2025
Enabling flexible multiple-replica cloud storage integrity auditing for cloud-based IoT data.
J. Syst. Archit., 2025
Popularity-based multiple-replica cloud storage integrity auditing for big data.
Future Gener. Comput. Syst., 2025
2024
Enabling Privacy-Preserving Boolean kNN Query Over Cloud-Based Spatial Data.
IEEE Internet Things J., December, 2024
Privacy-Preserving Naïve Bayesian Classification for Health Monitoring Systems.
IEEE Trans. Ind. Informatics, October, 2024
Towards efficient Secure Boolean Range Query over encrypted spatial data.
Comput. Secur., January, 2024
Enabling Privacy-Preserving $K$K-Hop Reachability Query Over Encrypted Graphs.
IEEE Trans. Serv. Comput., 2024
Privacy-Preserving Time-Based Auditing for Secure Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2024
Privacy-Preserving Graph Matching Query Supporting Quick Subgraph Extraction.
IEEE Trans. Dependable Secur. Comput., 2024
Privacy-preserving verifiable fuzzy phrase search over cloud-based data.
J. Inf. Secur. Appl., 2024
Enabling privacy-preserving non-interactive computation for Hamming distance.
Inf. Sci., 2024
2023
Lightweight Secure Deduplication Based on Data Popularity.
IEEE Syst. J., December, 2023
Enabling Secure Data sharing with data deduplication and sensitive information hiding in cloud-assisted Electronic Medical Systems.
Clust. Comput., December, 2023
Verifiable fuzzy keyword search supporting sensitive information hiding for data sharing in cloud-assisted e-healthcare systems.
J. Syst. Archit., September, 2023
Secure auditing and deduplication with efficient ownership management for cloud storage.
J. Syst. Archit., September, 2023
Privacy-Preserving Shortest Distance Query for Dynamic Large-Scale Road Network.
IEEE Syst. J., June, 2023
Privacy-Preserving Face Recognition With Multi-Edge Assistance for Intelligent Security Systems.
IEEE Internet Things J., 2023
2022
Verifiable Keyword Search Supporting Sensitive Information Hiding for the Cloud-Based Healthcare Sharing System.
IEEE Trans. Ind. Informatics, 2022
Secure Edge-Aided Computations for Social Internet-of-Things Systems.
IEEE Trans. Comput. Soc. Syst., 2022
A Secure Encrypted Data Deduplication Scheme Based on Data Popularity Supporting Dynamic Ownership Management.
Proceedings of the 5th International Conference on Big Data Technologies, 2022
2021
Comments on "SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage".
IEEE Trans. Serv. Comput., 2021
Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification.
IEEE Trans. Dependable Secur. Comput., 2021
Data Integrity Auditing without Private Key Storage for Secure Cloud Storage.
IEEE Trans. Cloud Comput., 2021
Privacy-Preserving Phrase Search over Encrypted Data.
Proceedings of the ICBDT 2021: 4th International Conference on Big Data Technologies, Zibo, China, September 24, 2021
2020
Comment on "Privacy-preserving public auditing for non-manager group shared data".
J. Supercomput., 2020
Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data.
IEEE Trans. Dependable Secur. Comput., 2020
Secure Computation Outsourcing for Inversion in Finite Field.
J. Internet Serv. Inf. Secur., 2020
Lightweight Cloud Storage Auditing With Deduplication Supporting Strong Privacy Protection.
IEEE Access, 2020
2019
Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2019
Cloud storage auditing with deduplication supporting different security levels according to data popularity.
J. Netw. Comput. Appl., 2019
Forward Secure Conjunctive-Keyword Searchable Encryption.
IEEE Access, 2019
A Note on "Enhancing cloud storage security against a new replay attack with an efficient public auditing scheme".
Proceedings of the 2nd International Conference on Big Data Technologies, 2019
2018
Intrusion-resilient identity-based signatures: Concrete scheme in the standard model and generic construction.
Inf. Sci., 2018
Provable Multiple-Replica Dynamic Data Possession for Big Data Storage in Cloud Computing.
Int. J. Netw. Secur., 2018
Enabling secure auditing and deduplicating data without owner-relationship exposure in cloud storage.
Clust. Comput., 2018
Enabling Efficient Verifiable Fuzzy Keyword Search Over Encrypted Data in Cloud Computing.
IEEE Access, 2018
A hybrid differential evolution and estimation of distribution algorithm for the multi-point dynamic aggregation problem.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2018
2017
How to securely outsource the inversion modulo a large composite number.
J. Syst. Softw., 2017
Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium.
J. Netw. Comput. Appl., 2017
An Efficient Symmetric Searchable Encryption Scheme for Cloud Storage.
J. Internet Serv. Inf. Secur., 2017
Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data.
Inf. Sci., 2017
Remote data possession checking with privacy-preserving authenticators for cloud storage.
Future Gener. Comput. Syst., 2017
2016
Forward-Secure Identity-Based Signature Scheme in Untrusted Update Environments.
Wirel. Pers. Commun., 2016
Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability.
J. Syst. Softw., 2016
Access-Authorizing and Privacy-Preserving Auditing with Group Dynamic for Shared Cloud Data.
KSII Trans. Internet Inf. Syst., 2016
IRIBE: Intrusion-resilient identity-based encryption.
Inf. Sci., 2016
A public cloud storage auditing scheme for resource-constrained clients.
Int. J. High Perform. Syst. Archit., 2016
A Note on "IPad: ID-Based Public Auditing for the Outsourced Data in the Standard Model".
Proceedings of the Cloud Computing and Security - Second International Conference, 2016
2015
A Public Cloud Storage Auditing Scheme with Lightweight Authenticator Generation.
Proceedings of the 10th International Conference on P2P, 2015
A Novel Privacy Preserving Keyword Search Scheme over Encrypted Cloud Data.
Proceedings of the 10th International Conference on P2P, 2015
2014
One forward-secure signature scheme using bilinear maps and its applications.
Inf. Sci., 2014
Key-insulated aggregate signature.
Frontiers Comput. Sci., 2014
2013
Security analysis and improvement of two verifiable multi-secret sharing schemes.
Int. J. Secur. Networks, 2013
2012
Intrusion-resilient identity-based signature: Security definition and construction.
J. Syst. Softw., 2012
Non-Interactive Forward-Secure Threshold Signature without Random Oracles.
J. Inf. Sci. Eng., 2012
Erratum to the paper: Forward-Secure Identity-Based Public-Key Encryption without Random Oracles.
Fundam. Informaticae, 2012
2011
New Forward-Secure Signature Scheme with Untrusted Update.
J. Inf. Sci. Eng., 2011
Forward-secure identity-based signature: Security notions and construction.
Inf. Sci., 2011
Forward-Secure Identity-Based Public-Key Encryption without Random Oracles.
Fundam. Informaticae, 2011
Two Protocols for Member Revocation in Secret Sharing Schemes.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2011
2010
Forward-Secure Multisignature, Threshold Signature and Blind Signature Schemes.
J. Networks, 2010
2009
A Forward Secure Threshold Signature Scheme Based on the Structure of Binary Tree.
J. Softw., 2009
2008
How to Construct Forward Secure Single-Server, Multi-Server and Threshold-Server Assisted Signature Schemes Using Bellare-Miner Scheme.
J. Commun., 2008
Publicly Verifiable Secret Sharing Member-join Protocol For Threshold Signatures.
J. Commun., 2008
A Publicly Verifiable Dynamic Sharing Protocol for Data Secure Storage.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008
Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005.
Proceedings of the Provable Security, Second International Conference, 2008
Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps.
Proceedings of the Provable Security, Second International Conference, 2008
How to Publicly Verifiably Expand a Member without Changing Old Shares in a Secret Sharing Scheme.
Proceedings of the Intelligence and Security Informatics, 2008
Construction of Server-assisted Forward Secure Signature Using Bellare-Miner Scheme.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008
2007
Publicly Verifiable Secret Sharing with Enrollment Ability.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
2006
Forward Secure Threshold Signature Scheme from Bilinear Pairings.
Proceedings of the Computational Intelligence and Security, International Conference, 2006