A fast CP-ABE system for cyber-physical security and privacy in mobile healthcare network S Wang, H Wang, J Li, H Wang, J Chaudhry, M Alazab, H Song IEEE Transactions on Industry Applications 56 (4), 4467-4477, 2020 | 113 | 2020 |
An efficient attribute-based encryption scheme with policy update and file update in cloud computing J Li, S Wang, Y Li, H Wang, H Wang, H Wang, J Chen, Z You IEEE Transactions on Industrial Informatics 15 (12), 6500-6509, 2019 | 98 | 2019 |
A fast and flexible attribute-based searchable encryption scheme supporting multi-search mechanism in cloud computing H Wang, Y Li, W Susilo, DH Duong, F Luo Computer Standards & Interfaces 82, 103635, 2022 | 31 | 2022 |
An efficient ciphertext-policy attribute-based encryption scheme supporting collaborative decryption with blockchain Y He, H Wang, Y Li, K Huang, VCM Leung, FR Yu, Z Ming IEEE Internet of Things Journal 9 (4), 2722-2733, 2021 | 30 | 2021 |
Revocable attribute-based encryption from standard lattices F Luo, S Al-Kuwari, H Wang, F Wang, K Chen Computer Standards & Interfaces 84, 103698, 2023 | 17 | 2023 |
Abaeks: Attribute-based authenticated encryption with keyword search over outsourced encrypted data F Luo, H Wang, C Lin, X Yan IEEE Transactions on Information Forensics and Security 18, 4970-4983, 2023 | 12 | 2023 |
Attribute-based searchable encryption scheme supporting efficient range search in cloud computing Y Li, H Wang, S Wang, Y Ding 2021 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2021 | 10 | 2021 |
Linearization of multi-valued nonlinear feedback shift registers H Wang, J Zhong, D Lin Journal of Systems Science and Complexity 30 (2), 494-509, 2017 | 10 | 2017 |
Public trace-and-revoke proxy re-encryption for secure data sharing in clouds F Luo, H Wang, W Susilo, X Yan, X Zheng IEEE Transactions on Information Forensics and Security 19, 2919-2934, 2024 | 7 | 2024 |
Generic construction of trace-and-revoke inner product functional encryption F Luo, S Al-Kuwari, H Wang, W Han European Symposium on Research in Computer Security, 259-282, 2022 | 6 | 2022 |
Multi-key fully homomorphic encryption without CRS from RLWE F Luo, H Wang, AK Saif, W Han Computer Standards & Interfaces 86, 103742, 2023 | 5 | 2023 |
Comments on “VERSA: Verifiable secure aggregation for cross-device federated learning” F Luo, H Wang, X Yan IEEE Transactions on Dependable and Secure Computing 21 (1), 499-500, 2023 | 4 | 2023 |
Re-paeks: Public-key authenticated re-encryption with keyword search F Luo, H Wang, X Yan IEEE Transactions on Mobile Computing, 2024 | 3 | 2024 |
Attribute-based weighted keyword search scheme supporting multi-search mechanism in fog computing S Wang, Y Li, H Wang, X Zhang, J Chen 2020 7th IEEE International Conference on Cyber Security and Cloud Computing …, 2020 | 3 | 2020 |
Fssa: Efficient 3-round secure aggregation for privacy-preserving federated learning F Luo, S Al-Kuwari, H Wang, X Yan arXiv preprint arXiv:2305.12950, 2023 | 2 | 2023 |
On Stability of Multi‐Valued Nonlinear Feedback Shift Registers H Wang, Q Lin, J Chen, J Li, J Zhong, D Lin, J Wang, L Ma Complexity 2019 (1), 8765970, 2019 | 2 | 2019 |
The generating set of the differential invariant algebra and Maurer-Cartan equations of a (2+ 1)-dimensional burgers equation J Mei, H Wang Journal of Systems Science and Complexity 26 (2), 281-290, 2013 | 2 | 2013 |
Key-Policy Attribute-Based Encryption With Switchable Attributes for Fine-Grained Access Control of Encrypted Data F Luo, H Wang, X Yan, J Wu IEEE Transactions on Information Forensics and Security, 2024 | 1 | 2024 |
Fully collusion resistant trace-and-revoke functional encryption for arbitrary identities F Luo, S Al-Kuwari, H Wang, X Yan Theoretical Computer Science 987, 114368, 2024 | 1 | 2024 |
A Password-Based Access Control Framework for Time-Sequence Aware Media Cloudization H Wang Cryptology ePrint Archive, 2022 | 1 | 2022 |