Professional Documents
Culture Documents
1. Thomas Prantl, Timo Zeck, Lukas Iffländer, Lukas Beierlieb, Alexandra Dmitrenko, Christian Krupitzer,
Samuel Kounev, "Towards a Cryptography Benchmark: A View on Attribute Based Encryption
Schemes", 2022 5th Conference on Cloud and Internet of Things (CIoT), pp.158-165, 2022.
Show Article Google Scholar
2. Kaiping Xue, Na Gai, Jianan Hong, David S.L. Wei, Peilin Hong, Nenghai Yu, "Efficient and Secure
Attribute-Based Access Control With Identical Sub-Policies Frequently Used in Cloud Storage", IEEE
Transactions on Dependable and Secure Computing, vol.19, no.1, pp.635-646, 2022.
Show Article Google Scholar
4. Kaiqing Huang, "Accountable and Revocable Large Universe Decentralized Multi-Authority Attribute-
Based Encryption for Cloud-Aided IoT", IEEE Access, vol.9, pp.123786-123804, 2021.
Show Article Google Scholar
5. Wei Ren, Yan Sun, Hong Luo, Mohsen Guizani, "SILedger: A Blockchain and ABE-based Access
Control for Applications in SDN-IoT Networks", IEEE Transactions on Network and Service
Management, vol.18, no.4, pp.4406-4419, 2021.
Show Article Google Scholar
6. Zahid Hussain Qaisar, Sultan H. Almotiri, Mohammed A. Al Ghamdi, Arfan Ali Nagra, Ghulam Ali, "A
Scalable and Efficient Multi-Agent Architecture for Malware Protection in Data Sharing Over Mobile
Cloud", IEEE Access, vol.9, pp.76248-76259, 2021.
Show Article Google Scholar
7. Wenti Yang, Zhitao Guan, Longfei Wu, Xiaojiang Du, Mohsen Guizani, "Secure Data Access Control
With Fair Accountability in Smart Grid Data Sharing: An Edge Blockchain Approach", IEEE Internet of
Things Journal, vol.8, no.10, pp.8632-8643, 2021.
Show Article Google Scholar
8. Hajar Moudoud, Lyes Khoukhi, Soumaya Cherkaoui, "Prediction and Detection of FDIA and DDoS
Attacks in 5G Enabled IoT", IEEE Network, vol.35, no.2, pp.194-201, 2021.
Show Article Google Scholar
9. Yinbin Miao, Robert H. Deng, Ximeng Liu, Kim-Kwang Raymond Choo, Hongjun Wu, Hongwei Li,
"Multi-Authority Attribute-Based Keyword Search over Encrypted Cloud Data", IEEE Transactions on
Dependable and Secure Computing, vol.18, no.4, pp.1667-1680, 2021.
Show Article Google Scholar
10. Chuan Zhang, Liehuang Zhu, Chang Xu, Ximeng Liu, Kashif Sharif, "Reliable and Privacy-Preserving
Truth Discovery for Mobile Crowdsensing Systems", IEEE Transactions on Dependable and Secure
Computing, vol.18, no.3, pp.1245-1260, 2021.
Show Article Google Scholar
11. Yue Guan, Songtao Guo, Pan Li, Yuanyuan Yang, "Secure and Verifiable Data Access Control
Scheme With Policy Update and Computation Outsourcing for Edge Computing", 2020 IEEE 26th
International Conference on Parallel and Distributed Systems (ICPADS), pp.398-405, 2020.
Show Article Google Scholar
12. Shi-Jinn Horng, Cheng-Chung Lu, Wanlei Zhou, "An Identity-Based and Revocable Data-Sharing
Scheme in VANETs", IEEE Transactions on Vehicular Technology, vol.69, no.12, pp.15933-15946,
2020.
Show Article Google Scholar
13. Arooj Masood, Demeke Shumeye Lakew, Sungrae Cho, "Security and Privacy Challenges in
Connected Vehicular Cloud Computing", IEEE Communications Surveys & Tutorials, vol.22, no.4,
pp.2725-2764, 2020.
Show Article Google Scholar
14. Qi Li, Yinghui Zhang, Tao Zhang, Haiping Huang, Yingjie He, Jinbo Xiong, "HTAC: Fine-Grained
Policy-Hiding and Traceable Access Control in mHealth", IEEE Access, vol.8, pp.123430-123439,
2020.
