default search action
Jia Xu 0006
Person information
- affiliation: NUS-Singtel Cyber Security Research and Development Laboratory, Singapore
- affiliation (2012 - 2017): Institute for Infocomm Research, Singapore
- affiliation (PhD 2012): National University of Singapore, School of Computing, Singapore
Other persons with the same name
- Jia Xu (aka: Xu Jia) — disambiguation page
- Jia Xu 0001 — Beijing Institute of Technology, School of Information and Electronics, Beijing Key Laboratory of Embedded Real-Time Information Processing Technology, China (and 3 more)
- Jia Xu 0002 — East China Jiaotong University, School of Mechatronic Engineering, Nanchang, China
- Jia Xu 0003 — Nanjing University of Posts and Telecommunications, School of Computer Science and Engineering, China
- Jia Xu 0004 — Stevens Institute of Technology, Hoboken, NJ, USA (and 3 more)
- Jia Xu 0005 — Guangxi University, College of Computer Science and Engineering, Nanning, China (and 1 more)
- Jia Xu 0007 — Delft University of Technology, Delft Center for Systems and Control, The Netherlands
- Jia Xu 0008 — Beijing Normal University, Faculty of Geographical Science, State Key Laboratory of Remote Sensing Science, China
- Jia Xu 0009 — Army Medical University, College of Biomedical Engineering, Chongqing, China
- Jia Xu 0010 — Anhui University, School of Computer Science and Technology, Hefei, China
- Jia Xu 0011 — Huya AI, Guangzhou, Guangdong, China (and 2 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j10]Muhammad Naveed Aman, Mohamed Haroon Basheer, Jun Wen Wong, Jia Xu, Hoon Wei Lim, Biplab Sikdar:
Machine-Learning-Based Attestation for the Internet of Things Using Memory Traces. IEEE Internet Things J. 9(20): 20431-20443 (2022) - [j9]Muhammad Naveed Aman, Mohamed Haroon Basheer, Siddhant Dash, Ashutosh Sancheti, Jun Wen Wong, Jia Xu, Hoon Wei Lim, Biplab Sikdar:
PRoM: Passive Remote Attestation Against Roving Malware in Multicore IoT Devices. IEEE Syst. J. 16(1): 789-800 (2022) - [j8]Yiwen Gao, Jia Xu, Hongbing Wang:
cuNH: Efficient GPU Implementations of Post-Quantum KEM NewHope. IEEE Trans. Parallel Distributed Syst. 33(3): 551-568 (2022) - [c16]Jason H. M. Ying, Shuwei Cao, Geong Sen Poh, Jia Xu, Hoon Wei Lim:
PSI-Stats: Private Set Intersection Protocols Supporting Secure Statistical Functions. ACNS 2022: 585-604 - 2021
- [j7]Jia Xu, Jianying Zhou:
Strong leakage-resilient encryption: enhancing data confidentiality by hiding partial ciphertext. Int. J. Inf. Sec. 20(2): 141-159 (2021) - [j6]Anjia Yang, Jia Xu, Jian Weng, Jianying Zhou, Duncan S. Wong:
Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage. IEEE Trans. Cloud Comput. 9(1): 212-225 (2021) - [i14]Jia Xu, Yiwen Gao, Hoon Wei Lim, Hongbing Wang, Ee-Chien Chang:
Stateful KEM: Towards Optimal Robust Combiner for Key Encapsulation Mechanism. IACR Cryptol. ePrint Arch. 2021: 989 (2021) - 2020
- [j5]Muhammad Naveed Aman, Mohamed Haroon Basheer, Siddhant Dash, Jun Wen Wong, Jia Xu, Hoon Wei Lim, Biplab Sikdar:
HAtt: Hybrid Remote Attestation for the Internet of Things With High Availability. IEEE Internet Things J. 7(8): 7220-7233 (2020) - [j4]Hoon Wei Lim, Geong Sen Poh, Jia Xu, Varsha Chittawar:
PrivateLink: Privacy-Preserving Integration and Sharing of Datasets. IEEE Trans. Inf. Forensics Secur. 15: 564-577 (2020) - [i13]Jason H. M. Ying, Shuwei Cao, Geong Sen Poh, Jia Xu, Hoon Wei Lim:
PSI-Stats: Private Set Intersection Protocols Supporting Secure Statistical Functions. IACR Cryptol. ePrint Arch. 2020: 623 (2020) - [i12]Jia Xu, Yiwen Gao, Hoon Wei Lim:
Practical Quantum-Safe Stateful Hybrid Key Exchange Protocol. IACR Cryptol. ePrint Arch. 2020: 763 (2020) - [i11]Jia-Ch'ng Loh, Geong Sen Poh, Jason H. M. Ying, Jia Xu, Hoon Wei Lim, Jonathan Pan, Weiyang Wong:
PBio: Enabling Cross-organizational Biometric Authentication Service through Secure Sharing of Biometric Templates. IACR Cryptol. ePrint Arch. 2020: 1381 (2020)
2010 – 2019
- 2019
- [j3]Jianting Ning, Jia Xu, Kaitai Liang, Fan Zhang, Ee-Chien Chang:
