Auditable -Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing J Ning, Z Cao, X Dong, K Liang, H Ma, L Wei
IEEE Transactions on Information Forensics and Security 13 (1), 94-105, 2017
209 2017 Revisiting attribute-based encryption with verifiable outsourced decryption S Lin, R Zhang, H Ma, M Wang
IEEE Transactions on Information Forensics and Security 10 (10), 2119-2130, 2015
167 2015 Verifiable and exculpable outsourced attribute-based encryption for access control in cloud computing H Ma, R Zhang, Z Wan, Y Lu, S Lin
IEEE transactions on dependable and secure computing 14 (6), 679-692, 2017
111 2017 Fine-grained access control system based on fully outsourced attribute-based encryption R Zhang, H Ma, Y Lu
Journal of Systems and Software 125, 344-353, 2017
70 2017 Efficient fine-grained data sharing mechanism for electronic medical record systems with mobile devices H Ma, R Zhang, G Yang, Z Song, K He, Y Xiao
IEEE Transactions on Dependable and Secure Computing 17 (5), 1026-1038, 2018
56 2018 Efficient Multi-Factor Authenticated Key Exchange Scheme for Mobile Communications R Zhang, Y Xiao, S Sun, H Ma
IEEE Transactions on Dependable and Secure Computing 16 (4), 625-634, 2019
44 2019 Efficient Parallelism of Post-Quantum Signature Scheme SPHINCS S Sun, R Zhang, M Hui
IEEE Transactions on Parallel and Distributed Systems 31 (11), 2542-2555, 2020
38 2020 Concessive online/offline attribute based encryption with cryptographic reverse firewalls—Secure and efficient fine-grained access control on corrupted machines H Ma, R Zhang, G Yang, Z Song, S Sun, Y Xiao
Computer Security: 23rd European Symposium on Research in Computer Security …, 2018
36 2018 Access control encryption based on LWE G Tan, R Zhang, H Ma, Y Tao
Proceedings of the 4th ACM International Workshop on ASIA Public-Key …, 2017
31 2017 Server-aided fine-grained access control mechanism with robust revocation in cloud computing H Ma, R Zhang, S Sun, Z Song, G Tan
IEEE Transactions on Services Computing 15 (1), 164-173, 2019
28 2019 Wolverine: A scalable and transaction-consistent redactable permissionless blockchain J Li, H Ma, J Wang, Z Song, W Xu, R Zhang
IEEE Transactions on Information Forensics and Security 18, 1653-1666, 2023
23 2023 Provably secure cloud storage for mobile networks with less computation and smaller overhead R Zhang, H Ma, Y Lu, Y Li
Science China Information Sciences 60, 1-13, 2017
22 2017 Fully Accountable Data Sharing for Pay-As-You-Go Cloud Scenes T Wang, H Ma, Y Zhou, R Zhang, Z Song
IEEE Transactions on Dependable and Secure Computing, 2019
21 2019 RKA security of identity-based homomorphic signature scheme J Chang, H Ma, A Zhang, M Xu, R Xue
IEEE Access 7, 50858-50868, 2019
20 2019 Comments on “control cloud data access privilege and anonymity with fully anonymous attribute-based encryption” H Ma, R Zhang, W Yuan
IEEE Transactions on Information Forensics and Security 11 (4), 866-867, 2015
18 2015 WebCloud: Web-Based Cloud Storage for Secure Data Sharing across Platforms S Sun, H Ma, R Zhang, Z Song
IEEE Transactions on Dependable and Secure Computing, 2020
17 2020 Everything under control: secure data sharing mechanism for cloud-edge computing Z Song, H Ma, R Zhang, W Xu, J Li
IEEE Transactions on Information Forensics and Security 18, 2234-2249, 2023
13 2023 Server-aided immediate and robust user revocation mechanism for SM9 S Sun, H Ma, R Zhang, W Xu
Cybersecurity 3 (1), 12, 2020
11 2020 Flexible and controllable access policy update for encrypted data sharing in the cloud T Wang, Y Zhou, H Ma, R Zhang
The Computer Journal 66 (6), 1507-1524, 2023
6 2023 Enhanced Dual‐Policy Attribute‐Based Encryption for Secure Data Sharing in the Cloud T Wang, Y Zhou, H Ma, R Zhang
Security and Communication Networks 2022 (1), 1867584, 2022
6 2022