Show Article Google Scholar
15. Latif U. Khan, Ibrar Yaqoob, Nguyen H. Tran, S. M. Ahsan Kazmi, Tri Nguyen Dang, Choong Seon
Hong, "Edge-Computing-Enabled Smart Cities: A Comprehensive Survey", IEEE Internet of Things
Journal, vol.7, no.10, pp.10200-10232, 2020.
Show Article Google Scholar
16. Shouyi Zhang, Si Han, Baokun Zheng, Ke Han, Entong Pang, "Group Key Management Protocol for
File Sharing on Cloud Storage", IEEE Access, vol.8, pp.123614-123622, 2020.
Show Article Google Scholar
17. Shuming Xiong, Qiang Ni, Liangmin Wang, Qian Wang, "SEM-ACSIT: Secure and Efficient
Multiauthority Access Control for IoT Cloud Storage", IEEE Internet of Things Journal, vol.7, no.4,
pp.2914-2927, 2020.
Show Article Google Scholar
18. Jianing Pei, Peilin Hong, Miao Pan, Jiangqing Liu, Jingsong Zhou, "Optimal VNF Placement via Deep
Reinforcement Learning in SDN/NFV-Enabled Networks", IEEE Journal on Selected Areas in
Communications, vol.38, no.2, pp.263-278, 2020.
Show Article Google Scholar
19. Jianan Hong, Kaiping Xue, Na Gai, David S.L. Wei, Peilin Hong, "Service Outsourcing in F2C
Architecture with Attribute-based Anonymous Access Control and Bounded Service Number", IEEE
Transactions on Dependable and Secure Computing, vol.17, no.5, pp.1051-1062, 2020.
Show Article Google Scholar
20. Jianan Hong, Kaiping Xue, Yingjie Xue, Weikeng Chen, David S. L. Wei, Nenghai Yu, Peilin Hong,
"TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public
Cloud", IEEE Transactions on Services Computing, vol.13, no.1, pp.158-171, 2020.
Show Article Google Scholar
21. Bharati Mishra, Debasish Jena, "Security of Cloud Storage: A Survey", 2019 International Conference
on Information Technology (ICIT), pp.109-114, 2019.
Show Article Google Scholar
22. P. Calista Bebe, D. Akila, "Orchini Similarity User Authentication Based Streebog Hash Function for
Secured Data Storage in Cloud", 2019 International Conference on Computational Intelligence and
Knowledge Economy (ICCIKE), pp.461-466, 2019.
Show Article Google Scholar
23. Pan Jun Sun, "Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges, and
Solutions", IEEE Access, vol.7, pp.147420-147452, 2019.
Show Article Google Scholar
24. Kennedy Edemacu, Hung Kook Park, Beakcheol Jang, Jong Wook Kim, "Privacy Provision in
Collaborative Ehealth With Attribute-Based Encryption: Survey, Challenges and Future
Directions", IEEE Access, vol.7, pp.89614-89636, 2019.
Show Article Google Scholar
25. Shekha Chenthara, Khandakar Ahmed, Hua Wang, Frank Whittaker, "Security and Privacy-Preserving
Challenges of e-Health Solutions in Cloud Computing", IEEE Access, vol.7, pp.74361-74382, 2019.
Show Article Google Scholar
26. Chang Xu, Ningning Wang, Liehuang Zhu, Kashif Sharif, Chuan Zhang, "Achieving Searchable and
Privacy-Preserving Data Sharing for Cloud-Assisted E-Healthcare System", IEEE Internet of Things
Journal, vol.6, no.5, pp.8345-8356, 2019.
Show Article Google Scholar
27. Si Han, Ke Han, Shouyi Zhang, "A Data Sharing Protocol to Minimize Security and Privacy Risks of
Cloud Storage in Big Data Era", IEEE Access, vol.7, pp.60290-60298, 2019.
Show Article Google Scholar
28. Yingjie Xue, Kaiping Xue, Na Gai, Jianan Hong, David S. L. Wei, Peilin Hong, "An Attribute-Based
Controlled Collaborative Access Control Scheme for Public Cloud Storage", IEEE Transactions on
Information Forensics and Security, vol.14, no.11, pp.2927-2942, 2019.
