default search action
Han Jiang 0001
Person information
- affiliation: Shandong University, Jinan, China
Other persons with the same name
- Han Jiang — disambiguation page
- Han Jiang 0002 — University of Michigan, Ann Arbor, MI, USA
- Han Jiang 0003 — Beihang University, Hefei, China
- Han Jiang 0004 — The OpenBayes (Tianjin) IT Co., Ltd., Tianjin, China
- Han Jiang 0005 — East China University of Science and Technology, Shanghai, China (and 1 more)
- Han Jiang 0006 — Tianjin University, Tianjin, China
- Han Jiang 0007 — Tongji University, Shanghai, China
- Han Jiang 0008 — Tufts University, Medford, MA, USA
- Han Jiang 0009 — Worcester Polytechnic Institute, Worcester, MA, USA
- Han Jiang 0010 — Global Energy Interconnection Development and Cooperation Organization, Beijing, China
- Han Jiang 0011 — PLA Army Engineering University, Nanjing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Han Jiang, Qiuliang Xu, Changyuan Liu, Zhihua Zheng, Yi Tang, Mingqiang Wang:
Cut-and-choose bilateral oblivious transfer protocol based on DDH assumption. J. Ambient Intell. Humaniz. Comput. 15(2): 1327-1337 (2024) - 2022
- [j19]Pingyuan Zhang, Han Jiang, Zhihua Zheng, Hao Wang, Qiuliang Xu:
A New and Efficient Lattice-Based Online/Offline Signature From Perspective of Abort. Comput. J. 65(9): 2400-2410 (2022) - [j18]Shengnan Zhao, Qi Zhao, Chuan Zhao, Han Jiang, Qiuliang Xu:
Privacy-enhancing machine learning framework with private aggregation of teacher ensembles. Int. J. Intell. Syst. 37(11): 9904-9920 (2022) - [j17]Yiran Liu, Ye Dong, Hao Wang, Han Jiang, Qiuliang Xu:
Distributed Fog Computing and Federated-Learning-Enabled Secure Aggregation for IoT Devices. IEEE Internet Things J. 9(21): 21025-21037 (2022) - 2021
- [j16]Hang-chao Ding, Han Jiang, Qiuliang Xu:
Postquantum Cut-and-Choose Oblivious Transfer Protocol Based on LWE. Secur. Commun. Networks 2021: 9974604:1-9974604:15 (2021) - [c17]Shengnan Zhao, Ming Ma, Xiangfu Song, Han Jiang, Yunxue Yan, Qiuliang Xu:
Lightweight Threshold Private Set Intersection via Oblivious Transfer. WASA (3) 2021: 108-116 - 2020
- [j15]Hang-chao Ding, Han Jiang, Qiuliang Xu:
Post-Quantum Universal Composable OT Based on Key Exchange. IEEE Access 8: 148445-148459 (2020) - [j14]Shengnan Zhao, Xiangfu Song, Han Jiang, Ming Ma, Zhihua Zheng, Qiuliang Xu:
An Efficient Outsourced Oblivious Transfer Extension Protocol and Its Applications. Secur. Commun. Networks 2020: 8847487:1-8847487:12 (2020) - [j13]Jie Cai, Han Jiang, Hao Wang, Qiuliang Xu:
Lattice-Based Linearly Homomorphic Signature Scheme over F 2. Secur. Commun. Networks 2020: 8857815:1-8857815:7 (2020) - [c16]Xiangfu Song, Dong Yin, Han Jiang, Qiuliang Xu:
Searchable Symmetric Encryption with Tunable Leakage Using Multiple Servers. DASFAA (1) 2020: 157-177
2010 – 2019
- 2019
- [j12]Jie Cai, Han Jiang, Pingyuan Zhang, Zhihua Zheng, Guangshi Lyu, Qiuliang Xu:
An Efficient Strong Designated Verifier Signature Based on ℛ-SIS Assumption. IEEE Access 7: 3938-3947 (2019) - [j11]Yiran Liu, Junming Ke, Qiuliang Xu, Han Jiang, Hao Wang:
Decentralization is Vulnerable Under the Gap Game. IEEE Access 7: 90999-91008 (2019) - [j10]Han Jiang, Hao Wang, Zhihua Zheng, Qiuliang Xu:
Privacy preserved wireless sensor location protocols based on mobile edge computing. Comput. Secur. 84: 393-401 (2019) - [j9]Zhen Li, Minghao Zhao, Han Jiang, Qiuliang Xu:
Keyword guessing on multi-user searchable encryption. Int. J. High Perform. Comput. Netw. 14(1): 60-68 (2019) - [j8]Jie Cai, Han Jiang, Pingyuan Zhang, Zhihua Zheng, Hao Wang, Guangshi Lü, Qiuliang Xu:
ID-Based Strong Designated Verifier Signature over ℛ-SIS Assumption. Secur. Commun. Networks 2019: 9678095:1-9678095:8 (2019) - [c15]Hang-chao Ding, Han Jiang, Jie Cai, Chen-guang Wang, Jing Zou, Qiuliang Xu:
Research on Key Exchange Protocol Based on LWE. CIS 2019: 236-240 - 2018
- [j7]Pingyuan Zhang, Han Jiang, Zhihua Zheng, Peichu Hu, Qiuliang Xu:
