You are on page 1of 6

Cited in Papers - 

IEEE (42)  | Other Publishers (30)


Cited in Papers - IEEE (42)
Select All

1. Thomas Prantl, Timo Zeck, Lukas Iffländer, Lukas Beierlieb, Alexandra Dmitrenko, Christian Krupitzer,
Samuel Kounev, "Towards a Cryptography Benchmark: A View on Attribute Based Encryption
Schemes", 2022 5th Conference on Cloud and Internet of Things (CIoT), pp.158-165, 2022.
Show Article   Google Scholar 

2. Kaiping Xue, Na Gai, Jianan Hong, David S.L. Wei, Peilin Hong, Nenghai Yu, "Efficient and Secure
Attribute-Based Access Control With Identical Sub-Policies Frequently Used in Cloud Storage", IEEE
Transactions on Dependable and Secure Computing, vol.19, no.1, pp.635-646, 2022.
Show Article   Google Scholar 

3. Kaiqing Huang, "Revocable Large Universe Decentralized Multi-Authority Attribute-Based Encryption


Without Key Abuse for Cloud-Aided IoT", IEEE Access, vol.9, pp.151713-151728, 2021.
Show Article   Google Scholar 

4. Kaiqing Huang, "Accountable and Revocable Large Universe Decentralized Multi-Authority Attribute-
Based Encryption for Cloud-Aided IoT", IEEE Access, vol.9, pp.123786-123804, 2021.
Show Article   Google Scholar 

5. Wei Ren, Yan Sun, Hong Luo, Mohsen Guizani, "SILedger: A Blockchain and ABE-based Access
Control for Applications in SDN-IoT Networks", IEEE Transactions on Network and Service
Management, vol.18, no.4, pp.4406-4419, 2021.
Show Article   Google Scholar 

6. Zahid Hussain Qaisar, Sultan H. Almotiri, Mohammed A. Al Ghamdi, Arfan Ali Nagra, Ghulam Ali, "A
Scalable and Efficient Multi-Agent Architecture for Malware Protection in Data Sharing Over Mobile
Cloud", IEEE Access, vol.9, pp.76248-76259, 2021.
Show Article   Google Scholar 

7. Wenti Yang, Zhitao Guan, Longfei Wu, Xiaojiang Du, Mohsen Guizani, "Secure Data Access Control
With Fair Accountability in Smart Grid Data Sharing: An Edge Blockchain Approach", IEEE Internet of
Things Journal, vol.8, no.10, pp.8632-8643, 2021.
Show Article   Google Scholar 

8. Hajar Moudoud, Lyes Khoukhi, Soumaya Cherkaoui, "Prediction and Detection of FDIA and DDoS
Attacks in 5G Enabled IoT", IEEE Network, vol.35, no.2, pp.194-201, 2021.
Show Article   Google Scholar 

9. Yinbin Miao, Robert H. Deng, Ximeng Liu, Kim-Kwang Raymond Choo, Hongjun Wu, Hongwei Li,
"Multi-Authority Attribute-Based Keyword Search over Encrypted Cloud Data", IEEE Transactions on
Dependable and Secure Computing, vol.18, no.4, pp.1667-1680, 2021.
Show Article   Google Scholar 

10. Chuan Zhang, Liehuang Zhu, Chang Xu, Ximeng Liu, Kashif Sharif, "Reliable and Privacy-Preserving
Truth Discovery for Mobile Crowdsensing Systems", IEEE Transactions on Dependable and Secure
Computing, vol.18, no.3, pp.1245-1260, 2021.
Show Article   Google Scholar 
11. Yue Guan, Songtao Guo, Pan Li, Yuanyuan Yang, "Secure and Verifiable Data Access Control
Scheme With Policy Update and Computation Outsourcing for Edge Computing", 2020 IEEE 26th
International Conference on Parallel and Distributed Systems (ICPADS), pp.398-405, 2020.
Show Article   Google Scholar 

12. Shi-Jinn Horng, Cheng-Chung Lu, Wanlei Zhou, "An Identity-Based and Revocable Data-Sharing
Scheme in VANETs", IEEE Transactions on Vehicular Technology, vol.69, no.12, pp.15933-15946,
2020.
Show Article   Google Scholar 

13. Arooj Masood, Demeke Shumeye Lakew, Sungrae Cho, "Security and Privacy Challenges in
Connected Vehicular Cloud Computing", IEEE Communications Surveys & Tutorials, vol.22, no.4,
pp.2725-2764, 2020.
Show Article   Google Scholar 

14. Qi Li, Yinghui Zhang, Tao Zhang, Haiping Huang, Yingjie He, Jinbo Xiong, "HTAC: Fine-Grained
Policy-Hiding and Traceable Access Control in mHealth", IEEE Access, vol.8, pp.123430-123439,
2020.
Show Article   Google Scholar 

15. Latif U. Khan, Ibrar Yaqoob, Nguyen H. Tran, S. M. Ahsan Kazmi, Tri Nguyen Dang, Choong Seon
Hong, "Edge-Computing-Enabled Smart Cities: A Comprehensive Survey", IEEE Internet of Things
Journal, vol.7, no.10, pp.10200-10232, 2020.
Show Article   Google Scholar 

16. Shouyi Zhang, Si Han, Baokun Zheng, Ke Han, Entong Pang, "Group Key Management Protocol for
File Sharing on Cloud Storage", IEEE Access, vol.8, pp.123614-123622, 2020.
Show Article   Google Scholar 

17. Shuming Xiong, Qiang Ni, Liangmin Wang, Qian Wang, "SEM-ACSIT: Secure and Efficient
Multiauthority Access Control for IoT Cloud Storage", IEEE Internet of Things Journal, vol.7, no.4,
pp.2914-2927, 2020.
Show Article   Google Scholar 

18. Jianing Pei, Peilin Hong, Miao Pan, Jiangqing Liu, Jingsong Zhou, "Optimal VNF Placement via Deep
Reinforcement Learning in SDN/NFV-Enabled Networks", IEEE Journal on Selected Areas in
Communications, vol.38, no.2, pp.263-278, 2020.
Show Article   Google Scholar 

19. Jianan Hong, Kaiping Xue, Na Gai, David S.L. Wei, Peilin Hong, "Service Outsourcing in F2C
Architecture with Attribute-based Anonymous Access Control and Bounded Service Number", IEEE
Transactions on Dependable and Secure Computing, vol.17, no.5, pp.1051-1062, 2020.
Show Article   Google Scholar 

20. Jianan Hong, Kaiping Xue, Yingjie Xue, Weikeng Chen, David S. L. Wei, Nenghai Yu, Peilin Hong,
"TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public
Cloud", IEEE Transactions on Services Computing, vol.13, no.1, pp.158-171, 2020.
Show Article   Google Scholar 

21. Bharati Mishra, Debasish Jena, "Security of Cloud Storage: A Survey", 2019 International Conference
on Information Technology (ICIT), pp.109-114, 2019.
Show Article   Google Scholar 

22. P. Calista Bebe, D. Akila, "Orchini Similarity User Authentication Based Streebog Hash Function for
Secured Data Storage in Cloud", 2019 International Conference on Computational Intelligence and
Knowledge Economy (ICCIKE), pp.461-466, 2019.
Show Article   Google Scholar 

23. Pan Jun Sun, "Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges, and
Solutions", IEEE Access, vol.7, pp.147420-147452, 2019.
Show Article   Google Scholar 

24. Kennedy Edemacu, Hung Kook Park, Beakcheol Jang, Jong Wook Kim, "Privacy Provision in
Collaborative Ehealth With Attribute-Based Encryption: Survey, Challenges and Future
Directions", IEEE Access, vol.7, pp.89614-89636, 2019.
Show Article   Google Scholar 

25. Shekha Chenthara, Khandakar Ahmed, Hua Wang, Frank Whittaker, "Security and Privacy-Preserving
Challenges of e-Health Solutions in Cloud Computing", IEEE Access, vol.7, pp.74361-74382, 2019.
Show Article   Google Scholar 

26. Chang Xu, Ningning Wang, Liehuang Zhu, Kashif Sharif, Chuan Zhang, "Achieving Searchable and
Privacy-Preserving Data Sharing for Cloud-Assisted E-Healthcare System", IEEE Internet of Things
Journal, vol.6, no.5, pp.8345-8356, 2019.
Show Article   Google Scholar 

27. Si Han, Ke Han, Shouyi Zhang, "A Data Sharing Protocol to Minimize Security and Privacy Risks of
Cloud Storage in Big Data Era", IEEE Access, vol.7, pp.60290-60298, 2019.
Show Article   Google Scholar 

28. Yingjie Xue, Kaiping Xue, Na Gai, Jianan Hong, David S. L. Wei, Peilin Hong, "An Attribute-Based
Controlled Collaborative Access Control Scheme for Public Cloud Storage", IEEE Transactions on
Information Forensics and Security, vol.14, no.11, pp.2927-2942, 2019.
Show Article   Google Scholar 

29. Ahmad S. Salehi, Carsten Rudolph, Marthie Grobler, "A Dynamic Cross-Domain Access Control Model
for Collaborative Healthcare Application", 2019 IFIP/IEEE Symposium on Integrated Network and
Service Management (IM), pp.643-648, 2019.
Show Article   Google Scholar 

30. Chang Xu, Jiachen Wang, Liehuang Zhu, Chuan Zhang, Kashif Sharif, "PPMR: A Privacy-Preserving
Online Medical Service Recommendation Scheme in eHealthcare System", IEEE Internet of Things
Journal, vol.6, no.3, pp.5665-5673, 2019.
Show Article   Google Scholar 

View More

Cited in Papers - Other Publishers (30)

1. Wenying Zheng, Chin‐Feng Lai, Bing Chen, "Blockchain‐based access control with k $k$‐times tamper
resistance in cloud environment", International Journal of Intelligent Systems, 2022.
CrossRef  Google Scholar 
2. Jiawei Zhang, Yanbo Yang, Ning Lu, Zhiwei Liu, Jianfeng Ma, "A Privacy-Aware and Time-Limited Data
Access Control Scheme with Large Universe and Public Traceability for Cloud-Based IoD", Security and
Privacy in New Computing Environments, vol.423, pp.103, 2022.
CrossRef  Google Scholar 

3. M. D. Boomija, S. V. Kasmir Raja, "Securing medical data by role-based user policy with partially
homomorphic encryption in AWS cloud", Soft Computing, 2022.
CrossRef  Google Scholar 

4. Chong Wang, Hao Jin, Ronglei Wei, Ke Zhou, "Revocable, dynamic and decentralized data access control
in cloud storage", The Journal of Supercomputing, 2022.
CrossRef  Google Scholar 

5. Jangili Narendra, "A Robust and Secured Mechanism for Sharing Encrypted Data in Cloud
Systems", Proceedings of International Conference on Advances in Computer Engineering and
Communication Systems, vol.20, pp.359, 2021.
CrossRef  Google Scholar 

6. Na Shi, Liang Tan, Wenjuan Li, Xin Qi, Keping Yu, "A blockchain-empowered AAA scheme in the large-
scale HetNet", Digital Communications and Networks, vol.7, no.3, pp.308, 2021.
CrossRef  Google Scholar 

7. Zhengdong Cui, Feng Xu, "Research on Security of Access Control for Cloud Computing
Environment", Security, Privacy, and Anonymity in Computation, Communication, and Storage, vol.12382,
pp.145, 2021.
CrossRef  Google Scholar 

8. Na Shi, Liang Tan, Ciaxia Yang, Chen He, Junli Xu, Yang Lu, Hao Xu, "BacS: A blockchain-based access
control scheme in distributed internet of things", Peer-to-Peer Networking and Applications, vol.14, no.5,
pp.2585, 2021.
CrossRef  Google Scholar 

9. Aakib Jawed Khan, Shabana Mehfuz, "Big-data driven approaches in materials science on cloud storage
API through optimal homomorphic encryption", Materials Today: Proceedings, 2021.
CrossRef  Google Scholar 

10. Jin Gu, Jianqiang Shen, Baoyun Wang, "A robust and secure multi-authority access control system for
cloud storage", Peer-to-Peer Networking and Applications, vol.14, no.3, pp.1488, 2021.
CrossRef  Google Scholar 

11. Xieyang Shen, Chuanhe Huang, Danxin Wang, Jiaoli Shi, "A Privacy-Preserving Attribute-Based
Encryption System for Data Sharing in Smart Cities", Wireless Communications and Mobile Computing,
vol.2021, pp.1, 2021.
CrossRef  Google Scholar 

12. Ruili Yang, Jiageng Chen, Shangle Li, "Secure and Traceable Attribute-Based Sequential Aggregate
Signature", Security, Privacy, and Anonymity in Computation, Communication, and Storage, vol.12382,
pp.367, 2021.
CrossRef  Google Scholar 
13. Liming Fang, Changchun Yin, Juncen Zhu, Chunpeng Ge, M. Tanveer, Alireza Jolfaei, Zehong Cao,
"Privacy Protection for Medical Data Sharing in Smart Healthcare", ACM Transactions on Multimedia
Computing, Communications, and Applications, vol.16, no.3s, pp.1, 2021.
CrossRef  Google Scholar 

14. Yongkai Fan, Jiaxu Liu, Kuan-Ching Li, Wei liang, Xia Lei, Gan Tan, Mingdong Tang, "One enhanced
secure access scheme for outsourced data", Information Sciences, vol.561, pp.230, 2021.
CrossRef  Google Scholar 

