​
Login / Signup
Jiaoli Shi
ORCID
Publication Activity (10 Years)
Years Active: 2014-2024
Publications (10 Years): 16
Top Topics
Bloom Filter
Lightweight
Access Control
Cloud Storage
Top Venues
Secur. Commun. Networks
ICPADS
ICA3PP (3)
Int. J. Web Serv. Res.
</>
Publications
</>
Zhuolin Mei
,
Huilai Zou
,
Jinzhou Huang
,
Caicai Zhang
,
Bin Wu
,
Jiaoli Shi
,
Zhengxiang Cheng
A Secure and Fast Range Query Scheme for Encrypted Multi-Dimensional Data.
Int. J. Web Serv. Res.
21 (1) (2024)
Zhuolin Mei
,
Jing Yu
,
Caicai Zhang
,
Bin Wu
,
Shimao Yao
,
Jiaoli Shi
,
Zongda Wu
Secure multi-dimensional data retrieval with access control and range query in the cloud.
Inf. Syst.
122 (2024)
Han Wang
,
Hui Li
,
Zixian Wang
,
Feng Zhao
,
Yao Yao
,
Yuhong Chen
,
Tuanfa Qin
,
Ping Lu
,
Jiaoli Shi
Optimizing Read Performance in Lightweight Blockchain with Cooperative Storage Scheme.
BCCA
(2023)
Jiaoli Shi
,
Chao Hu
,
Shimao Yao
,
Zhuolin Mei
,
Bin Wu
,
Hui Li
A Lightening Fine-grained Access Control Scheme Supporting Full Policy Hiding in Cloud Storage.
ICPADS
(2023)
Zhengxiang Cheng
,
Weixuan Mao
,
Ruwang Wen
,
Zhuolin Mei
,
Bin Wu
,
Jiaoli Shi
,
Xiao Cheng
Secure and Fast Query Approach for High-Precision Multi-dimensional Satellite Remote Sensing Data.
EDGE
(2023)
Ruwang Wen
,
Zhengxiang Cheng
,
Weixuan Mao
,
Zhuolin Mei
,
Jiaoli Shi
,
Xiao Cheng
HMGR: A Hybrid Model for Geolocation Recommendation.
BigData
(2023)
Shimao Yao
,
Ralph Voltaire J. Dayot
,
In-Ho Ra
,
Liya Xu
,
Zhuolin Mei
,
Jiaoli Shi
An Identity-Based Proxy Re-Encryption Scheme With Single-Hop Conditional Delegation and Multi-Hop Ciphertext Evolution for Secure Cloud Data Sharing.
IEEE Trans. Inf. Forensics Secur.
18 (2023)
Chao Luo
,
Jiaoli Shi
,
Minchen Xie
,
Chao Hu
,
Lihua Wang
,
Zhuolin Mei
,
Shimao Yao
,
Hui Li
A Lightweight Access Control Scheme Supporting Policy Hidden Based on Path Bloom Filter.
Inscrypt (1)
(2023)
Liya Xu
,
Mingzhu Ge
,
Anyuan Deng
,
Jiaoli Shi
,
Shimao Yao
An Emergency Information Broadcast Routing in VANET.
WiCON
(2022)
Xieyang Shen
,
Chuanhe Huang
,
Xiajiong Shen
,
Jiaoli Shi
,
Danxin Wang
A Collusion-Resistant Blockchain-Enabled Data Sharing Scheme with Decryption Outsourcing under Time Restriction.
Secur. Commun. Networks
2021 (2021)
Kai He
,
Chunxiao Huang
,
Jiaoli Shi
,
Xinrong Hu
,
Xiying Fan
Enabling Decentralized and Dynamic Data Integrity Verification for Secure Cloud Storage via T-Merkle Hash Tree Based Blockchain.
Mob. Inf. Syst.
2021 (2021)
Anyuan Deng
,
Jiaoli Shi
,
Kai He
,
Fang Xu
IM-ACS: An Access Control Scheme Supporting Informal Non-malleable Security in Mobile Media Sharing System.
ICA3PP (3)
(2020)
Kai He
,
Jiaoli Shi
,
Chunxiao Huang
,
Xinrong Hu
Blockchain Based Data Integrity Verification for Cloud Storage with T-Merkle Tree.
ICA3PP (3)
(2020)
Jiaoli Shi
,
Chuanhe Huang
,
Jing Wang
,
Kai He
,
Xieyang Shen
An access control scheme with dynamic user management and cloud-aided decryption.
Secur. Commun. Networks
9 (18) (2016)
Kai He
,
Chuanhe Huang
,
Zongpeng Li
,
Aiwu Shi
,
Jiaoli Shi
An Online Auction for Deadline-Aware Dynamic Cloud Resource Provisioning.
ICPADS
(2016)
Kai He
,
Chuanhe Huang
,
Jiaoli Shi
,
Jinhai Wang
Public integrity auditing for dynamic regenerating code based cloud storage.
ISCC
(2016)
Kai He
,
Chuanhe Huang
,
Kan Yang
,
Jiaoli Shi
Identity-preserving public auditing for shared cloud data.
IWQoS
(2015)
Jiaoli Shi
,
Chuanhe Huang
,
Jing Wang
,
Kai He
,
Jinhai Wang
An Access Control Scheme with Direct Cloud-Aided Attribute Revocation Using Version Key.
ICA3PP (1)
(2014)