Rongmao Chen (陈荣茂)
Rongmao Chen (陈荣茂)
Verified email at nudt.edu.cn - Homepage
Title
Cited by
Cited by
Year
Dual-server public-key encryption with keyword search for secure cloud storage
R Chen, Y Mu, G Yang, F Guo, X Wang
IEEE transactions on information forensics and security 11 (4), 789-798, 2015
1732015
BL-MLE: block-level message-locked encryption for secure large file deduplication
R Chen, Y Mu, G Yang, F Guo
IEEE Transactions on Information Forensics and Security 10 (12), 2643-2652, 2015
972015
A new general framework for secure public key encryption with keyword search
R Chen, Y Mu, G Yang, F Guo, X Wang
Australasian conference on information security and privacy, 59-76, 2015
812015
Server-aided public key encryption with keyword search
R Chen, Y Mu, G Yang, F Guo, X Huang, X Wang, Y Wang
IEEE Transactions on Information Forensics and Security 11 (12), 2833-2842, 2016
662016
Strongly leakage-resilient authenticated key exchange
R Chen, Y Mu, G Yang, W Susilo, F Guo
Cryptographers’ Track at the RSA Conference, 19-36, 2016
412016
Cryptographic reverse firewall via malleable smooth projective hash functions
R Chen, Y Mu, G Yang, W Susilo, F Guo, M Zhang
International Conference on the Theory and Application of Cryptology and …, 2016
392016
Strong authenticated key exchange with auxiliary inputs
R Chen, Y Mu, G Yang, W Susilo, F Guo
Designs, Codes and Cryptography 85 (1), 145-173, 2017
292017
Recipient revocable identity-based broadcast encryption: How to revoke some recipients in IBBE without knowledge of the plaintext
W Susilo, R Chen, F Guo, G Yang, Y Mu, YW Chow
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
282016
Anonymous identity-based broadcast encryption with revocation for file sharing
J Lai, Y Mu, F Guo, W Susilo, R Chen
Australasian Conference on Information Security and Privacy, 223-239, 2016
262016
An efficient privacy‐preserving aggregation and billing protocol for smart grid
XF Wang, Y Mu, RM Chen
Security and Communication Networks 9 (17), 4536-4547, 2016
252016
Secure channel free id-based searchable encryption for peer-to-peer group
XF Wang, Y Mu, R Chen, XS Zhang
Journal of Computer Science and Technology 31 (5), 1012-1027, 2016
222016
Toward highly secure yet efficient KNN classification scheme on outsourced cloud data
L Liu, J Su, X Liu, R Chen, K Huang, RH Deng, X Wang
IEEE Internet of Things Journal 6 (6), 9841-9852, 2019
192019
Fully privacy-preserving and revocable ID-based broadcast encryption for data access control in smart city
J Lai, Y Mu, F Guo, W Susilo, R Chen
Personal and Ubiquitous Computing 21 (5), 855-868, 2017
172017
One-round privacy-preserving meeting location determination for smartphone applications
X Wang, Y Mu, R Chen
IEEE Transactions on Information Forensics and Security 11 (8), 1712-1721, 2016
152016
Optimal security reductions for unique signatures: bypassing impossibilities with a counterexample
F Guo, R Chen, W Susilo, J Lai, G Yang, Y Mu
Annual International Cryptology Conference, 517-547, 2017
142017
Privacy-preserving mining of association rule on outsourced cloud data from multiple parties
L Liu, J Su, R Chen, X Liu, X Wang, S Chen, H Leung
Australasian Conference on Information Security and Privacy, 431-451, 2018
132018
Towards practical privacy-preserving decision tree training and evaluation in the cloud
L Liu, R Chen, X Liu, J Su, L Qiao
IEEE Transactions on Information Forensics and Security 15, 2914-2929, 2020
122020
A practical authentication framework for VANETs
B Wang, Y Wang, R Chen
Security and communication networks 2019, 2019
122019
Fully privacy-preserving ID-based broadcast encryption with authorization
J Lai, Y Mu, F Guo, R Chen
The Computer Journal 60 (12), 1809-1821, 2017
122017
Asymmetric subversion attacks on signature schemes
C Liu, R Chen, Y Wang, Y Wang
Australasian Conference on Information Security and Privacy, 376-395, 2018
102018
The system can't perform the operation now. Try again later.
Articles 1–20