Show Article Google Scholar
29. Ahmad S. Salehi, Carsten Rudolph, Marthie Grobler, "A Dynamic Cross-Domain Access Control Model
for Collaborative Healthcare Application", 2019 IFIP/IEEE Symposium on Integrated Network and
Service Management (IM), pp.643-648, 2019.
Show Article Google Scholar
30. Chang Xu, Jiachen Wang, Liehuang Zhu, Chuan Zhang, Kashif Sharif, "PPMR: A Privacy-Preserving
Online Medical Service Recommendation Scheme in eHealthcare System", IEEE Internet of Things
Journal, vol.6, no.3, pp.5665-5673, 2019.
Show Article Google Scholar
View More
1. Wenying Zheng, Chin‐Feng Lai, Bing Chen, "Blockchain‐based access control with k $k$‐times tamper
resistance in cloud environment", International Journal of Intelligent Systems, 2022.
CrossRef Google Scholar
2. Jiawei Zhang, Yanbo Yang, Ning Lu, Zhiwei Liu, Jianfeng Ma, "A Privacy-Aware and Time-Limited Data
Access Control Scheme with Large Universe and Public Traceability for Cloud-Based IoD", Security and
Privacy in New Computing Environments, vol.423, pp.103, 2022.
CrossRef Google Scholar
3. M. D. Boomija, S. V. Kasmir Raja, "Securing medical data by role-based user policy with partially
homomorphic encryption in AWS cloud", Soft Computing, 2022.
CrossRef Google Scholar
4. Chong Wang, Hao Jin, Ronglei Wei, Ke Zhou, "Revocable, dynamic and decentralized data access control
in cloud storage", The Journal of Supercomputing, 2022.
CrossRef Google Scholar
5. Jangili Narendra, "A Robust and Secured Mechanism for Sharing Encrypted Data in Cloud
Systems", Proceedings of International Conference on Advances in Computer Engineering and
Communication Systems, vol.20, pp.359, 2021.
CrossRef Google Scholar
6. Na Shi, Liang Tan, Wenjuan Li, Xin Qi, Keping Yu, "A blockchain-empowered AAA scheme in the large-
scale HetNet", Digital Communications and Networks, vol.7, no.3, pp.308, 2021.
CrossRef Google Scholar
7. Zhengdong Cui, Feng Xu, "Research on Security of Access Control for Cloud Computing
Environment", Security, Privacy, and Anonymity in Computation, Communication, and Storage, vol.12382,
pp.145, 2021.
CrossRef Google Scholar
8. Na Shi, Liang Tan, Ciaxia Yang, Chen He, Junli Xu, Yang Lu, Hao Xu, "BacS: A blockchain-based access
control scheme in distributed internet of things", Peer-to-Peer Networking and Applications, vol.14, no.5,
pp.2585, 2021.
CrossRef Google Scholar
9. Aakib Jawed Khan, Shabana Mehfuz, "Big-data driven approaches in materials science on cloud storage
API through optimal homomorphic encryption", Materials Today: Proceedings, 2021.
CrossRef Google Scholar
10. Jin Gu, Jianqiang Shen, Baoyun Wang, "A robust and secure multi-authority access control system for
cloud storage", Peer-to-Peer Networking and Applications, vol.14, no.3, pp.1488, 2021.
CrossRef Google Scholar
11. Xieyang Shen, Chuanhe Huang, Danxin Wang, Jiaoli Shi, "A Privacy-Preserving Attribute-Based
Encryption System for Data Sharing in Smart Cities", Wireless Communications and Mobile Computing,
vol.2021, pp.1, 2021.
CrossRef Google Scholar
12. Ruili Yang, Jiageng Chen, Shangle Li, "Secure and Traceable Attribute-Based Sequential Aggregate
Signature", Security, Privacy, and Anonymity in Computation, Communication, and Storage, vol.12382,
pp.367, 2021.
CrossRef Google Scholar
13. Liming Fang, Changchun Yin, Juncen Zhu, Chunpeng Ge, M. Tanveer, Alireza Jolfaei, Zehong Cao,
"Privacy Protection for Medical Data Sharing in Smart Healthcare", ACM Transactions on Multimedia
Computing, Communications, and Applications, vol.16, no.3s, pp.1, 2021.