A New Post-Quantum Blind Signature From Lattice Assumptions. IEEE Access 6: 27251-27258 (2018) - [j6]Minghao Zhao, Han Jiang, Zhen Li, Qiuliang Xu, Hao Wang, Shaojing Li:
An efficient symmetric searchable encryption scheme for dynamic dataset in cloud computing paradigms. Int. J. High Perform. Comput. Netw. 12(2): 179-190 (2018) - [j5]Dandan Yuan, Xiangfu Song, Qiuliang Xu, Minghao Zhao, Xiaochao Wei, Hao Wang, Han Jiang:
An ORAM-based privacy preserving data sharing scheme for cloud storage. J. Inf. Secur. Appl. 39: 1-9 (2018) - [c14]Junming Ke, Han Jiang, Xiangfu Song, Shengnan Zhao, Hao Wang, Qiuliang Xu:
Analysis on the Block Reward of Fork After Withholding (FAW). NSS 2018: 16-31 - [c13]Xiaoyan Yang, Han Jiang, Mengbo Hou, Zhihua Zheng, Qiuliang Xu, Kim-Kwang Raymond Choo:
A Provably-Secure Two-Factor Authenticated Key Exchange Protocol with Stronger Anonymity. NSS 2018: 111-124 - [c12]Jie Cai, Han Jiang, Qiuliang Xu, Guangshi Lv, Minghao Zhao, Hao Wang:
Towards Security Authentication for IoT Devices with Lattice-Based ZK. NSS 2018: 141-150 - 2017
- [j4]Zhen Li, Minghao Zhao, Han Jiang, Qiuliang Xu:
Multi-user searchable encryption with a designated server. Ann. des Télécommunications 72(9-10): 617-629 (2017) - [c11]Han Jiang, Qiuliang Xu, Changyuan Liu, Zhe Liu:
An Efficient CPA-Secure Encryption Scheme with Equality Test. CSE/EUC (2) 2017: 38-45 - 2016
- [j3]Han Jiang, Xue Li, Qiuliang Xu:
An Improvement to a Multi-Client Searchable Encryption Scheme for Boolean Queries. J. Medical Syst. 40(12): 255:1-255:11 (2016) - [c10]Zhen Li, Minghao Zhao, Han Jiang, Qiuliang Xu:
Data Sharing with Fine-Grained Access Control for Multi-tenancy Cloud Storage System. CloudComp 2016: 123-132 - [c9]Xiaochao Wei, Chuan Zhao, Han Jiang, Qiuliang Xu, Hao Wang:
Practical Server-Aided k-out-of-n Oblivious Transfer Protocol. GPC 2016: 261-277 - [c8]Xiaochao Wei, Han Jiang, Chuan Zhao, Minghao Zhao, Qiuliang Xu:
Fast Cut-and-Choose Bilateral Oblivious Transfer for Malicious Adversaries. Trustcom/BigDataSE/ISPA 2016: 418-425 - [c7]Xiaoyan Yang, Han Jiang, Qiuliang Xu, Mengbo Hou, Xiaochao Wei, Minghao Zhao, Kim-Kwang Raymond Choo:
A Provably-Secure and Efficient Verifier-Based Anonymous Password-Authenticated Key Exchange Protocol. Trustcom/BigDataSE/ISPA 2016: 670-677 - 2015
- [j2]Chuan Zhao, Han Jiang, Qiuliang Xu, Xiaochao Wei, Hao Wang:
Several Oblivious Transfer Variants in Cut-and-Choose Scenario. Int. J. Inf. Secur. Priv. 9(2): 1-12 (2015) - [c6]Shufeng Li, Minghao Zhao, Han Jiang, Qiuliang Xu, Xiaochao Wei:
Efficient ORAM Based on Binary Tree without Data Overflow and Evictions. ISICA 2015: 596-607 - [c5]Chuan Zhao, Han Jiang, Xiaochao Wei, Qiuliang Xu, Minghao Zhao:
Cut-and-Choose Bilateral Oblivious Transfer and Its Application. TrustCom/BigDataSE/ISPA (1) 2015: 384-391 - 2014
- [i1]Han Jiang, Xiaochao Wei, Chuan Zhao, Qiuliang Xu:
Cut-and-Choose Bilateral Oblivious Transfer and Its Application in Secure Two-party Computation. IACR Cryptol. ePrint Arch. 2014: 768 (2014) - 2011
- [c4]Qing Dai, Xiufeng Zhao, Qiuliang Xu, Han Jiang:
A New Cross-realm Group Password-based Authenticated Key Exchange Protocol. CIS 2011: 856-860 - [c3]Hao Wang, Qiuliang Xu, Han Jiang, Rui Li:
Attribute-Based Authenticated Key Exchange Protocol with General Relations. CIS 2011: 900-904 - 2010
- [j1]Mengbo Hou, Qiuliang Xu, Shanqing Guo, Han Jiang:
Cryptanalysis on Identity-based Authenticated Key Agreement Protocols from Pairings. J. Networks 5(7): 855-862 (2010) - [c2]Han Jiang, Qiuliang Xu, Chenghui Zhang:
Convertible Perfect Concurrent Signature Protocol. CIS 2010: 352-356 - [c1]Hao Wang, Qiuliang Xu, Han Jiang, Xiufeng Zhao:
A Fully Anonymous Identity-Based Signcryption Scheme in the Standard Model. CIS 2010: 372-376
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 20:13 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint