2025
PH-MG-ABE: A Flexible Policy-Hidden Multigroup Attribute-Based Encryption Scheme for Secure Cloud Storage.
IEEE Internet Things J., January, 2025
2024
OABS: Efficient Outsourced Attribute-Based Signature Scheme With Constant Size.
IEEE Internet Things J., December, 2024
Efficient Revocable Attribute-Based Encryption With Verifiable Data Integrity.
IEEE Internet Things J., March, 2024
IoT Privacy-Preserving Data Mining With Dynamic Incentive Mechanism.
IEEE Internet Things J., January, 2024
OLBS: Oblivious Location-Based Services.
IEEE Trans. Inf. Forensics Secur., 2024
Guest Editorial IEEE Transactions on Emerging Topics in Computing Special Section on Advances in Emerging Privacy-Preserving Computing.
IEEE Trans. Emerg. Top. Comput., 2024
Privacy-Preserving Decentralized Functional Encryption for Inner Product.
IEEE Trans. Dependable Secur. Comput., 2024
Similarity-Based Secure Deduplication for IIoT Cloud Management System.
IEEE Trans. Dependable Secur. Comput., 2024
Blockchain-based privacy-preserving public key searchable encryption with strong traceability.
J. Syst. Archit., 2024
Multi-client Functional Encryption for Set Intersection with Non-monotonic Access Structures in Federated Learning.
CoRR, 2024
Privacy-Preserving Traceable Functional Encryption for Inner Product.
CoRR, 2024
Privacy-Preserving Confidential Reporting System With Designated Reporters.
Comput. J., 2024
2023
SecuCar: Data Loss Prevention for Cloud Assisted VSS Based on Public Auditing Technique.
IEEE Trans. Veh. Technol., November, 2023
DFE-IP: Delegatable functional encryption for inner product.
Inf. Sci., November, 2023
TFS-ABS: Traceable and Forward-Secure Attribute-Based Signature Scheme With Constant-Size.
IEEE Trans. Knowl. Data Eng., September, 2023
Similarity-based deduplication and secure auditing in IoT decentralized storage.
J. Syst. Archit., September, 2023
Multiauthority Attribute-Based Encryption for Assuring Data Deletion.
IEEE Syst. J., June, 2023
RIS-assisted physical layer key generation by exploiting randomness from channel coefficients of reflecting elements and OFDM subcarriers.
Ad Hoc Networks, 2023
2022
Efficient Attribute Based Server-Aided Verification Signature.
IEEE Trans. Serv. Comput., 2022
Redactable Signature-Based Public Auditing Scheme With Sensitive Data Sharing for Cloud Storage.
IEEE Syst. J., 2022
Lightweight ID-based broadcast signcryption for cloud-fog-assisted IoT.
J. Syst. Archit., 2022
Key escrow-free attribute based encryption with user revocation.
Inf. Sci., 2022
Decentralized Attribute-Based Server-Aid Signature in the Internet of Things.
IEEE Internet Things J., 2022
An empirical study of supervised email classification in Internet of Things: Practical performance and key influencing factors.
Int. J. Intell. Syst., 2022
2021
Privacy-Preserving Electronic Ticket Scheme with Attribute-Based Credentials.
IEEE Trans. Dependable Secur. Comput., 2021
An efficient identity-based signature scheme with provable security.
Inf. Sci., 2021
Editorial for accountability and privacy issues in blockchain and cryptocurrency.
Future Gener. Comput. Syst., 2021
A Privacy-Preserving Logistics Information System with Traceability.
Proceedings of the Cyberspace Safety and Security - 13th International Symposium, 2021
2020
A Blockchain-Based Public Auditing Scheme for Cloud Storage Environment without Trusted Auditors.
Wirel. Commun. Mob. Comput., 2020
VOD-ADAC: Anonymous Distributed Fine-Grained Access Control Protocol with Verifiable Outsourced Decryption in Public Cloud.
IEEE Trans. Serv. Comput., 2020
Full Verifiability for Outsourced Decryption in Attribute Based Encryption.
IEEE Trans. Serv. Comput., 2020
Anonymous Single Sign-On With Proxy Re-Verification.
IEEE Trans. Inf. Forensics Secur., 2020
A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscation.
