scispace - formally typeset
Q

Qingjun Chen

Researcher at Nanjing University

Publications -  7
Citations -  138

Qingjun Chen is an academic researcher from Nanjing University. The author has contributed to research in topics: Routing protocol & Cryptography. The author has an hindex of 4, co-authored 6 publications receiving 117 citations.

Papers
More filters
Journal ArticleDOI

Privacy-Preserving Data Aggregation in Mobile Phone Sensing

TL;DR: An efficient protocol that allows an untrusted data aggregator to periodically collect sensed data from a group of mobile phone users without knowing which data belong to which user is presented, which achieves n-source anonymity.
Journal ArticleDOI

Efficient and Privacy-Preserving Min and $k$ th Min Computations in Mobile Sensing Systems

TL;DR: Following the standard cryptographic security definition in the semi-honest model, the protocols proposed can support time-series data and need not to assume the aggregator is trusted and are more efficient than existing protocols.
Journal ArticleDOI

SDN-Based Privacy Preserving Cross Domain Routing

TL;DR: PYCRO is presented, a cryptographic protocol specifically designed for privacy-preserving cross-domain routing optimization in Software Defined Networking (SDN) environments and it is rigorously proved the privacy guarantee of the protocol.
Proceedings ArticleDOI

Privacy-Preserving Cross-Domain Routing Optimization - A Cryptographic Approach

TL;DR: PYCRO as discussed by the authors is a cryptographic protocol specifically designed for privacy-preserving cross-domain routing optimization in Software Defined Networking (SDN) environments, which provides two fundamental routing functions, policy-compliant shortest path computing and bandwidth allocation, while ensuring strong protection for the private information of domains.
Posted Content

Privacy-preserving Cross-domain Routing Optimization -- A Cryptographic Approach

TL;DR: PYCRO provides two fundamental routing functions, policy-compliant shortest path computing and bandwidth allocation, while ensuring strong protection for the private information of domains, and rigorously proves the privacy guarantee of the protocol.