15. Dharavath Ramesh, Rahul Mishra, Munesh Chandra Trivedi, "PCS-ABE (t, n): a secure threshold multi
authority CP-ABE scheme based efficient access control systems for cloud environment", Journal of
Ambient Intelligence and Humanized Computing, vol.12, no.10, pp.9303, 2021.
CrossRef  Google Scholar 

16. Yinghui Zhang, Robert H. Deng, Shengmin Xu, Jianfei Sun, Qi Li, Dong Zheng, "Attribute-based Encryption
for Cloud Computing Access Control", ACM Computing Surveys, vol.53, no.4, pp.1, 2021.
CrossRef  Google Scholar 

17. Hao Li, Lianbing Deng, Cheng Yang, Jianbo Liu, "An enhanced media ciphertext-policy attribute-based
encryption algorithm on media cloud", International Journal of Distributed Sensor Networks, vol.16, no.2,
pp.155014772090819, 2020.
CrossRef  Google Scholar 

18. Qi Li, Yinghui Zhang, Tao Zhang, "Fine-Grained Access Control in mHealth with Hidden Policy and
Traceability", Broadband Communications, Networks, and Systems, vol.303, pp.261, 2019.
CrossRef  Google Scholar 

19. J.S. Rauthan, K.S. Vaisla, "VRS-DB: Preserve confidentiality of users' data using encryption
approach", Digital Communications and Networks, 2019.
CrossRef  Google Scholar 

20. KUMAR S. MUTHURAJ, "PRIVACY PRESERVATION GUIDELINES BASED SUBSTANCE


DISTRIBUTION IN PUBLIC CLOUDS", i-manager’s Journal on Cloud Computing, vol.6, no.1, pp.27, 2019.
CrossRef  Google Scholar 

21. Al-Dahhan, Shi, Lee, Kifayat, "Survey on Revocation in Ciphertext-Policy Attribute-Based


Encryption", Sensors, vol.19, no.7, pp.1695, 2019.
CrossRef  Google Scholar 

22. Balasubramanian Prabhu kavin, Sannasi Ganapathy, "A secured storage and privacy-preserving model
using CRT for providing security on cloud and IoT-based applications", Computer Networks, vol.151,
pp.181, 2019.
CrossRef  Google Scholar 

23. Youwen Zhu, Yue Zhang, Xingxin Li, Hongyang Yan, Jing Li, "Improved collusion‐resisting secure nearest
neighbor query over encrypted data in cloud", Concurrency and Computation: Practice and Experience,
vol.31, no.21, 2019.
CrossRef  Google Scholar 
24. Qi Li, Hongbo Zhu, Jinbo Xiong, Ruo Mo, Zuobin Ying, Huaqun Wang, "Fine-grained multi-authority access
control in IoT-enabled mHealth", Annals of Telecommunications, vol.74, no.7-8, pp.389, 2019.
CrossRef  Google Scholar 

25. Guoxiu Liu, Geng Yang, Huaqun Wang, Yang Xiang, Hua Dai, "A Novel Secure Scheme for Supporting
Complex SQL Queries over Encrypted Databases in Cloud Computing", Security and Communication
Networks, vol.2018, pp.1, 2018.
CrossRef  Google Scholar 

26. Ruoshui Liu, Jianghui Liu, Jingjie Zhang, Moli Zhang, "Video Data Integrity Verification Method Based on
Full Homomorphic Encryption in Cloud System", International Journal of Digital Multimedia Broadcasting,
vol.2018, pp.1, 2018.
CrossRef  Google Scholar 

27. Yuancheng Li, Pan Zhang, Boyan Wang, "An Improved Ciphertext-Policy Attribute-Based Encryption
Scheme in Power Cloud Access Control", Applied Sciences, vol.8, no.10, pp.1836, 2018.
CrossRef  Google Scholar 

28. Qi Li, Hongbo Zhu, Zuobin Ying, Tao Zhang, "Traceable Ciphertext-Policy Attribute-Based Encryption with
Verifiable Outsourced Decryption in eHealth Cloud", Wireless Communications and Mobile Computing,
vol.2018, pp.1, 2018.
CrossRef  Google Scholar 

29. R. Senthil kumar, B. G. Geetha, "Signature Verification and Bloom Hashing Technique for Efficient Cloud
Data Storage", Wireless Personal Communications, vol.103, no.4, pp.3079, 2018.
CrossRef  Google Scholar 

30. Youwen Zhu, Yue Zhang, Jiabin Yuan, Xianmin Wang, "FTP: An Approximate Fast Privacy-Preserving
Equality Test Protocol for Authentication in Internet of Things", Security and Communication Networks,
vol.2018, pp.1, 2018.

You might also like