A study of probabilistic password models J Ma, W Yang, M Luo, N Li 2014 IEEE Symposium on Security and Privacy, 689-704, 2014 | 350 | 2014 |
A survey of blockchain applications in the energy sector J Bao, D He, M Luo, KKR Choo IEEE Systems Journal 15 (3), 3370-3381, 2020 | 200 | 2020 |
The Application of the Blockchain Technology in Voting Systems: A Review J Huang, D He, MS Obaidat, P Vijayakumar, M Luo, KKR Choo ACM Computing Surveys (CSUR) 54 (3), 1-28, 2021 | 102 | 2021 |
Efficient Certificateless Conditional Privacy-Preserving Authentication for VANETs X Zhou, M Luo, P Vijayakumar, C Peng, D He IEEE Transactions on Vehicular Technology 71 (7), 7863-7875, 2022 | 91 | 2022 |
A secure and efficient authentication and data sharing scheme for Internet of Things based on blockchain Q Fan, J Chen, LJ Deborah, M Luo Journal of Systems Architecture 117, 102112, 2021 | 75 | 2021 |
基于无监督聚类的入侵检测方法 罗敏, 王丽娜, 张焕国 电子学报 31 (011), 1713-1716, 2003 | 64 | 2003 |
A Blockchain-Assisted Privacy-Aware Authentication scheme for internet of medical things X Jia, M Luo, H Wang, J Shen, D He IEEE Internet of Things Journal 9 (21), 21838-21850, 2022 | 54 | 2022 |
A Software/Hardware Co-Design of Crystals-Dilithium Signature Scheme Z Zhou, D He, Z Liu, M Luo, KKR Choo ACM Transactions on Reconfigurable Technology and Systems (TRETS) 14 (2), 1-21, 2021 | 41 | 2021 |
An Efficient Privacy-Preserving Aggregation Scheme for Multi-dimensional Data in IoT C Peng, M Luo, H Wang, MK Khan, D He IEEE Internet of Things Journal 9 (1), 589 - 600, 2022 | 39 | 2022 |
A blockchain-based online language learning system X Sun, J Zou, L Li, M Luo Telecommunication Systems 76 (2), 155-166, 2021 | 39 | 2021 |
A research on intrusion detection based on unsupervised clustering and support vector machine M Luo, L Wang, H Zhang, J Chen Information and Communications Security: 5th International Conference, ICICS …, 2003 | 38 | 2003 |
A survey on redactable blockchain: challenges and opportunities T Ye, M Luo, Y Yang, KKR Choo, D He IEEE Transactions on Network Science and Engineering 10 (3), 1669-1683, 2023 | 37 | 2023 |
SAPFS: An efficient symmetric-key authentication key agreement scheme with perfect forward secrecy for industrial Internet of Things Y Zhang, D He, P Vijayakumar, M Luo, X Huang IEEE Internet of Things Journal 10 (11), 9716-9726, 2023 | 34 | 2023 |
The applications of blockchain in artificial intelligence R Wang, M Luo, Y Wen, L Wang, KK Raymond Choo, D He Security and Communication Networks 2021 (1), 6126247, 2021 | 32 | 2021 |
Analysis and Improvement of a Certificateless Signature Scheme for Resource-Constrained Scenarios Z Xu, M Luo, MK Khan, KKR Choo, D He IEEE Communications Letters 25 (4), 1074-1078, 2020 | 30 | 2020 |
An efficient attribute-based encryption scheme based on SM9 encryption algorithm for dispatching and control cloud H Ji, H Zhang, L Shao, D He, M Luo Connection Science 33 (4), 1094-1115, 2021 | 29 | 2021 |
The security of blockchain-based medical systems: research challenges and opportunities Q Liu, Y Liu, M Luo, D He, H Wang, KKR Choo IEEE Systems Journal 16 (4), 5741-5752, 2022 | 28 | 2022 |
PBidm: Privacy-Preserving Blockchain-Based Identity Management System for Industrial Internet of Things Z Bao, D He, MK Khan, M Luo, Q Xie IEEE Transactions on Industrial Informatics 19 (2), 1524-1534, 2022 | 27 | 2022 |
Efficient Certificateless Online/Offline Signature Scheme for Wireless Body Area Networks C Peng, M Luo, L Li, KKR Choo, D He IEEE Internet of Things Journal 8 (18), 14287-14298, 2021 | 25 | 2021 |
入侵检测技术概述 陈瑾, 罗敏, 张焕国 计算机工程与应用 40 (2), 133-136, 2004 | 25 | 2004 |