Q
Qingjun Chen
Researcher at Nanjing University
Publications - 7
Citations - 138
Qingjun Chen is an academic researcher from Nanjing University. The author has contributed to research in topics: Routing protocol & Cryptography. The author has an hindex of 4, co-authored 6 publications receiving 117 citations.
Papers
More filters
Journal ArticleDOI
Privacy-Preserving Data Aggregation in Mobile Phone Sensing
TL;DR: An efficient protocol that allows an untrusted data aggregator to periodically collect sensed data from a group of mobile phone users without knowing which data belong to which user is presented, which achieves n-source anonymity.
Journal ArticleDOI
Efficient and Privacy-Preserving Min and $k$ th Min Computations in Mobile Sensing Systems
TL;DR: Following the standard cryptographic security definition in the semi-honest model, the protocols proposed can support time-series data and need not to assume the aggregator is trusted and are more efficient than existing protocols.
Journal ArticleDOI
SDN-Based Privacy Preserving Cross Domain Routing
TL;DR: PYCRO is presented, a cryptographic protocol specifically designed for privacy-preserving cross-domain routing optimization in Software Defined Networking (SDN) environments and it is rigorously proved the privacy guarantee of the protocol.
Proceedings ArticleDOI
Privacy-Preserving Cross-Domain Routing Optimization - A Cryptographic Approach
TL;DR: PYCRO as discussed by the authors is a cryptographic protocol specifically designed for privacy-preserving cross-domain routing optimization in Software Defined Networking (SDN) environments, which provides two fundamental routing functions, policy-compliant shortest path computing and bandwidth allocation, while ensuring strong protection for the private information of domains.
Posted Content
Privacy-preserving Cross-domain Routing Optimization -- A Cryptographic Approach
TL;DR: PYCRO provides two fundamental routing functions, policy-compliant shortest path computing and bandwidth allocation, while ensuring strong protection for the private information of domains, and rigorously proves the privacy guarantee of the protocol.