Follow
Ning Shang
Title
Cited by
Cited by
Year
Privacy-preserving digital identity management for cloud computing.
E Bertino, F Paci, R Ferrini, N Shang
IEEE Data Eng. Bull. 32 (1), 21-27, 2009
2712009
Privacy preserving policy-based content sharing in public clouds
M Nabeel, N Shang, E Bertino
IEEE Transactions on Knowledge and Data Engineering 25 (11), 2602-2614, 2012
2272012
Preserving security by synchronizing a nonce or counter between systems
CS Wurster, N Shang, P THOMAS, SA Sprigg, M Hohlfeld, IH Mclean
1662013
A privacy-preserving approach to policy-based content dissemination
N Shang, M Nabeel, F Paci, E Bertino
2010 IEEE 26th International Conference on Data Engineering (ICDE 2010), 944-955, 2010
1402010
An efficient time-bound hierarchical key management scheme for secure broadcasting
E Bertino, N Shang, SS Wagstaff Jr
IEEE transactions on dependable and secure computing 5 (2), 65-70, 2008
1062008
Efficient privacy preserving content based publish subscribe systems
M Nabeel, N Shang, E Bertino
Proceedings of the 17th ACM symposium on Access Control Models and …, 2012
952012
A decentralized privacy preserving reputation protocol for the malicious adversarial model
O Hasan, L Brunie, E Bertino, N Shang
IEEE Transactions on Information Forensics and Security 8 (6), 949-962, 2013
912013
Proximity determination based on distance ratios
N Shang, Y Yang
US Patent 8,948,782, 2015
352015
Securing databases against piracy attacks
A Bhatia, N Shang, Y Yang
US Patent 9,584,528, 2017
332017
Digital identity protection-concepts and issues
E Bertino, F Paci, N Shang
4th International Conference on Availability, Reliability and Security, 2009
292009
Privacy-preserving matching of spatial datasets with protection against background knowledge
G Ghinita, CR Vicente, N Shang, E Bertino
Proceedings of the 18th SIGSPATIAL International Conference on Advances in …, 2010
232010
Wavecoder: Widespread and versatile enhanced instruction tuning with refined data generation
Z Yu, X Zhang, N Shang, Y Huang, C Xu, Y Zhao, W Hu, Q Yin
arXiv preprint arXiv:2312.14187, 2023
222023
Explicit formulas for real hyperelliptic curves of genus 2 in affine representation
S Erickson, MJ Jacobson, N Shang, S Shen, A Stein
Arithmetic of Finite Fields: First International Workshop, WAIFI 2007 …, 2007
212007
Communicating RF fingerprint-based geofences
X Li, N Shang, MA Ische
US Patent 9,414,193, 2016
192016
Privacy-preserving filtering and covering in content-based publish subscribe systems
M Nabeel, N Shang, E Bertino
Purdue Univ., West Lafayette, Indiana, USA, Tech. Rep 15, 2009
172009
Mask: a system for privacy-preserving policy-based access to published content
M Nabeel, N Shang, J Zage, E Bertino
Proceedings of the 2010 ACM SIGMOD International Conference on Management of …, 2010
152010
Controlling data disclosure in computational PIR protocols
N Shang, G Ghinita, Y Zhou, E Bertino
Proceedings of the 5th ACM Symposium on Information, Computer and …, 2010
142010
Efficient and privacy-preserving enforcement of attribute-based access control
N Shang, F Paci, E Bertino
Proceedings of the 9th Symposium on Identity and Trust on the Internet, 63-68, 2010
112010
Broadcast group key management with access control vectors
N Shang, M Nabeel, E Bertino, X Zou
Department of Computer Science, Tech. Rep 4, 2010
92010
Generating pairing-friendly parameters for the CM construction of genus 2 curves over prime fields
K Lauter, N Shang
Designs, codes and cryptography 67 (3), 341-355, 2013
72013
The system can't perform the operation now. Try again later.
Articles 1–20