default search action
Sha Ma
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j30]Ximing Li, Hao Wang, Sha Ma:
An efficient ciphertext-policy weighted attribute-based encryption with collaborative access for cloud storage. Comput. Stand. Interfaces 91: 103872 (2025) - 2024
- [j29]Yue Hao, Peng Wang, Minrou Cui, Zhenhua zeng, Sha Ma, Yixi Li, Tu Zou, Xianglin Fang, Lin Lin:
Automatic localization and segmentation of adherent microplastics in optical micrographs based on improved YOLOv5 and adaptive perceptual UNET 3+++. Biomed. Signal Process. Control. 95: 106399 (2024) - [j28]Tian Yang, Sha Ma, Jiaojiao Du, Chengyu Jiang, Qiong Huang:
Revocable Public Key Encryption with Equality Test without Pairing in Cloud Storage. Comput. J. 67(2): 642-657 (2024) - [j27]Jingwei Lu, Hongbo Li, Jianye Huang, Sha Ma, Man Ho Allen Au, Qiong Huang:
An Identity-Based Encryption with Equality Test scheme for healthcare social apps. Comput. Stand. Interfaces 87: 103759 (2024) - [j26]Sha Ma, Zhiqing Ye, Qiong Huang, Chengyu Jiang:
FFEC: Fast and forward-secure equivalence-based ciphertext comparability for multiple users in cloud environment. Comput. Stand. Interfaces 89: 103821 (2024) - [j25]Ximing Li, Hao Wang, Sha Ma, Meiyan Xiao, Qiong Huang:
Revocable and verifiable weighted attribute-based encryption with collaborative access for electronic health record in cloud. Cybersecur. 7(1): 18 (2024) - [j24]Jiaojiao Du, Sha Ma, Tian Yang, Qiong Huang:
Efficient revocable identity-based encryption with equality test. Int. J. Appl. Cryptogr. 4(3/4): 205-218 (2024) - [j23]Sha Ma, Zhiqing Ye, Qiong Huang, Chengyu Jiang:
Controllable forward secure identity-based encryption with equality test in privacy-preserving text similarity analysis. Inf. Sci. 660: 120099 (2024) - [c22]Tan Xi Tian, Zhu Li Ying, Liang Yao Wen, Wang Mi Chun, Sha Ma:
Enhancing the Mental Health of College Students: An Emotional Robot Design Based on CNNs and Smart Wearable Devices. ICBET 2024: 203-210 - 2023
- [j22]Jingwei Lu, Hongbo Li, Jianye Huang, Sha Ma, Man Ho Allen Au, Qiong Huang:
Certificateless Public Key Authenticated Encryption with Keyword Search Achieving Stronger Security. Inf. 14(3): 142 (2023) - [j21]Sha Ma, Pan Zhou, Qiong Huang, Jiajun Wang:
MTER: An Efficient Multi-User Threshold Equality Retrieval for Double Auction in Smart Grid Market. IEEE Trans. Inf. Forensics Secur. 18: 4515-4529 (2023) - [c21]Guiquan Yang, Sha Ma, Hongbo Li, Husheng Yang, Qiong Huang:
Public Key Authenticated Encryption with Keyword Search Improved: Strong Security Model and Multi-keyword Construction. Inscrypt (1) 2023: 299-319 - [c20]Husheng Yang, Sha Ma, Pan Zhou, Guiquan Yang, Qiong Huang:
Forward Secure Online/Offline Key Policy Attribute-Based Encryption with Keyword Search. Inscrypt (2) 2023: 356-367 - [c19]Yongbing Lin, Lei Wan, Sha Ma, Peike Zhang:
Feature Structure Similarity Index for Hybrid Human and Machine Vision. ICIP 2023: 1480-1484 - 2022
- [j20]Sha Ma, Yijian Zhong, Qiong Huang:
Efficient Public Key Encryption With Outsourced Equality Test for Cloud-Based IoT Environments. IEEE Trans. Inf. Forensics Secur. 17: 3758-3772 (2022) - 2021
- [j19]Qingwen Guo, Qiong Huang, Sha Ma, Meiyan Xiao, Guomin Yang, Willy Susilo:
Functional signatures: new definition and constructions. Sci. China Inf. Sci. 64(12) (2021) - [j18]Yunhao Ling, Sha Ma, Qiong Huang, Ximing Li, Yijian Zhong, Yunzhi Ling:
Efficient Group ID-Based Encryption With Equality Test Against Insider Attack. Comput. J. 64(4): 661-674 (2021) - [j17]Sha Ma, Qiong Huang:
CCA-Almost-Full Anonymous Group Signature with Verifier Local Revocation in the Standard Model. Comput. J. 64(8): 1239-1252 (2021) - [j16]Yuanhao Wang, Qiong Huang, Hongbo Li, Meiyan Xiao, Sha Ma, Willy Susilo:
Private Set Intersection With Authorization Over Outsourced Encrypted Datasets. IEEE Trans. Inf. Forensics Secur. 16: 4050-4062 (2021) - [c18]Sha Ma, Rongchao Peng, Dachao Wei, Yi Li:
Development of a Rat-Licking Device for Operant Conditioning Experiments. ICBBE 2021: 170-174 - [c17]Ru Xiang, Sha Ma, Qiong Huang, Ximing Li:
A CCA-Full-Anonymous Group Signature with Verifiable Controllable Linkability in the Standard Model. ProvSec 2021: 279-295 - 2020
- [j15]Yijian Zhong, Sha Ma, Qiong Huang:
Plaintext-Verifiably-Checkable Encryption and Its Extension in Dual-Server Setting. IEEE Access 8: 132825-132840 (2020) - [j14]Sha Ma, Qiong Huang:
A New Framework of IND-CCA Secure Public Key Encryption with Keyword Search. Comput. J. 63(12): 1849-1858 (2020) - [j13]Yunhao Ling, Sha Ma, Qiong Huang, Ximing Li, Yunzhi Ling:
Group public key encryption with equality test against offline message recovery attack. Inf. Sci. 510: 16-32 (2020)
2010 – 2019
- 2019
- [j12]Hongbo Li, Qiong Huang, Sha Ma, Jian Shen, Willy Susilo:
Authorized Equality Test on Identity-Based Ciphertexts for Secret Data Sharing via Cloud Storage. IEEE Access 7: 25409-25421 (2019) - [c16]Yunhao Ling, Sha Ma, Qiong Huang, Ru Xiang, Ximing Li:
Group ID-Based Encryption with Equality Test. ACISP 2019: 39-57 - [c15]Ximing Li, Weizhao Chen, Yubin Guo, Sha Ma, Qiong Huang:
Secure, Efficient and Searchable File System on Distributed Clouds. ICPCSEE (2) 2019: 246-266 - [c14]Sha Ma, Qiong Huang:
Plaintext-Checkable Encryption with Unlink-CCA Security in the Standard Model. ISPEC 2019: 3-19 - [c13]Sha Ma, Qiong Huang, Ximing Li, Meiyan Xiao:
Plaintext-Verifiably-Checkable Encryption. ProvSec 2019: 149-166 - 2018
- [j11]Jianchang Lai, Yi Mu, Fuchun Guo, Peng Jiang, Sha Ma:
Identity-Based Broadcast Encryption for Inner Products. Comput. J. 61(8): 1240-1251 (2018) - [j10]Sha Ma, Yi Mu, Willy Susilo:
A Generic Scheme of plaintext-checkable database encryption. Inf. Sci. 429: 88-101 (2018) - [j9]Sha Ma, Yi Mu, Willy Susilo, Bo Yang:
Witness-based searchable encryption. Inf. Sci. 453: 364-378 (2018) - [j8]Jianchang Lai, Yi Mu, Fuchun Guo, Rongmao Chen, Sha Ma:
Efficient k-out-of-n oblivious transfer scheme with the ideal communication cost. Theor. Comput. Sci. 714: 15-26 (2018) - [c12]Yunhao Ling, Sha Ma, Qiong Huang, Ximing Li:
