VABKS: Verifiable attribute-based keyword search over outsourced encrypted data Q Zheng, S Xu, G Ateniese IEEE INFOCOM 2014-IEEE conference on computer communications, 522-530, 2014 | 600 | 2014 |
Fair and dynamic proofs of retrievability Q Zheng, S Xu Proceedings of the first ACM conference on Data and application security and …, 2011 | 221 | 2011 |
Secure and efficient proof of storage with deduplication Q Zheng, S Xu Proceedings of the second ACM conference on Data and Application Security …, 2012 | 203 | 2012 |
LIVE: Lightweight integrity verification and content access control for named data networking Q Li, X Zhang, Q Zheng, R Sandhu, X Fu IEEE Transactions on Information Forensics and Security 10 (2), 308-320, 2014 | 109 | 2014 |
Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation Y Shi, Q Zheng, J Liu, Z Han Information Sciences 295, 221-231, 2015 | 102 | 2015 |
Method and system for secure multiparty cloud computation X Zhang, Q Zheng, A Kalker, G Wang US Patent 9,252,942, 2016 | 68 | 2016 |
Verifiable Delegated Set Intersection Operations on Outsourced Encrypted Data. Q Zheng, S Xu 2015 IEEE International Conference on Cloud Engineering 2015, 175-184, 2015 | 66 | 2015 |
Efficient query integrity for outsourced dynamic databases Q Zheng, S Xu, G Ateniese Proceedings of the 2012 ACM Workshop on Cloud computing security workshop, 71-82, 2012 | 61 | 2012 |
RSPP: A reliable, searchable and privacy-preserving e-healthcare system for cloud-assisted body area networks L Yang, Q Zheng, X Fan IEEE INFOCOM 2017-IEEE conference on computer communications, 1-9, 2017 | 50 | 2017 |
CLKS: Certificateless keyword search on encrypted data Q Zheng, X Li, A Azgin International Conference on Network and System Security, 239-253, 2015 | 43 | 2015 |
Attribute-based proxy re-encryption with keyword search Y Shi, J Liu, Z Han, Q Zheng, R Zhang, S Qiu PloS one 9 (12), e116325, 2014 | 42 | 2014 |
Achieving secure and scalable data access control in information-centric networking Q Zheng, G Wang, R Ravindran, A Azgin 2015 IEEE International Conference on Communications (ICC), 5367-5373, 2015 | 29 | 2015 |
IoT middleware architecture over information-centric network S Li, Y Zhang, D Raychaudhuri, R Ravindran, Q Zheng, L Dong, G Wang 2015 IEEE Globecom Workshops (GC Wkshps), 1-7, 2015 | 27 | 2015 |
Federated cloud security architecture for secure and agile clouds W Luo, L Xu, Z Zhan, Q Zheng, S Xu High performance cloud auditing and applications, 169-188, 2013 | 18 | 2013 |
Method for faster secure multiparty inner product with SPDZ FAN Xinxin, Q Zheng, JG Merchan US Patent 11,606,203, 2023 | 17 | 2023 |
Method and system for fuzzy keyword search over encrypted data FAN Xinxin, Q Zheng US Patent 11,023,477, 2021 | 16 | 2021 |
Multi-processor architectural support for protecting virtual machine privacy in untrusted cloud environment Y Wen, JH Lee, Z Liu, Q Zheng, W Shi, S Xu, T Suh Proceedings of the ACM International Conference on Computing Frontiers, 1-10, 2013 | 16 | 2013 |
Architectural protection of application privacy against software and physical attacks in untrusted cloud environment L Xu, JH Lee, SH Kim, Q Zheng, S Xu, T Suh, WW Ro, W Shi IEEE Transactions on Cloud Computing 6 (2), 478-491, 2015 | 13 | 2015 |
Secure content sharing using content centric approach SO Amin, R Ravindran, Q Zheng US Patent App. 14/991,303, 2017 | 11 | 2017 |
Improved anonymous proxy re-encryption with CCA security Q Zheng, W Zhu, J Zhu, X Zhang Proceedings of the 9th ACM symposium on Information, computer and …, 2014 | 11 | 2014 |