Jian Weng mainly focuses on Computer security, Encryption, Proxy re-encryption, Proxy and Ciphertext. His work on Information privacy as part of general Computer security study is frequently connected to Outsourcing, therefore bridging the gap between diverse disciplines of science and establishing a new relationship between them. Jian Weng combines subjects such as Cryptographic primitive and Database with his study of Encryption.
His Proxy re-encryption study combines topics from a wide range of disciplines, such as Random oracle and Chosen-ciphertext attack. His Ciphertext research is multidisciplinary, incorporating elements of Plaintext and Verifiable secret sharing. His study on Symmetric-key algorithm is often connected to Pairing as part of broader study in Public-key cryptography.
Jian Weng spends much of his time researching Computer security, Encryption, Ciphertext, Theoretical computer science and Computer network. The various areas that Jian Weng examines in his Computer security study include Proxy and Server. Within one scientific family, Jian Weng focuses on topics pertaining to Proxy re-encryption under Proxy, and may sometimes address concerns connected to Chosen-ciphertext attack.
He has researched Encryption in several fields, including Verifiable secret sharing and Access control. His work in Ciphertext tackles topics such as Plaintext which are related to areas like Ciphertext indistinguishability. Jian Weng interconnects Information hiding, Quantum computer and Standard model in the investigation of issues within Theoretical computer science.
Jian Weng mainly investigates Computer security, Encryption, Artificial intelligence, Computer network and Server. As part of one scientific family, Jian Weng deals mainly with the area of Computer security, narrowing it down to issues related to the State, and often Confidentiality. The study incorporates disciplines such as Secret sharing, Access control, Information retrieval, Key and Image retrieval in addition to Encryption.
In his research, Computer security model, Attribute-based encryption and Strong key is intimately related to Ciphertext, which falls under the overarching field of Access control. His work on Deep learning as part of general Artificial intelligence study is frequently linked to Multiple data, bridging the gap between disciplines. His Server research is multidisciplinary, incorporating perspectives in Secure multi-party computation, Computation and Correctness.
His main research concerns Encryption, Computer security, Access control, Server and Combinatorics. His work in the fields of Encryption, such as Cryptosystem, overlaps with other areas such as Grid. Jian Weng has included themes like Wireless ad hoc network, Connection and Robustness in his Computer security study.
Access control connects with themes related to Ciphertext in his study. His Ciphertext study combines topics in areas such as Attribute-based encryption and Strong key. His studies deal with areas such as Security analysis, Location awareness, Information sensitivity and Location-based service as well as Server.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Attribute-Based Encryption With Verifiable Outsourced Decryption
Junzuo Lai;Robert H. Deng;Chaowen Guan;Jian Weng.
IEEE Transactions on Information Forensics and Security (2013)
Efficient unidirectional proxy re-encryption
Sherman S. M. Chow;Jian Weng;Yanjiang Yang;Robert H. Deng.
international conference on cryptology in africa (2010)
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
Robert H. Deng;Jian Weng;Shengli Liu;Kefei Chen.
cryptology and network security (2008)
CrowdBC: A Blockchain-Based Decentralized Framework for Crowdsourcing
Ming Li;Jian Weng;Anjia Yang;Wei Lu.
IEEE Transactions on Parallel and Distributed Systems (2019)
Verifiable Computation over Large Database with Incremental Updates
Xiaofeng Chen;Jin Li;Jian Weng;Jianfeng Ma.
IEEE Transactions on Computers (2016)
Conditional proxy re-encryption secure against chosen-ciphertext attack
Jian Weng;Robert H. Deng;Xuhua Ding;Cheng-Kang Chu.
computer and communications security (2009)
DeepChain: Auditable and Privacy-Preserving Deep Learning with Blockchain-Based Incentive
Jiasi Weng;Jian Weng;Jilian Zhang;Ming Li.
IEEE Transactions on Dependable and Secure Computing (2021)
Feature selection for text classification: A review
Xuelian Deng;Yuqing Li;Jian Weng;Jilian Zhang.
Multimedia Tools and Applications (2019)
An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys
Ximeng Liu;Robert H. Deng;Kim-Kwang Raymond Choo;Jian Weng.
IEEE Transactions on Information Forensics and Security (2016)
Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers
Ximeng Liu;Kim-Kwang Raymond Choo;Robert H. Deng;Rongxing Lu.
IEEE Transactions on Dependable and Secure Computing (2018)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: