2025
Understanding Consumer Acceptance for Blockchain-Based Digital Payment Systems in Bhutan.
Future Internet, 2025
2024
Factors Affecting Trust and Acceptance for Blockchain Adoption in Digital Payment Systems: A Systematic Review.
Future Internet, March, 2024
UAV Control Method Combining Reptile Meta-Reinforcement Learning and Generative Adversarial Imitation Learning.
Future Internet, March, 2024
Secure Internet of Things in Cloud Computing via Puncturable Attribute-Based Encryption With User Revocation.
IEEE Internet Things J., January, 2024
Outsourced Privately Verifiable Proofs of Retrievability via Blockchain.
IEEE Trans. Dependable Secur. Comput., 2024
Pay-Per-Proof: Decentralized Outsourced Multi-User PoR for Cloud Storage Payment Using Blockchain.
IEEE Trans. Cloud Comput., 2024
Advancing face detection efficiency: Utilizing classification networks for lowering false positive incidences.
Array, 2024
BDEC: Enhancing Learning Credibility via Post-quantum Digital Credentials.
Proceedings of the Provable and Practical Security, 2024
Blockchain for Smart Logistics: Enhancing Identity Security, Bidding Transparency and Goods Tracking.
Proceedings of the 6th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2024
A Blockchain-Based Digital Identity Management System via Decentralized Anonymous Credentials.
Proceedings of the 6th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2024
SecuPath: A Secure and Privacy-Preserving Multiparty Path Planning Framework in UAV Applications.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
2023
Vehicloak: A Blockchain-Enabled Privacy-Preserving Payment Scheme for Location-Based Vehicular Services.
IEEE Trans. Mob. Comput., November, 2023
Revocable Policy-Based Chameleon Hash for Blockchain Rewriting.
Comput. J., October, 2023
Password-authenticated proofs of retrievability for multiple devices checking cloud data.
J. Inf. Secur. Appl., June, 2023
A Review of Homomorphic Encryption for Privacy-Preserving Biometrics.
Sensors, April, 2023
Token-Based Biometric Enhanced Key Derivation for Authentication Over Wireless Networks.
IEEE Trans. Netw. Sci. Eng., 2023
HIBEChain: A Hierarchical Identity-Based Blockchain System for Large-Scale IoT.
IEEE Trans. Dependable Secur. Comput., 2023
Multi-Keyword Searchable and Verifiable Attribute-Based Encryption Over Cloud Data.
IEEE Trans. Cloud Comput., 2023
Secure and Efficient Smart Healthcare System Based on Federated Learning.
Int. J. Intell. Syst., 2023
2021
Two-Factor Decryption: A Better Way to Protect Data Security and Privacy.
Comput. J., 2021
Improved Security Model for Public-Key Authenticated Encryption with Keyword Search.
Proceedings of the Provable and Practical Security, 2021
Forward-Secure Revocable Identity-Based Encryption.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
2020
Pay as You Decrypt: Decryption Outsourcing for Functional Encryption Using Blockchain.
IEEE Trans. Inf. Forensics Secur., 2020
Robust digital signature revisited.
Theor. Comput. Sci., 2020
Key regeneration-free ciphertext-policy attribute-based encryption and its application.
Inf. Sci., 2020
Server-aided revocable attribute-based encryption for cloud computing services.
Concurr. Comput. Pract. Exp., 2020
2019
A lightweight authentication scheme for vehicular ad hoc networks based on MSR.
Veh. Commun., 2019
An Attribute-Based Framework for Secure Communications in Vehicular Ad Hoc Networks.
IEEE/ACM Trans. Netw., 2019
Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud.
IEEE Trans. Big Data, 2019
DABKE: Secure deniable attribute-based key exchange framework.
J. Comput. Secur., 2019
(Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance.
Inf. Sci., 2019
A new privacy-preserving authentication protocol for anonymous web browsing.
Concurr. Comput. Pract. Exp., 2019
2018
Server-Aided Attribute-Based Signature With Revocation for Resource-Constrained Industrial-Internet-of-Things Devices.
IEEE Trans. Ind. Informatics, 2018
Efficient and Expressive Keyword Search Over Encrypted Data in Cloud.
IEEE Trans. Dependable Secur. Comput., 2018
Attribute-based cloud storage with secure provenance over encrypted data.
Future Gener. Comput. Syst., 2018
An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited.
Comput. Networks, 2018
Achieving Scalable Access Control Over Encrypted Data for Edge Computing Networks.
IEEE Access, 2018
2017
Attribute-Based Secure Messaging in the Public Cloud.
Proceedings of the A Systems Approach to Cyber Security, 2017
Fuzzy Public-Key Encryption Based on Biometric Data.
Proceedings of the Provable Security, 2017
A Practical Authentication Protocol for Anonymous Web Browsing.
Proceedings of the Information Security Practice and Experience, 2017
Server-Aided Revocable Attribute-Based Encryption Resilient to Decryption Key Exposure.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017
Attribute-Based Encryption with Expressive and Authorized Keyword Search.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
2016
Relations between robustness and RKA security under public-key encryption.
Theor. Comput. Sci., 2016
Escrow free attribute-based signature with self-revealability.
Inf. Sci., 2016
Revocable and Decentralized Attribute-Based Encryption.
Comput. J., 2016
Attribute-Based Encryption with Granular Revocation.
Proceedings of the Security and Privacy in Communication Networks, 2016
An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures.
Proceedings of the Provable Security, 2016
Server-Aided Revocable Attribute-Based Encryption.
Proceedings of the Computer Security - ESORICS 2016, 2016
2015
Proof of retrievability with public verifiability resilient against related-key attacks.
IET Inf. Secur., 2015
2014
Anonymous broadcast encryption with an untrusted gateway.
Int. J. Secur. Networks, 2014
Signcryption Secure Against Linear Related-Key Attacks.
Comput. J., 2014
Public-Key Encryption Resilient against Linear Related-Key Attacks Revisited.
Proceedings of the 13th IEEE International Conference on Trust, 2014
Complete Robustness in Identity-Based Encryption.
Proceedings of the Provable Security - 8th International Conference, 2014
2013
Server-aided identity-based anonymous broadcast encryption.
Int. J. Secur. Networks, 2013
Verifiable and Anonymous Encryption in Asymmetric Bilinear Maps.
Proceedings of the 12th IEEE International Conference on Trust, 2013
Public-Key Encryption Resilient to Linear Related-Key Attacks.
Proceedings of the Security and Privacy in Communication Networks, 2013
Anonymous Signcryption against Linear Related-Key Attacks.
Proceedings of the Provable Security - 7th International Conference, 2013
2011
A Secure Anonymous Identity-based Key Agreement Protocol for Distributed Computer Networks.
J. Networks, 2011
2009
An Novel Anonymous Authenticated and Key Exchange Protocol.
J. Networks, 2009
Controlled Secret Leakage.
J. Comput., 2009