Passive Attacks Against Searchable Encryption. IEEE Trans. Inf. Forensics Secur. 14(3): 789-802 (2019) - [c15]Jia Xu, Jianying Zhou:
Strong Leakage Resilient Encryption by Hiding Partial Ciphertext. ACNS Workshops 2019: 172-191 - [c14]Ashish Dandekar, Debabrota Basu, Thomas Kister, Geong Sen Poh, Jia Xu, Stéphane Bressan:
Privacy as a Service: Publishing Data and Models. DASFAA (3) 2019: 557-561 - 2018
- [c13]Jia Xu, Jianying Zhou:
Virtually Isolated Network: A Hybrid Network to Achieve High Level Security. DBSec 2018: 299-311 - [i10]Jia Xu, Jianying Zhou:
Strong Leakage Resilient Encryption by Hiding Partial Ciphertext. IACR Cryptol. ePrint Arch. 2018: 846 (2018) - 2017
- [c12]Jia Xu, Ee-Chien Chang, Jianying Zhou:
A New Functional Encryption for Multidimensional Range Query (Short Paper). ISPEC 2017: 361-372 - [i9]Jia Xu, Ee-Chien Chang, Jianying Zhou:
A New Functional Encryption for Multidimensional Range Query. IACR Cryptol. ePrint Arch. 2017: 970 (2017) - 2016
- [c11]Dong Li, Huaqun Guo, Jia Xu:
Enhancing TPM Security by Integrating SRAM PUFs Technology. CPSS@AsiaCCS 2016: 82-93 - [c10]Jia Xu, Anjia Yang, Jianying Zhou, Duncan S. Wong:
Lightweight Delegatable Proofs of Storage. ESORICS (1) 2016: 324-343 - [c9]Jia Xu, Jianying Zhou, Liming Lu:
Cyber and Physical Access Control in Legacy System Using Passwords. SG-CRC 2016: 27-42 - [c8]Jia Xu, Ee-Chien Chang, Jianying Zhou:
Directed Transitive Signature on Directed Tree. SG-CRC 2016: 91-98 - 2015
- [i8]Jia Xu, Jianying Zhou, Liming Lu:
Cyber and Physical Access Control in Legacy System Using Passwords. IACR Cryptol. ePrint Arch. 2015: 1161 (2015) - 2014
- [c7]Jia Xu, Jianying Zhou:
Leakage Resilient Proofs of Ownership in Cloud Storage, Revisited. ACNS 2014: 97-115 - [i7]Jia Xu, Anjia Yang, Jianying Zhou, Duncan S. Wong:
Lightweight and Privacy-Preserving Delegatable Proofs of Storage. IACR Cryptol. ePrint Arch. 2014: 395 (2014) - 2013
- [j2]Cheng-Kang Chu, Wen Tao Zhu, Jin Han, Joseph K. Liu, Jia Xu, Jianying Zhou:
Security Concerns in Popular Cloud Storage Services. IEEE Pervasive Comput. 12(4): 50-57 (2013) - [c6]Jia Xu, Ee-Chien Chang, Jianying Zhou:
Weak leakage-resilient client-side deduplication of encrypted data in cloud storage. AsiaCCS 2013: 195-206 - [i6]Jia Xu, Jianying Zhou:
Leakage Resilient Proofs of Ownership in Cloud Storage, Revisited. IACR Cryptol. ePrint Arch. 2013: 514 (2013) - 2012
- [c5]Jia Xu, Ee-Chien Chang:
Towards efficient proofs of retrievability. AsiaCCS 2012: 79-80 - 2011
- [j1]Jie Yu, Zhoujun Li, Peng Xiao, Chengfang Fang, Jia Xu, Ee-Chien Chang:
ID Repetition in Structured P2P Networks. Comput. J. 54(6): 962-975 (2011) - [i5]Jia Xu, Ee-Chien Chang:
Practically Efficient Proof of Retrievability in Cloud Storage. IACR Cryptol. ePrint Arch. 2011: 362 (2011) - [i4]Jia Xu, Ee-Chien Chang:
Towards Efficient Provable Data Possession. IACR Cryptol. ePrint Arch. 2011: 574 (2011) - 2010
- [c4]Ee-Chien Chang, Chengfang Fang, Jia Xu:
A chameleon encryption scheme resistant to known-plaintext attack. Digital Rights Management Workshop 2010: 25-34 - [i3]Jia Xu, Ee-Chien Chang:
Authenticating Aggregate Range Queries over Multidimensional Dataset. IACR Cryptol. ePrint Arch. 2010: 50 (2010)
2000 – 2009
- 2009
- [c3]Ee-Chien Chang, Chee Liang Lim, Jia Xu:
Short Redactable Signatures Using Random Trees. CT-RSA 2009: 133-147 - [c2]Jie Yu, Chengfang Fang, Jia Xu, Ee-Chien Chang, Zhoujun Li:
ID Repetition in Kad. Peer-to-Peer Computing 2009: 111-120 - [i2]Ee-Chien Chang, Chee Liang Lim, Jia Xu:
Short Redactable Signatures Using Random Trees. IACR Cryptol. ePrint Arch. 2009: 25 (2009) - 2008
- [c1]Ee-Chien Chang, Jia Xu:
Remote Integrity Check with Dishonest Storage Server. ESORICS 2008: 223-237 - [i1]Ee-Chien Chang, Jia Xu:
Remote Integrity Check with Dishonest Storage Server. IACR Cryptol. ePrint Arch. 2008: 346 (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-30 01:15 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint