A practical privacy-preserving data aggregation (3PDA) scheme for smart grid Y Liu, W Guo, CI Fan, L Chang, C Cheng IEEE Transactions on Industrial Informatics 15 (3), 1767-1774, 2018 | 286 | 2018 |
Privacy-enhanced data aggregation scheme against internal attackers in smart grid CI Fan, SY Huang, YL Lai IEEE Transactions on Industrial informatics 10 (1), 666-675, 2013 | 270 | 2013 |
Robust remote authentication scheme with smart cards CI Fan, YC Chan, ZK Zhang Computers & Security 24 (8), 619-628, 2005 | 223 | 2005 |
Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics CI Fan, YH Lin IEEE Transactions on Information Forensics and Security 4 (4), 933-945, 2009 | 207 | 2009 |
Anonymous multireceiver identity-based encryption CI Fan, LY Huang, PH Ho IEEE Transactions on Computers 59 (9), 1239-1249, 2010 | 159 | 2010 |
Malware detection systems based on API log data mining CI Fan, HW Hsiao, CH Chou, YF Tseng 2015 IEEE 39th annual computer software and applications conference 3, 255-260, 2015 | 110 | 2015 |
Low-computation partially blind signatures for electronic cash CI Fan, CL Lei IEICE Transactions on Fundamentals of Electronics, Communications and …, 1998 | 92 | 1998 |
A privacy-preserving federated learning system for android malware detection based on edge computing RH Hsu, YC Wang, CI Fan, B Sun, T Ban, T Takahashi, TW Wu, SW Kao 2020 15th Asia Joint Conference on Information Security (AsiaJCIS), 128-136, 2020 | 86 | 2020 |
Randomization enhanced Chaum's blind signature scheme CI Fan, WK Chen, YS Yeh Computer Communications 23 (17), 1677-1680, 2000 | 80 | 2000 |
Arbitrary-state attribute-based encryption with dynamic membership CI Fan, VSM Huang, HM Ruan IEEE Transactions on Computers 63 (8), 1951-1961, 2013 | 79 | 2013 |
Provably secure randomized blind signature scheme based on bilinear pairing CI Fan, WZ Sun, VSM Huang Computers & Mathematics with Applications 60 (2), 285-293, 2010 | 64 | 2010 |
Efficient blind signature scheme based on quadratic residues CI Fan, CL Lei Electronics Letters 32 (9), 811-813, 1996 | 64 | 1996 |
Controllable privacy preserving search based on symmetric predicate encryption in cloud storage CI Fan, SY Huang Future Generation Computer Systems 29 (7), 1716-1724, 2013 | 63 | 2013 |
Provably secure and generalized signcryption with public verifiability for secure data transmission between resource-constrained IoT devices A Karati, CI Fan, RH Hsu IEEE Internet of Things Journal 6 (6), 10431-10440, 2019 | 62 | 2019 |
An extended multi-server-based user authentication and key agreement scheme with user anonymity CT Li, CC Lee, CY Weng, CI Fan KSII Transactions on Internet and Information Systems (TIIS) 7 (1), 119-131, 2013 | 54 | 2013 |
Cross-Network-Slice Authentication Scheme for the 5th Generation Mobile Communication System CI Fan, YT Shih, JJ Huang, WR Chiu IEEE Transactions on Network and Service Management 18 (1), 701-712, 2021 | 52 | 2021 |
User efficient blind signatures CI Fan, CL Lei Electronics letters 34 (6), 544-546, 1998 | 50 | 1998 |
Encrypted data deduplication in cloud storage CI Fan, SY Huang, WC Hsu 2015 10th Asia Joint Conference on Information Security, 18-25, 2015 | 42 | 2015 |
Truly Non-Repudiation Certificateless Short Signature Scheme from Bilinear Pairings. CI Fan, RH Hsu, PH Ho J. Inf. Sci. Eng. 27 (3), 969-982, 2011 | 42 | 2011 |
User efficient recoverable off-line e-cash scheme with fast anonymity revoking CI Fan, VSM Huang, YC Yu Mathematical and Computer Modelling 58 (1-2), 227-237, 2013 | 40 | 2013 |