Yinghui Zhang
Yinghui Zhang
Verified email at
Cited by
Cited by
Secure attribute-based data sharing for resource-limited users in cloud computing
J Li, Y Zhang, X Chen, Y Xiang
Computers & Security 72, 1-12, 2018
Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control
Y Zhang, D Zheng, RH Deng
IEEE Internet of Things Journal 5 (3), 2130-2145, 2018
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
Y Zhang, X Chen, J Li, DS Wong, H Li, I You
Information Sciences 379, 42-61, 2017
Blockchain based Efficient and Robust Fair Payment for Outsourcing Services in Cloud Computing
Y Zhang, RH Deng, X Liu, D Zheng
Information Sciences 462, 262-277, 2018
Anonymous attribute-based encryption supporting efficient decryption test
Y Zhang, X Chen, J Li, DS Wong, H Li
Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and …, 2013
Secure and fine-grained access control on e-healthcare records in mobile cloud computing
Y Liu, Y Zhang, J Ling, Z Liu
Future Generation Computer Systems 78, 1020-1026, 2018
Efficient and Robust Certificateless Signature for Data Crowdsensing in Cloud-assisted Industrial IoT
Y Zhang, R Deng, D Zheng, J Li, P Wu, J Cao
IEEE Transactions on Industrial Informatics, 2019
Outsourcing Service Fair Payment based on Blockchain and its Applications in Cloud Computing
Y Zhang, RH Deng, X Liu, D Zheng
IEEE Transactions on Services Computing 14 (4), 1152-1166, 2021
TKSE: Trustworthy Keyword Search over Encrypted Data with Two-side Verifiability via Blockchain
Y Zhang, RH Deng, J Shu, K Yang, D Zheng
IEEE Access 6, 31077-31087, 2018
Computationally efficient ciphertext-policy attribute-based encryption with constant-size ciphertexts
Y Zhang, D Zheng, X Chen, J Li, H Li
International Conference on Provable Security, 259-273, 2014
Anonymous attribute‐based proxy re‐encryption for access control in cloud computing
Y Zhang, J Li, X Chen, H Li
Security and Communication Networks 9 (14), 2397-2411, 2016
Privacy-aware attribute-based PHR sharing with user accountability in cloud computing
F Xhafa, J Feng, Y Zhang, X Chen, J Li
The Journal of Supercomputing 71 (5), 1607-1619, 2015
Privacy-preserving communication and power injection over vehicle networks and 5G smart grid slice
Y Zhang, J Li, D Zheng, P Li, Y Tian
Journal of Network and Computer Applications 122, 50-60, 2018
Efficient and privacy-preserving traceable attribute-based encryption in blockchain
A Wu, Y Zhang, X Zheng, R Guo, Q Zhao, D Zheng
Annals of Telecommunications, 1-11, 2019
Efficient attribute-based data sharing in mobile clouds
Y Zhang, D Zheng, X Chen, J Li, H Li
Pervasive and Mobile Computing 28, 135-149, 2016
Robust and Universal Seamless Handover Authentication in 5G HetNets
Y Zhang, R Deng, E Bertino, D Zheng
IEEE Transactions on Dependable and Secure Computing 18 (2), 858-874, 2021
Secure smart health with privacy-aware aggregate authentication and access control in Internet of Things
Y Zhang, RH Deng, G Han, D Zheng
Journal of Network and Computer Applications 123, 89-100, 2018
Comments on “A Large-Scale Concurrent Data Anonymous Batch Verification Scheme for Mobile Healthcare Crowd Sensing”
Y Zhang, J Shu, X Liu, J Li, D Zheng
IEEE Internet of Things Journal, 2018
Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks
Y Zhang, X Chen, J Li, H Li
Computer Networks 75, 192-211, 2014
Efficient and privacy-preserving medical data sharing in Internet of Things with limited computing power
D Zheng, A Wu, Y Zhang, Q Zhao
IEEE Access 6, 28019-28027, 2018
The system can't perform the operation now. Try again later.
Articles 1–20