A cloud data deduplication scheme based on certificateless proxy re-encryption X Zheng, Y Zhou, Y Ye, F Li Journal of Systems Architecture 102, 101666, 2020 | 52 | 2020 |
A blockchain-based access control scheme for smart grids Y Zhou, Y Guan, Z Zhang, F Li 2019 International Conference on Networking and Network Applications (NaNA …, 2019 | 42 | 2019 |
Searchable public-key encryption with cryptographic reverse firewalls for cloud storage Y Zhou, Z Hu, F Li IEEE Transactions on Cloud Computing 11 (1), 383-396, 2021 | 32 | 2021 |
Certificateless public key encryption with cryptographic reverse firewalls Y Zhou, J Guo, F Li Journal of Systems Architecture 109, 101754, 2020 | 28 | 2020 |
Backdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networks Y Zhou, L Zhao, Y Jin, F Li Information Sciences 604, 80-96, 2022 | 26 | 2022 |
Identity-based combined public key schemes for signature, encryption, and signcryption Y Zhou, Z Li, F Hu, F Li Information Technology and Applied Mathematics: ICITAM 2017, 3-22, 2019 | 25 | 2019 |
A heterogeneous user authentication and key establishment for mobile client–server environment F Li, J Wang, Y Zhou, C Jin, SKH Islam Wireless Networks 26, 913-924, 2020 | 14 | 2020 |
Cryptographic reverse firewalls for identity-based encryption Y Zhou, Y Guan, Z Zhang, F Li Frontiers in Cyber Security: Second International Conference, FCS 2019, Xi …, 2019 | 11 | 2019 |
Secure and achievable heterogeneous access control scheme for wireless body area networks Z Li, Y Zhou Frontiers in Cyber Security: First International Conference, FCS 2018 …, 2018 | 3 | 2018 |
A heterogeneous authenticated key establishment protocol for Internet of drones Y Jin, Y Zhou, J Ji, P Li, F Li 2021 IEEE 3rd International Conference on Civil Aviation Safety and …, 2021 | 1 | 2021 |