A General Two-Server Framework for Ciphertext-Checkable Encryption Against Offline Message Recovery Attack. ICCCS (3) 2018: 370-382 - [c11]Sha Ma:
Authorized Equality Test of Encrypted Data for Secure Cloud Databases. TrustCom/BigDataSE 2018: 223-230 - 2017
- [j7]Sha Ma:
Authorized Equi-join for Multiple Data Contributors in the PKC-Based Setting. Comput. J. 60(12): 1822-1838 (2017) - [c10]Tong Wu, Sha Ma, Yi Mu, Shengke Zeng:
ID-Based Encryption with Equality Test Against Insider Attack. ACISP (1) 2017: 168-183 - [c9]Sharad Chole, Andy Fingerhut, Sha Ma, Anirudh Sivaraman, Shay Vargaftik, Alon Berger, Gal Mendelson, Mohammad Alizadeh, Shang-Tse Chuang, Isaac Keslassy, Ariel Orda, Tom Edsall:
dRMT: Disaggregated Programmable Switching. SIGCOMM 2017: 1-14 - [c8]Sha Ma, Yunhao Ling:
A General Two-Server Cryptosystem Supporting Complex Queries. WISA 2017: 249-260 - 2016
- [j6]Sha Ma:
Identity-based encryption with outsourced equality test in cloud computing. Inf. Sci. 328: 389-402 (2016) - [c7]Shengmin Xu, Guomin Yang, Yi Mu, Sha Ma:
Proxy Signature with Revocation. ACISP (2) 2016: 21-36 - [c6]Chaoqiang Sang, Pengfei Xia, Yao Jiang, Qingwen Liu, Juan Zheng, Sha Ma:
Stand-Alone Unlicensed LTE (SAiL). GLOBECOM 2016: 1-5 - 2015
- [j5]Sha Ma, Mingwu Zhang, Qiong Huang, Bo Yang:
Public Key Encryption with Delegated Equality Test in a Multi-User Setting. Comput. J. 58(4): 986-1002 (2015) - [j4]Sha Ma, Qiong Huang, Mingwu Zhang, Bo Yang:
Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization. IEEE Trans. Inf. Forensics Secur. 10(3): 458-470 (2015) - 2014
- [j3]Sha Ma, Bo Yang, Mingwu Zhang:
PPGJ: A privacy-preserving general join for outsourced encrypted database. Secur. Commun. Networks 7(8): 1232-1244 (2014) - 2012
- [j2]Sha Ma, Martin R. Varley, Lik-Kwan Shark, Jim Richards:
Overcoming the information overload problem in a multiform feedback-based virtual reality system for hand motion rehabilitation: healthy subject case study. Virtual Real. 16(4): 325-334 (2012) - [c5]Weiwei Sun, Bo Yang, Qiong Huang, Sha Ma, Ximing Li:
Multi-Committer Threshold Commitment Scheme from Lattice. PAISI 2012: 162-175 - 2011
- [c4]Sha Ma, Bo Yang, Kangshun Li, Feng Xia:
A Privacy-Preserving Join on Outsourced Database. ISC 2011: 278-292 - 2010
- [c3]Sha Ma, Martin R. Varley, Lik-Kwan Shark, Jim Richards:
EMG Biofeedback Based VR System for Hand Rotation and Grasping Rehabilitation. IV 2010: 479-484
2000 – 2009
- 2009
- [c2]Sha Ma, Martin R. Varley, James Richards, Lik-Kwan Shark:
Overcoming the Information Overload Problem in a Multiform Feedback Based Virtual Reality System for Hand Motion Rehabilitation. CW 2009: 51-56 - 2007
- [c1]Junyu Dong, Sha Ma, Li Li, Zhongda Yu:
Hole Filling on Three-Dimensional Surface Texture. ICME 2007: 1299-1302
1990 – 1999
- 1994
- [j1]Sha Ma, Paul D. Franzon:
Energy control and accurate delay estimation in the design of CMOS buffers. IEEE J. Solid State Circuits 29(9): 1150-1153 (1994)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint