Efficient and secure data storage operations for mobile cloud computing Z Zhou, D Huang International Conference on Network and Service Management, 2011 | 337 | 2011 |
Efficient privacy-preserving ciphertext-policy attribute based-encryption and broadcast encryption Z Zhou, D Huang, Z Wang IEEE Transactions on Computers 64 (1), 126-138, 2013 | 216 | 2013 |
Secure data processing framework for mobile cloud computing D Huang, Z Zhou, L Xu, T Xing, Y Zhong 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2011 | 176 | 2011 |
On efficient ciphertext-policy attribute based encryption and broadcast encryption Z Zhou, D Huang Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 153 | 2010 |
Computing cryptographic algorithms in portable and embedded devices A Ramachandran, Z Zhou, D Huang 2007 IEEE International Conference on Portable Information Devices, 1-7, 2007 | 63 | 2007 |
Methods, systems, and apparatuses for optimal group key management for secure multicast communication D Huang, Z Zhou US Patent 8,837,738, 2014 | 59 | 2014 |
An Optimal Key Distribution Scheme for Secure Multicast Group Communication Z Zhou, D Huang INFOCOM, 2010 Proceedings IEEE, 1-5, 2010 | 43 | 2010 |
Establishing email-based social network trust for vehicular networks D Huang, Z Zhou, X Hong, M Gerla 2010 7th IEEE Consumer Communications and Networking Conference, 1-5, 2010 | 41 | 2010 |
A distributed ePedigree architecture D Huang, M Verma, A Ramachandran, Z Zhou 11th IEEE International Workshop on Future Trends of Distributed Computing …, 2007 | 26 | 2007 |
Gradual identity exposure using attribute-based encryption D Huang, Z Zhou, Z Yan 2010 IEEE Second International Conference on Social Computing, 881-888, 2010 | 13 | 2010 |
Constructing efficient attribute-based broadcast encryption Z Zhou, D Huang 2010 INFOCOM IEEE Conference on Computer Communications Workshops, 1-2, 2010 | 9 | 2010 |
SRK: A distributed RFID data access control mechanism Z Zhou, D Huang 2008 IEEE International Conference on Communications, 2854-2858, 2008 | 6 | 2008 |
Computing cryptographic pairing in sensors Z Zhou, D Huang ACM SIGBED Review 5 (1), 1-2, 2008 | 5 | 2008 |
RFID keeper: An RFID data access control mechanism Z Zhou, D Huang IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference, 4570-4574, 2007 | 5 | 2007 |
Gradual identity exposure using attribute-based encryption Z Zhou, D Huang International Journal of Information Privacy, Security and Integrity 2 1 (2 …, 2012 | 3 | 2012 |
11 A Secure RFID Access Control Mechanism D Huang, Z Zhou Security in RFID and Sensor Networks, 237, 2016 | | 2016 |