default search action
Jun Shen 0006
Person information
- affiliation: Xidian University, State Key Laboratory of Integrated Service Networks (ISN), Xi'an, China
- affiliation (former): Nanjing University of Information Science and Technology, Nanjing, China
Other persons with the same name
- Jun Shen — disambiguation page
- Jun Shen 0001 — University of Wollongong, School of Information Systems and Technology, NSW, Australia (and 1 more)
- Jun Shen 0002 — Nanjing University of Aeronautics and Astronautics, College of Automation Engineering, China (and 1 more)
- Jun Shen 0003 — Southeast University, School of Computer Science and Engineering, Nanjing, China
- Jun Shen 0004 — Bordeaux-3 University, Institute of Geodynamics, Image Laboratory, Talence, France (and 1 more)
- Jun Shen 0005 — Arizona State University, Tempe, USA
- Jun Shen 0007 — University of Rennes 1, France
- Jun Shen 0008 — Sun Yat-Sen University, Department of Radiology, Sun Yat-Sen Memorial Hospital, Guangzhou, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Jun Shen, Xiaofeng Chen, Xinyi Huang, Yang Xiang:
Public Proofs of Data Replication and Retrievability With User-Friendly Replication. IEEE Trans. Dependable Secur. Comput. 21(4): 2057-2067 (2024) - [j12]Jianghong Wei, Meixia Miao, Guohua Tian, Jun Shen, Xiaofeng Chen, Willy Susilo:
Optimal Verifiable Data Streaming Under Concurrent Queries. IEEE Trans. Mob. Comput. 23(5): 5543-5557 (2024) - 2023
- [j11]Jun Shen, Xiaofeng Chen, Jianghong Wei, Fuchun Guo, Willy Susilo:
Blockchain-Based Accountable Auditing With Multi-Ownership Transfer. IEEE Trans. Cloud Comput. 11(3): 2711-2724 (2023) - [j10]Jun Shen, Xiaofeng Chen, Zheli Liu, Willy Susilo:
Verifiable and Redactable Blockchains With Fully Editing Operations. IEEE Trans. Inf. Forensics Secur. 18: 3787-3802 (2023) - 2021
- [c4]Jianghong Wei, Guohua Tian, Jun Shen, Xiaofeng Chen, Willy Susilo:
Optimal Verifiable Data Streaming Protocol with Data Auditing. ESORICS (2) 2021: 296-312 - 2020
- [j9]Jian Shen, Dengzhi Liu, Md. Zakirul Alam Bhuiyan, Jun Shen, Xingming Sun, Aniello Castiglione:
Secure Verifiable Database Supporting Efficient Dynamic Operations in Cloud Computing. IEEE Trans. Emerg. Top. Comput. 8(2): 280-290 (2020) - [c3]Jun Shen, Fuchun Guo, Xiaofeng Chen, Willy Susilo:
Secure Cloud Auditing with Efficient Ownership Transfer. ESORICS (1) 2020: 611-631 - [i1]Jun Shen, Fuchun Guo, Xiaofeng Chen, Willy Susilo:
Secure Cloud Auditing with Efficient Ownership Transfer (Full Version). IACR Cryptol. ePrint Arch. 2020: 1468 (2020)
2010 – 2019
- 2018
- [j8]Jian Shen, Shaohua Chang, Jun Shen, Qi Liu, Xingming Sun:
A lightweight multi-layer authentication protocol for wireless body area networks. Future Gener. Comput. Syst. 78: 956-963 (2018) - [j7]Jian Shen, Ziyuan Gui, Sai Ji, Jun Shen, Haowen Tan, Yi Tang:
Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks. J. Netw. Comput. Appl. 106: 117-123 (2018) - [j6]Jian Shen, Shaohua Chang, Qi Liu, Jun Shen, Yongjun Ren:
Implicit authentication protocol and self-healing key management for WBANs. Multim. Tools Appl. 77(9): 11381-11401 (2018) - [j5]Tianqi Zhou, Jian Shen, Xiong Li, Chen Wang, Jun Shen:
Quantum Cryptography for the Future Internet and the Security Analysis. Secur. Commun. Networks 2018: 8214619:1-8214619:7 (2018) - [j4]Jian Shen, Jun Shen, Chin-Feng Lai, Qi Liu, Tianqi Zhou:
Cloud Based Data Protection in Anonymously Controlled SDN. Secur. Commun. Networks 2018: 9845426:1-9845426:8 (2018) - 2017
- [j3]Jian Shen, Jun Shen, Xiong Li, Fushan Wei, Jiguo Li:
Outsourced data modification algorithm with assistance of multi-assistants in cloud computing. Int. J. Sens. Networks 24(1): 62-73 (2017) - [j2]Jian Shen, Dengzhi Liu, Jun Shen, Qi Liu, Xingming Sun:
A secure cloud-assisted urban data sharing framework for ubiquitous-cities. Pervasive Mob. Comput. 41: 219-230 (2017) - [j1]Jian Shen, Jun Shen, Xiaofeng Chen, Xinyi Huang, Willy Susilo:
An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data. IEEE Trans. Inf. Forensics Secur. 12(10): 2402-2415 (2017) - [c2]Jian Shen, Jun Shen, Chen Wang, Anxi Wang:
A Fibonacci Based Batch Auditing Protocol for Cloud Data. CSS 2017: 215-222 - 2016
- [c1]Jian Shen, Jun Shen, Xiong Li, Fushan Wei, Jiguo Li:
Outsourced Data Modification Algorithm with Assistance of Multi-assistants in Cloud Computing. ICCCS (1) 2016: 389-408
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-13 23:47 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint