Secure attribute-based data sharing for resource-limited users in cloud computing J Li, Y Zhang, X Chen, Y Xiang Computers & Security 72, 1-12, 2018 | 417 | 2018 |
Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control Y Zhang, D Zheng, RH Deng IEEE Internet of Things Journal 5 (3), 2130-2145, 2018 | 289 | 2018 |
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing Y Zhang, X Chen, J Li, DS Wong, H Li, I You Information Sciences 379, 42-61, 2017 | 253 | 2017 |
Blockchain based Efficient and Robust Fair Payment for Outsourcing Services in Cloud Computing Y Zhang, RH Deng, X Liu, D Zheng Information Sciences 462, 262-277, 2018 | 167 | 2018 |
Anonymous attribute-based encryption supporting efficient decryption test Y Zhang, X Chen, J Li, DS Wong, H Li Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and …, 2013 | 128 | 2013 |
Secure and fine-grained access control on e-healthcare records in mobile cloud computing Y Liu, Y Zhang, J Ling, Z Liu Future Generation Computer Systems 78, 1020-1026, 2018 | 100 | 2018 |
Efficient and Robust Certificateless Signature for Data Crowdsensing in Cloud-assisted Industrial IoT Y Zhang, R Deng, D Zheng, J Li, P Wu, J Cao IEEE Transactions on Industrial Informatics, 2019 | 98 | 2019 |
Outsourcing Service Fair Payment based on Blockchain and its Applications in Cloud Computing Y Zhang, RH Deng, X Liu, D Zheng IEEE Transactions on Services Computing 14 (4), 1152-1166, 2021 | 92* | 2021 |
TKSE: Trustworthy Keyword Search over Encrypted Data with Two-side Verifiability via Blockchain Y Zhang, RH Deng, J Shu, K Yang, D Zheng IEEE Access 6, 31077-31087, 2018 | 87 | 2018 |
Computationally efficient ciphertext-policy attribute-based encryption with constant-size ciphertexts Y Zhang, D Zheng, X Chen, J Li, H Li International Conference on Provable Security, 259-273, 2014 | 71 | 2014 |
Anonymous attribute‐based proxy re‐encryption for access control in cloud computing Y Zhang, J Li, X Chen, H Li Security and Communication Networks 9 (14), 2397-2411, 2016 | 67 | 2016 |
Privacy-aware attribute-based PHR sharing with user accountability in cloud computing F Xhafa, J Feng, Y Zhang, X Chen, J Li The Journal of Supercomputing 71 (5), 1607-1619, 2015 | 57 | 2015 |
Privacy-preserving communication and power injection over vehicle networks and 5G smart grid slice Y Zhang, J Li, D Zheng, P Li, Y Tian Journal of Network and Computer Applications 122, 50-60, 2018 | 56 | 2018 |
Efficient and privacy-preserving traceable attribute-based encryption in blockchain A Wu, Y Zhang, X Zheng, R Guo, Q Zhao, D Zheng Annals of Telecommunications, 1-11, 2019 | 54 | 2019 |
Efficient attribute-based data sharing in mobile clouds Y Zhang, D Zheng, X Chen, J Li, H Li Pervasive and Mobile Computing 28, 135-149, 2016 | 54 | 2016 |
Robust and Universal Seamless Handover Authentication in 5G HetNets Y Zhang, R Deng, E Bertino, D Zheng IEEE Transactions on Dependable and Secure Computing 18 (2), 858-874, 2021 | 50 | 2021 |
Secure smart health with privacy-aware aggregate authentication and access control in Internet of Things Y Zhang, RH Deng, G Han, D Zheng Journal of Network and Computer Applications 123, 89-100, 2018 | 47 | 2018 |
Comments on “A Large-Scale Concurrent Data Anonymous Batch Verification Scheme for Mobile Healthcare Crowd Sensing” Y Zhang, J Shu, X Liu, J Li, D Zheng IEEE Internet of Things Journal, 2018 | 38 | 2018 |
Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks Y Zhang, X Chen, J Li, H Li Computer Networks 75, 192-211, 2014 | 37 | 2014 |
Efficient and privacy-preserving medical data sharing in Internet of Things with limited computing power D Zheng, A Wu, Y Zhang, Q Zhao IEEE Access 6, 28019-28027, 2018 | 36 | 2018 |