CrossRef Google Scholar
14. Yongkai Fan, Jiaxu Liu, Kuan-Ching Li, Wei liang, Xia Lei, Gan Tan, Mingdong Tang, "One enhanced
secure access scheme for outsourced data", Information Sciences, vol.561, pp.230, 2021.
CrossRef Google Scholar
15. Dharavath Ramesh, Rahul Mishra, Munesh Chandra Trivedi, "PCS-ABE (t, n): a secure threshold multi
authority CP-ABE scheme based efficient access control systems for cloud environment", Journal of
Ambient Intelligence and Humanized Computing, vol.12, no.10, pp.9303, 2021.
CrossRef Google Scholar
16. Yinghui Zhang, Robert H. Deng, Shengmin Xu, Jianfei Sun, Qi Li, Dong Zheng, "Attribute-based Encryption
for Cloud Computing Access Control", ACM Computing Surveys, vol.53, no.4, pp.1, 2021.
CrossRef Google Scholar
17. Hao Li, Lianbing Deng, Cheng Yang, Jianbo Liu, "An enhanced media ciphertext-policy attribute-based
encryption algorithm on media cloud", International Journal of Distributed Sensor Networks, vol.16, no.2,
pp.155014772090819, 2020.
CrossRef Google Scholar
18. Qi Li, Yinghui Zhang, Tao Zhang, "Fine-Grained Access Control in mHealth with Hidden Policy and
Traceability", Broadband Communications, Networks, and Systems, vol.303, pp.261, 2019.
CrossRef Google Scholar
19. J.S. Rauthan, K.S. Vaisla, "VRS-DB: Preserve confidentiality of users' data using encryption
approach", Digital Communications and Networks, 2019.
CrossRef Google Scholar
22. Balasubramanian Prabhu kavin, Sannasi Ganapathy, "A secured storage and privacy-preserving model
using CRT for providing security on cloud and IoT-based applications", Computer Networks, vol.151,
pp.181, 2019.
CrossRef Google Scholar
23. Youwen Zhu, Yue Zhang, Xingxin Li, Hongyang Yan, Jing Li, "Improved collusion‐resisting secure nearest
neighbor query over encrypted data in cloud", Concurrency and Computation: Practice and Experience,
vol.31, no.21, 2019.
CrossRef Google Scholar
24. Qi Li, Hongbo Zhu, Jinbo Xiong, Ruo Mo, Zuobin Ying, Huaqun Wang, "Fine-grained multi-authority access
control in IoT-enabled mHealth", Annals of Telecommunications, vol.74, no.7-8, pp.389, 2019.
CrossRef Google Scholar
25. Guoxiu Liu, Geng Yang, Huaqun Wang, Yang Xiang, Hua Dai, "A Novel Secure Scheme for Supporting
Complex SQL Queries over Encrypted Databases in Cloud Computing", Security and Communication
Networks, vol.2018, pp.1, 2018.
CrossRef Google Scholar
26. Ruoshui Liu, Jianghui Liu, Jingjie Zhang, Moli Zhang, "Video Data Integrity Verification Method Based on
Full Homomorphic Encryption in Cloud System", International Journal of Digital Multimedia Broadcasting,
vol.2018, pp.1, 2018.
CrossRef Google Scholar
27. Yuancheng Li, Pan Zhang, Boyan Wang, "An Improved Ciphertext-Policy Attribute-Based Encryption
Scheme in Power Cloud Access Control", Applied Sciences, vol.8, no.10, pp.1836, 2018.
CrossRef Google Scholar
28. Qi Li, Hongbo Zhu, Zuobin Ying, Tao Zhang, "Traceable Ciphertext-Policy Attribute-Based Encryption with
Verifiable Outsourced Decryption in eHealth Cloud", Wireless Communications and Mobile Computing,
vol.2018, pp.1, 2018.
CrossRef Google Scholar
29. R. Senthil kumar, B. G. Geetha, "Signature Verification and Bloom Hashing Technique for Efficient Cloud
Data Storage", Wireless Personal Communications, vol.103, no.4, pp.3079, 2018.
CrossRef Google Scholar
30. Youwen Zhu, Yue Zhang, Jiabin Yuan, Xianmin Wang, "FTP: An Approximate Fast Privacy-Preserving
Equality Test Protocol for Authentication in Internet of Things", Security and Communication Networks,
vol.2018, pp.1, 2018.