Chaotic maps-based password-authenticated key agreement using smart cards C Guo, CC Chang Communications in Nonlinear Science and Numerical Simulation 18 (6), 1433-1440, 2013 | 131 | 2013 |
A hierarchical threshold secret image sharing C Guo, CC Chang, C Qin Pattern Recognition Letters 33 (1), 83-91, 2012 | 83 | 2012 |
Fine-grained database field search using attribute-based encryption for e-healthcare clouds C Guo, R Zhuang, Y Jie, Y Ren, T Wu, KKR Choo Journal of medical systems 40 (11), 1-8, 2016 | 80 | 2016 |
Dynamic multi-phrase ranked search over encrypted data with symmetric searchable encryption C Guo, X Chen, Y Jie, F Zhangjie, M Li, B Feng IEEE Transactions on Services Computing, 2017 | 45 | 2017 |
A multi-threshold secret image sharing scheme based on MSP C Guo, CC Chang, C Qin Pattern Recognition Letters 33 (12), 1594-1600, 2012 | 44 | 2012 |
Key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage C Guo, N Luo, MZA Bhuiyan, Y Jie, Y Chen, B Feng, M Alam Future Generation Computer Systems 84, 190-199, 2018 | 38 | 2018 |
A new data hiding scheme based on DNA sequence C Guo, CC Chang, ZH Wang Int. J. Innov. Comput. Inf. Control 8 (1), 139-149, 2012 | 37 | 2012 |
An authenticated group key distribution protocol based on the generalized Chinese remainder theorem C Guo, CC Chang International Journal of Communication Systems 27 (1), 126-134, 2014 | 33 | 2014 |
Chaotic maps-based mutual authentication and key agreement using smart cards for wireless communications C Guo, CC Chang, CY Sun Journal of Information Hiding and Multimedia Signal Processing 4 (2), 99-109, 2013 | 32 | 2013 |
An efficient protocol with bidirectional verification for storage security in cloud computing B Feng, X Ma, C Guo, H Shi, Z Fu, T Qiu IEEE Access 4, 7899-7911, 2016 | 26 | 2016 |
A multi-threshold secret image sharing scheme based on the generalized Chinese reminder theorem C Guo, H Zhang, Q Song, M Li Multimedia Tools and Applications 75 (18), 11577-11594, 2016 | 24 | 2016 |
A new prediction model of infectious diseases with vaccination strategies based on evolutionary game theory Q Li, MC Li, L Lv, C Guo, K Lu Chaos, Solitons & Fractals 104, 51-60, 2017 | 23 | 2017 |
A construction for secret sharing scheme with general access structure C Guo, CC Chang Journal of Information Hiding and Multimedia Signal Processing 4 (1), 1-8, 2013 | 23 | 2013 |
Secure range search over encrypted uncertain IoT outsourced data C Guo, R Zhuang, Y Jie, KKR Choo, X Tang IEEE Internet of Things Journal 6 (2), 1520-1529, 2018 | 18 | 2018 |
A region-adaptive semi-fragile dual watermarking scheme H Shi, M Li, C Guo, R Tan Multimedia Tools and Applications 75 (1), 465-495, 2016 | 17 | 2016 |
A fault‐tolerant group key agreement protocol exploiting dynamic setting ZY Cheng, Y Liu, CC Chang, C Guo International Journal of Communication Systems 26 (2), 259-275, 2013 | 15 | 2013 |
Dynamic data integrity auditing method supporting privacy protection in vehicular cloud environment B Shao, G Bian, Y Wang, S Su, C Guo IEEE Access 6, 43785-43797, 2018 | 14 | 2018 |
A Secure and Efficient Mutual Authentication and Key Agreement Protocol with Smart Cards for Wireless Communications. C Guo, CC Chang, SC Chang IJ Network Security 20 (2), 323-331, 2018 | 14 | 2018 |
Root-applied silicon in the early bud stage increases the rapeseed yield and optimizes the mechanical harvesting characteristics J Kuai, Y Sun, C Guo, L Zhao, Q Zuo, J Wu, G Zhou Field Crops Research 200, 88-97, 2017 | 14 | 2017 |
AD‐ASGKA–authenticated dynamic protocols for asymmetric group key agreement M Li, X Xu, C Guo, X Tan Security and Communication Networks 9 (11), 1340-1352, 2016 | 13 | 2016 |