متابعة
Liming Fang
Liming Fang
بريد إلكتروني تم التحقق منه على nuaa.edu.cn
عنوان
عدد مرات الاقتباسات
عدد مرات الاقتباسات
السنة
A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security
K Liang, L Fang, W Susilo, DS Wong
2013 5th international conference on intelligent networking and …, 2013
3342013
Public key encryption with keyword search secure against keyword guessing attacks without random oracle
L Fang, W Susilo, C Ge, J Wang
Information sciences 238, 221-241, 2013
2732013
Revocable identity-based broadcast proxy re-encryption for data sharing in clouds
C Ge, Z Liu, J Xia, L Fang
IEEE transactions on dependable and secure computing 18 (3), 1214-1226, 2019
2042019
Secure keyword search and data sharing mechanism for cloud computing
C Ge, W Susilo, Z Liu, J Xia, P Szalachowski, L Fang
IEEE Transactions on Dependable and Secure Computing 18 (6), 2787-2800, 2020
1762020
Revocable attribute-based encryption with data integrity in clouds
C Ge, W Susilo, J Baek, Z Liu, J Xia, L Fang
IEEE Transactions on Dependable and Secure Computing 19 (5), 2864-2872, 2021
1622021
Provably secure dynamic ID-based anonymous two-factor authenticated key exchange protocol with extended security model
Q Xie, DS Wong, G Wang, X Tan, K Chen, L Fang
IEEE Transactions on Information Forensics and Security 12 (6), 1382-1392, 2017
1562017
A verifiable and fair attribute-based proxy re-encryption scheme for data sharing in clouds
C Ge, W Susilo, J Baek, Z Liu, J Xia, L Fang
IEEE Transactions on Dependable and Secure Computing 19 (5), 2907-2919, 2021
1402021
A secure channel free public key encryption with keyword search scheme without random oracle
L Fang, W Susilo, C Ge, J Wang
Cryptology and Network Security: 8th International Conference, CANS 2009 …, 2009
1182009
Cluster-guided contrastive graph clustering network
X Yang, Y Liu, S Zhou, S Wang, W Tu, Q Zheng, X Liu, L Fang, E Zhu
Proceedings of the AAAI conference on artificial intelligence 37 (9), 10834 …, 2023
1002023
A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system
C Ge, W Susilo, L Fang, J Wang, Y Shi
Designs, Codes and Cryptography 86, 2587-2603, 2018
782018
Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search
L Fang, W Susilo, C Ge, J Wang
Theoretical Computer Science 462, 39-58, 2012
772012
Anonymous conditional proxy re-encryption without random oracle
L Fang, W Susilo, J Wang
Provable Security: Third International Conference, ProvSec 2009, Guangzhou …, 2009
732009
A large-scale empirical study on the vulnerability of deployed IoT devices
B Zhao, S Ji, WH Lee, C Lin, H Weng, J Wu, P Zhou, L Fang, R Beyah
IEEE Transactions on Dependable and Secure Computing 19 (3), 1826-1840, 2020
712020
A blockchain based decentralized data security mechanism for the Internet of Things
C Ge, Z Liu, L Fang
Journal of Parallel and Distributed Computing 141, 1-9, 2020
602020
A proxy broadcast re-encryption for cloud data sharing
M Sun, C Ge, L Fang, J Wang
Multimedia Tools and Applications 77, 10455-10469, 2018
592018
Privacy protection for medical data sharing in smart healthcare
L Fang, C Yin, J Zhu, C Ge, M Tanveer, A Jolfaei, Z Cao
ACM Transactions on Multimedia Computing, Communications, and Applications …, 2020
542020
A practical model based on anomaly detection for protecting medical IoT control services against external attacks
L Fang, Y Li, Z Liu, C Yin, M Li, ZJ Cao
IEEE Transactions on Industrial Informatics 17 (6), 4260-4269, 2020
532020
THP: A novel authentication scheme to prevent multiple attacks in SDN-based IoT network
L Fang, Y Li, X Yun, Z Wen, S Ji, W Meng, Z Cao, M Tanveer
IEEE Internet of Things Journal 7 (7), 5745-5759, 2019
512019
Identity-based conditional proxy re-encryption with fine grain policy
C Ge, W Susilo, J Wang, L Fang
Computer Standards & Interfaces 52, 1-9, 2017
482017
A hybrid fuzzy convolutional neural network based mechanism for photovoltaic cell defect detection with electroluminescence images
C Ge, Z Liu, L Fang, H Ling, A Zhang, C Yin
IEEE Transactions on Parallel and Distributed Systems 32 (7), 1653-1664, 2020
462020
يتعذر على النظام إجراء العملية في الوقت الحالي. عاود المحاولة لاحقًا.
مقالات 1–20