Verifiable auditing for outsourced database in cloud computing J Wang, X Chen, X Huang, I You, Y Xiang IEEE transactions on computers 64 (11), 3293-3303, 2015 | 184 | 2015 |
Efficient verifiable fuzzy keyword search over encrypted data in cloud computing J Wang, H Ma, Q Tang, J Li, H Zhu, S Ma, X Chen Computer science and information systems 10 (2), 667-684, 2013 | 145 | 2013 |
Blockchain-based public auditing and secure deduplication with fair arbitration H Yuan, X Chen, J Wang, J Yuan, H Yan, W Susilo Information Sciences 541, 409-425, 2020 | 127 | 2020 |
Secure searchable encryption: a survey Y Wang, J Wang, X Chen Journal of communications and information networks 1, 52-65, 2016 | 113 | 2016 |
Blockchain-based multiple groups data sharing with anonymity and traceability H Huang, X Chen, J Wang Science China Information Sciences 63, 1-13, 2020 | 98 | 2020 |
Towards achieving flexible and verifiable search for outsourced database in cloud computing J Wang, X Chen, J Li, J Zhao, J Shen Future Generation Computer Systems 67, 266-275, 2017 | 93 | 2017 |
Secure multi-server-aided data deduplication in cloud computing M Miao, J Wang, H Li, X Chen Pervasive and Mobile Computing 24, 129-137, 2015 | 88 | 2015 |
Towards efficient verifiable forward secure searchable symmetric encryption Z Zhang, J Wang, Y Wang, Y Su, X Chen Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019 | 76 | 2019 |
Efficient verifiable public key encryption with keyword search based on KP-ABE P Liu, J Wang, H Ma, H Nie 2014 Ninth International Conference on Broadband and Wireless Computing …, 2014 | 76 | 2014 |
An efficient PHR service system supporting fuzzy keyword search and fine-grained access control F Xhafa, J Wang, X Chen, JK Liu, J Li, P Krause Soft computing 18, 1795-1802, 2014 | 74 | 2014 |
Secure cloud data deduplication with efficient re-encryption H Yuan, X Chen, J Li, T Jiang, J Wang, RH Deng IEEE Transactions on Services Computing 15 (1), 442-456, 2019 | 70 | 2019 |
Towards efficient verifiable conjunctive keyword search for large encrypted database J Wang, X Chen, SF Sun, JK Liu, MH Au, ZH Zhan Computer Security: 23rd European Symposium on Research in Computer Security …, 2018 | 55 | 2018 |
Achieving searchable encryption scheme with search pattern hidden Y Wang, SF Sun, J Wang, JK Liu, X Chen IEEE Transactions on Services Computing 15 (2), 1012-1025, 2020 | 53 | 2020 |
Publicly verifiable database scheme with efficient keyword search M Miao, J Wang, S Wen, J Ma Information Sciences 475, 18-28, 2019 | 39 | 2019 |
Verifiable privacy-preserving single-layer perceptron training scheme in cloud computing X Zhang, X Chen, J Wang, Z Zhan, J Li Soft Computing 22, 7719-7732, 2018 | 38 | 2018 |
Efficient and secure encrypted image search in mobile cloud computing Q Zou, J Wang, J Ye, J Shen, X Chen Soft Computing 21, 2959-2969, 2017 | 38 | 2017 |
Position paper on blockchain technology: Smart contract and applications W Meng, J Wang, X Wang, J Liu, Z Yu, J Li, Y Zhao, SSM Chow Network and System Security: 12th International Conference, NSS 2018, Hong …, 2018 | 36 | 2018 |
Enabling (end-to-end) encrypted cloud emails with practical forward secrecy J Wei, X Chen, J Wang, X Hu, J Ma IEEE Transactions on Dependable and Secure Computing 19 (4), 2318-2332, 2021 | 35 | 2021 |
Forward-secure puncturable identity-based encryption for securing cloud emails J Wei, X Chen, J Wang, X Hu, J Ma Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019 | 34 | 2019 |
A New Efficient Verifiable Fuzzy Keyword Search Scheme. J Wang, H Ma, Q Tang, J Li, H Zhu, S Ma, X Chen J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3 (4), 61-71, 2012 | 33 | 2012 |