Soft Comput., 2020
Reversible data hiding in encrypted images for coding channel based on adaptive steganography.
IET Image Process., 2020
Special Issue on Cryptographic Currency and Blockchain Technology.
Future Gener. Comput. Syst., 2020
2019
Keyword Attacks and Privacy Preserving in Public-Key-Based Searchable Encryption.
Proceedings of the Encyclopedia of Big Data Technologies., 2019
Fine-grained information flow control using attributes.
Inf. Sci., 2019
Toward Practical Privacy-Preserving Processing Over Encrypted Data in IoT: An Assistive Healthcare Use Case.
IEEE Internet Things J., 2019
Enhancing the security of FinTech applications with map-based graphical password authentication.
Future Gener. Comput. Syst., 2019
Oblivious Location-Based Service Query.
CoRR, 2019
Attribute-Based Information Flow Control.
Comput. J., 2019
2018
Expressive attribute-based keyword search with constant-size ciphertext.
Soft Comput., 2018
User Collusion Avoidance CP-ABE With Efficient Attribute Revocation for Cloud Storage.
IEEE Syst. J., 2018
Message from the Guest Editors.
Int. J. Inf. Sec., 2018
Towards leakage-resilient fine-grained access control in fog computing.
Future Gener. Comput. Syst., 2018
When Intrusion Detection Meets Blockchain Technology: A Review.
IEEE Access, 2018
CPMap: Design of Click-Points Map-Based Graphical Password Authentication.
Proceedings of the ICT Systems Security and Privacy Protection, 2018
Towards Securing Challenge-Based Collaborative Intrusion Detection Networks via Message Verification.
Proceedings of the Information Security Practice and Experience, 2018
Anonymous Single-Sign-On for n Designated Services with Traceability.
Proceedings of the Computer Security, 2018
2017
Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing.
IEEE Trans. Serv. Comput., 2017
KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage.
IEEE Trans. Serv. Comput., 2017
A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2017
Int. J. Found. Comput. Sci., 2017
PPETS-FGP: Privacy-Preserving Electronic Ticket Scheme with Fine-Grained Pricing.
CoRR, 2017
An Efficient Key-Policy Attribute-Based Searchable Encryption in Prime-Order Groups.
Proceedings of the Provable Security, 2017
Automatic Encryption Schemes Based on the Neural Networks: Analysis and Discussions on the Various Adversarial Models (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017
2016
User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption.
IEEE Trans. Computers, 2016
ABKS-CSC: attribute-based keyword search with constant-size ciphertexts.
Secur. Commun. Networks, 2016
Accountable mobile E-commerce scheme via identity-based plaintext-checkable encryption.
Inf. Sci., 2016
Improved handover authentication and key pre-distribution for wireless mesh networks.
Concurr. Comput. Pract. Exp., 2016
Leakage-Resilient Functional Encryption via Pair Encodings.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption.
IEEE Trans. Inf. Forensics Secur., 2015
AAC-OT: Accountable Oblivious Transfer With Access Control.
IEEE Trans. Inf. Forensics Secur., 2015
Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation.
Int. J. Inf. Sec., 2015
2014
Identity-Based Secure DistributedData Storage Schemes.
IEEE Trans. Computers, 2014
PPDCP-ABE: Privacy-Preserving Decentralized Cipher-Policy Attribute-Based Encryption.
IACR Cryptol. ePrint Arch., 2014
Attribute-Based Data Transfer with Filtering Scheme in Cloud Computing.
Comput. J., 2014
PPDCP-ABE: Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption.
Proceedings of the Computer Security - ESORICS 2014, 2014
2013
Identity-based data storage in cloud computing.
Future Gener. Comput. Syst., 2013
2012
Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption.
IEEE Trans. Parallel Distributed Syst., 2012
New constructions of OSBE schemes and their applications in oblivious access control.
Int. J. Inf. Sec., 2012
Efficient oblivious transfers with access control.
Comput. Math. Appl., 2012
Attribute-Based Oblivious Access Control.
Comput. J., 2012
2010
A Generic Construction of Dynamic Single Sign-on with Strong Security.
Proceedings of the Security and Privacy in Communication Networks, 2010