Han Jinguang
Han Jinguang
University of Surrey, United Kingdom
Verified email at surrey.ac.uk - Homepage
TitleCited byYear
Privacy-preserving decentralized key-policy attribute-based encryption
J Han, W Susilo, Y Mu, J Yan
IEEE Transactions on Parallel and Distributed Systems 23 (11), 2150-2162, 2012
1602012
When intrusion detection meets blockchain technology: a review
W Meng, EW Tischhauser, Q Wang, Y Wang, J Han
Ieee Access 6, 10179-10188, 2018
1152018
Flexible and fine-grained attribute-based data storage in cloud computing
J Li, W Yao, Y Zhang, H Qian, J Han
IEEE Transactions on Services Computing 10 (5), 785-796, 2016
1152016
KSF-OABE: outsourced attribute-based encryption with keyword search function for cloud storage
J Li, X Lin, Y Zhang, J Han
IEEE Transactions on Services Computing 10 (5), 715-725, 2016
1112016
Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation
H Qian, J Li, Y Zhang, J Han
International Journal of Information Security 14 (6), 487-497, 2015
1042015
Improving privacy and security in decentralized ciphertext-policy attribute-based encryption
J Han, W Susilo, Y Mu, J Zhou, MHA Au
IEEE transactions on information forensics and security 10 (3), 665-678, 2014
942014
Identity-based data storage in cloud computing
J Han, W Susilo, Y Mu
Future Generation Computer Systems 29 (3), 673-681, 2013
852013
User collusion avoidance CP-ABE with efficient attribute revocation for cloud storage
J Li, W Yao, J Han, Y Zhang, J Shen
IEEE Systems Journal 12 (2), 1767-1777, 2017
602017
A novel efficient remote data possession checking protocol in cloud storage
H Yan, J Li, J Han, Y Zhang
IEEE Transactions on Information Forensics and Security 12 (1), 78-88, 2016
482016
Full verifiability for outsourced decryption in attribute based encryption
J Li, Y Wang, Y Zhang, J Han
IEEE transactions on services computing, 2017
392017
User collusion avoidance scheme for privacy-preserving decentralized key-policy attribute-based encryption
Y Rahulamathavan, S Veluru, J Han, F Li, M Rajarajan, R Lu
IEEE Transactions on Computers 65 (9), 2939-2946, 2015
312015
Towards leakage-resilient fine-grained access control in fog computing
Z Yu, MH Au, Q Xu, R Yang, J Han
Future Generation Computer Systems 78, 763-777, 2018
242018
PPDCP-ABE: Privacy-preserving decentralized ciphertext-policy attribute-based encryption
J Han, W Susilo, Y Mu, J Zhou, MH Au
European Symposium on Research in Computer Security, 73-90, 2014
232014
A generic construction of dynamic single sign-on with strong security
J Han, Y Mu, W Susilo, J Yan
International Conference on Security and Privacy in Communication Systems …, 2010
232010
Attribute-based oblivious access control
J Han, W Susilo, Y Mu, J Yan
The Computer Journal 55 (10), 1202-1215, 2012
202012
Identity-Based Secure DistributedData Storage Schemes
J Han, W Susilo, Y Mu
IEEE Transactions on computers 63 (4), 941-953, 2013
182013
VOD-ADAC: Anonymous distributed fine-grained access control protocol with verifiable outsourced decryption in public cloud
H Wang, D He, J Han
IEEE transactions on services computing, 2017
172017
Accountable mobile E-commerce scheme via identity-based plaintext-checkable encryption
J Han, Y Yang, X Huang, TH Yuen, J Li, J Cao
Information Sciences 345, 143-155, 2016
172016
Improved handover authentication and key pre‐distribution for wireless mesh networks
X Yang, X Huang, J Han, C Su
Concurrency and Computation: Practice and Experience 28 (10), 2978-2990, 2016
132016
Efficient oblivious transfers with access control
J Han, W Susilo, Y Mu, J Yan
Computers & Mathematics with Applications 63 (4), 827-837, 2012
72012
The system can't perform the operation now. Try again later.
Articles 1–20