Zhang, D Yao
2013 IEEE Conference on Communications and Network Security (CNS), 172-180, 2013
Secure content sharing using content centric approach
SO Amin, R Ravindran, Q Zheng
US Patent App. 14/991,303, 2017
The system can't perform the operation now. Try again later.
Articles 1–20