Dual-server public-key encryption with keyword search for secure cloud storage R Chen, Y Mu, G Yang, F Guo, X Wang IEEE transactions on information forensics and security 11 (4), 789-798, 2015 | 297 | 2015 |
Server-aided public key encryption with keyword search R Chen, Y Mu, G Yang, F Guo, X Huang, X Wang, Y Wang IEEE Transactions on Information Forensics and Security 11 (12), 2833-2842, 2016 | 159 | 2016 |
Building redactable consortium blockchain for industrial Internet-of-Things K Huang, X Zhang, Y Mu, X Wang, G Yang, X Du, F Rezaeibagha, Q Xia, ... IEEE Transactions on Industrial Informatics 15 (6), 3670-3679, 2019 | 112 | 2019 |
A new general framework for secure public key encryption with keyword search R Chen, Y Mu, G Yang, F Guo, X Wang Information Security and Privacy: 20th Australasian Conference, ACISP 2015 …, 2015 | 110 | 2015 |
Privacy-preserving raw data collection without a trusted authority for IoT YN Liu, YP Wang, XF Wang, Z Xia, JF Xu Computer Networks 148, 340-348, 2019 | 109 | 2019 |
File-centric multi-key aggregate keyword searchable encryption for industrial internet of things R Zhou, X Zhang, X Du, X Wang, G Yang, M Guizani IEEE Transactions on Industrial Informatics 14 (8), 3648-3658, 2018 | 107 | 2018 |
Lightweight searchable encryption protocol for industrial internet of things K Zhang, J Long, X Wang, HN Dai, K Liang, M Imran IEEE Transactions on Industrial Informatics 17 (6), 4248-4259, 2020 | 96 | 2020 |
A smart grid AMI intrusion detection strategy based on extreme learning machine K Zhang, Z Hu, Y Zhan, X Wang, K Guo Energies 13 (18), 4907, 2020 | 40 | 2020 |
UAV-enabled data acquisition scheme with directional wireless energy transfer for Internet of Things Y Liu, HN Dai, H Wang, M Imran, X Wang, M Shoaib Computer Communications 155, 184-196, 2020 | 40 | 2020 |
An efficient privacy‐preserving aggregation and billing protocol for smart grid XF Wang, Y Mu, RM Chen Security and Communication Networks 9 (17), 4536-4547, 2016 | 40 | 2016 |
Secure channel free id-based searchable encryption for peer-to-peer group XF Wang, Y Mu, R Chen, XS Zhang Journal of Computer Science and Technology 31, 1012-1027, 2016 | 39 | 2016 |
Efficient and traceable patient health data search system for hospital management in smart cities R Zhou, X Zhang, X Wang, G Yang, N Guizani, X Du IEEE Internet of Things Journal 8 (8), 6425-6436, 2020 | 34 | 2020 |
A new somewhat homomorphic encryption scheme over integers HM Yang, Q Xia, X Wang, D Tang 2012 International Conference on Computer Distributed Control and …, 2012 | 34 | 2012 |
EBAA: An efficient broadcast authentication scheme for ADS-B communication based on IBS-MR H Yang, R Huang, X Wang, J Deng, R Chen Chinese Journal of Aeronautics 27 (3), 688-696, 2014 | 31 | 2014 |
Privacy-preserving data search with fine-grained dynamic search right management in fog-assisted Internet of Things R Zhou, X Zhang, X Wang, G Yang, H Wang, Y Wu Information Sciences 491, 251-264, 2019 | 30 | 2019 |
Device-oriented keyword-searchable encryption scheme for cloud-assisted industrial IoT R Zhou, X Zhang, X Wang, G Yang, HN Dai, M Liu IEEE Internet of Things Journal 9 (18), 17098-17109, 2021 | 23 | 2021 |
Online/offline ciphertext retrieval on resource constrained devices P Jiang, Y Mu, F Guo, X Wang, Q Wen The Computer Journal 59 (7), 955-969, 2016 | 23 | 2016 |
EVA: Efficient versatile auditing scheme for IoT-based datamarket in jointcloud K Huang, X Zhang, Y Mu, F Rezaeibagha, X Wang, J Li, Q Xia, J Qin IEEE Internet of Things Journal 7 (2), 882-892, 2019 | 22 | 2019 |
One-round privacy-preserving meeting location determination for smartphone applications X Wang, Y Mu, R Chen IEEE Transactions on Information Forensics and Security 11 (8), 1712-1721, 2016 | 21 | 2016 |
基于身份的认证密钥协商协议的安全分析与改进 汪小芬, 陈原, 肖国镇 通信学报 29 (12), 16-21, 2008 | 21 | 2008 |