Jinguang Han
Jinguang Han
University of Surrey, United Kingdom
Verified email at surrey.ac.uk - Homepage
Title
Cited by
Cited by
Year
When intrusion detection meets blockchain technology: a review
W Meng, EW Tischhauser, Q Wang, Y Wang, J Han
Ieee Access 6, 10179-10188, 2018
1782018
Privacy-preserving decentralized key-policy attribute-based encryption
J Han, W Susilo, Y Mu, J Yan
IEEE transactions on parallel and distributed systems 23 (11), 2150-2162, 2012
1692012
Flexible and fine-grained attribute-based data storage in cloud computing
J Li, W Yao, Y Zhang, H Qian, J Han
IEEE Transactions on Services Computing 10 (5), 785-796, 2016
1562016
KSF-OABE: Outsourced attribute-based encryption with keyword search function for cloud storage
J Li, X Lin, Y Zhang, J Han
IEEE Transactions on Services Computing 10 (5), 715-725, 2016
1472016
Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation
H Qian, J Li, Y Zhang, J Han
International Journal of Information Security 14 (6), 487-497, 2015
1222015
Improving privacy and security in decentralized ciphertext-policy attribute-based encryption
J Han, W Susilo, Y Mu, J Zhou, MHA Au
IEEE transactions on information forensics and security 10 (3), 665-678, 2014
1132014
Identity-based data storage in cloud computing
J Han, W Susilo, Y Mu
Future Generation Computer Systems 29 (3), 673-681, 2013
872013
User collusion avoidance CP-ABE with efficient attribute revocation for cloud storage
J Li, W Yao, J Han, Y Zhang, J Shen
IEEE Systems Journal 12 (2), 1767-1777, 2017
812017
A novel efficient remote data possession checking protocol in cloud storage
H Yan, J Li, J Han, Y Zhang
IEEE Transactions on Information Forensics and Security 12 (1), 78-88, 2016
632016
Full verifiability for outsourced decryption in attribute based encryption
J Li, Y Wang, Y Zhang, J Han
IEEE transactions on services computing, 2017
592017
User collusion avoidance scheme for privacy-preserving decentralized key-policy attribute-based encryption
Y Rahulamathavan, S Veluru, J Han, F Li, M Rajarajan, R Lu
IEEE Transactions on Computers 65 (9), 2939-2946, 2015
392015
Towards leakage-resilient fine-grained access control in fog computing
Z Yu, MH Au, Q Xu, R Yang, J Han
Future Generation Computer Systems 78, 763-777, 2018
342018
PPDCP-ABE: Privacy-preserving decentralized ciphertext-policy attribute-based encryption
J Han, W Susilo, Y Mu, J Zhou, MH Au
European Symposium on Research in Computer Security, 73-90, 2014
282014
A generic construction of dynamic single sign-on with strong security
J Han, Y Mu, W Susilo, J Yan
International Conference on Security and Privacy in Communication Systems …, 2010
232010
Accountable mobile E-commerce scheme via identity-based plaintext-checkable encryption
J Han, Y Yang, X Huang, TH Yuen, J Li, J Cao
Information Sciences 345, 143-155, 2016
222016
Attribute-based oblivious access control
J Han, W Susilo, Y Mu, J Yan
The Computer Journal 55 (10), 1202-1215, 2012
212012
VOD-ADAC: anonymous distributed fine-grained access control protocol with verifiable outsourced decryption in public cloud
H Wang, D He, J Han
IEEE transactions on services computing, 2017
192017
Identity-based secure distributeddata storage schemes
J Han, W Susilo, Y Mu
IEEE Transactions on computers 63 (4), 941-953, 2013
162013
Improved handover authentication and key pre‐distribution for wireless mesh networks
X Yang, X Huang, J Han, C Su
Concurrency and Computation: Practice and Experience 28 (10), 2978-2990, 2016
142016
Expressive attribute-based keyword search with constant-size ciphertext
J Han, Y Yang, JK Liu, J Li, K Liang, J Shen
Soft Computing 22 (15), 5163-5177, 2018
112018
The system can't perform the operation now. Try again later.
Articles 1–20