1 |
Privacy-Aware Image Authentication from Cryptographic Primitives
|
期刊论文 |
Haixia Chen;Xinyi Huang;Wei Wu;Yi Mu |
2 |
Multi-User Verifiable Searchable Symmetric Encryption for Cloud Storage
|
期刊论文 |
Xueqiao Liu;Guomin Yang;Yi Mu;Robert H. Deng |
3 |
Novel updatable identity-based hash proof system and its applications
|
期刊论文 |
Yanwei Zhou;Guomin Yang;Tao Wang;Yi Mu |
4 |
A practical and communication-efficient deniable authentication with source-hiding and its application on Wi-Fi privacy
|
期刊论文 |
Shengke Zeng;Yi Mu;Hongjie Zhang;Mingxing He |
5 |
Novel updatable identity-based hash proof system and its applications
|
期刊论文 |
周彦伟;杨波;王涛;穆怡 |
6 |
Secure Outsourced Attribute-based Sharing Framework for Lightweight Devices in Smart Health Systems
|
期刊论文 |
Leyou Zhang;Wenting You;Yi Mu |
7 |
Privacy-Preserving Certificateless Cloud Auditing with Multiple Users
|
期刊论文 |
Ge Wu;Yi Mu;Willy Susilo;Fuchun Guo;Futai Zhang |
8 |
An Expressive “Test-Decrypt-Verify” Attribute-Based Encryption Scheme With Hidden Policy for Smart Medical Cloud
|
期刊论文 |
Gongcheng Hu;Leyou Zhang;Yi Mu;Xiaoxu Gao |
9 |
Identity-based encryption with leakage-amplified chosen-ciphertext attacks security
|
期刊论文 |
Yanwei Zhou;Bo Yang;Zhe Xia;Mingwu Zhang;Yi Mu |
10 |
An Improved Durandal Signature Scheme
|
期刊论文 |
Yongcheng Song;Xinyi Huang;Yi Mu;Wei Wu |
11 |
Policy-Driven Blockchain and Its Applications for Transport Systems
|
期刊论文 |
Yi Mu;Fatemeh Rezaeibagha;Ke Huang |
12 |
Identity-Based Encryption With Continuous Leakage-Resilient CCA Security From Static Complexity Assumption
|
期刊论文 |
Yanwei Zhou;Zhaolong Wang;Zirui Qiao;Ying Wang;Bo Yang;Yi Mu;Mingwu Zhang |
13 |
Secure and Efficient General Circuits Attribute-Based Access Control in Cloud Computing
|
期刊论文 |
Qing Wu;Liangjun Li;Leyou Zhang;Yi Mu;Fatemeh Rezaeibagha |
14 |
Outsourcing Attributed-Based Ranked Searchable Encryption With Revocation for Cloud Storage
|
期刊论文 |
Leyou Zhang;Jian Su;Yi Mu |
15 |
Scalable and redactable blockchain with update and anonymity
|
期刊论文 |
Ke Huang;Xiaosong Zhang;Yi Mu;Fatemeh Rezaeibagha;Xiaojiang Du |
16 |
Blockchain‐based deduplication with arbitration and incentives
|
期刊论文 |
Ke Huang;Xiaosong Zhang;Yi Mu;Fatemeh Rezaeibagha;Xiaoming Huang;Yongcheng Gong |
17 |
Blockchain-based random auditor committee for integrity verification
|
期刊论文 |
Lanxiang Chen;Qingxiao Fu;Yi Mu;Lingfang Zeng;Fatemeh Rezaeibagha;Min-Shiang Hwang |
18 |
BA2P : Bidirectional and Anonymous Auction Protocol with Dispute-Freeness
|
期刊论文 |
Ke Huang;Yi Mu;Fatemeh Rezaeibagha;Zheyuan He;Xiaosong Zhang |
19 |
Novel generic construction of leakage-resilient PKE scheme with CCA security
|
期刊论文 |
Yanwei Zhou;Bo Yang;Zhe Xia;Mingwu Zhang;Yi Mu |
20 |
Privacy-Preserving Flexible Access Control for Encrypted Data in Internet of Things
|
期刊论文 |
Leyou Zhang;Jun Wang;Yi Mu |
21 |
Secure Data Sharing With Lightweight Computation in E-Health
|
期刊论文 |
Leyou Zhang;Xuehuang Gao;Yi Mu |
22 |
Blockchain-enabled multi-authorization and multi-cloud attribute-based keyword search over encrypted data in the cloud
|
期刊论文 |
Qing Wu;Taotao Lai;Leyou Zhang;Yi Mu;Fatemeh Rezaeibagha |
23 |
Secure Decentralized Attribute-Based Sharing of Personal Health Records with Blockchain
|
期刊论文 |
Leyou Zhang;Tianshuai Zhang;Qing Wu;Yi Mu;Fatemeh Rezaeibagha |
24 |
Multicopy provable data possession scheme supporting data dynamics for cloud-based Electronic Medical Record system
|
期刊论文 |
Lei Zhou;Anmin Fu;Yi Mu;Huaqun Wang;Shui Yu;Yinxia Sun |
25 |
Towards Practical Privacy-Preserving Decision Tree Training and Evaluation in the Cloud
|
期刊论文 |
Lin Liu;Rongmao Chen;Ximeng Liu;Jinshu Su;Linbo Qiao |
26 |
Enhanced bitcoin with two-factor authentication
|
期刊论文 |
Fatemeh Rezaeibagha;Yi Mu;Ke Huang;Leyou Zhang |
27 |
Efficient and secure image authentication with robustness and versatility
|
期刊论文 |
Haixia Chen;Xinyi Huang;Wei Wu;Yi Mu |
28 |
A Traceable and Revocable Multi-Authority Access Control Scheme with Privacy Preserving for Mhealth
|
期刊论文 |
Leyou Zhang;Chuchu Zhao;Qing Wu;Yi Mu;Fatemeh Rezaeibagha |
29 |
CASE-SSE: Context-aware Semantically Extensible Searchable Symmetric Encryption for Encrypted Cloud Data
|
期刊论文 |
Lanxiang Chen;Yujie Xue;Yi Mu;Lingfang Zeng;Fatemeh Rezaeibagha;Robert Deng |
30 |
Toward Secure Data Computation and Outsource for Multi-User Cloud-Based IoT
|
期刊论文 |
Fatemeh Rezaeibagha;Yi Mu;Ke Huang;Lanxiang Chen;Leyou Zhang |
31 |
Multiauthority Access Control With Anonymous Authentication for Personal Health Record
|
期刊论文 |
Leyou Zhang;Yadi Ye;Yi Mu |
32 |
A Secure and Efficient Decentralized Access Control Scheme Based on Blockchain for Vehicular Social Networks
|
期刊论文 |
Leyou Zhang;Ye Zhang;Qing Wu;Yi Mu;Fatemeh Rezaeibagha |
33 |
Secure and Efficient Data Aggregation for IoT Monitoring Systems
|
期刊论文 |
Fatemeh Rezaeibagha;Yi Mu;Ke Huang;Lanxiang Chen |
34 |
An Expressive “Test-Decrypt-Verify” Attribute-Based Encryption Scheme With Hidden Policy for Smart Medical Cloud
|
期刊论文 |
Gongcheng Hu;Leyou Zhang;Yi Mu |
35 |
Efficient identity-based broadcast encryption with keyword search against insider attacks for database systems
|
期刊论文 |
Peng Jiang;Fuchun Guo;Yi Mu |
36 |
Improving Security and Privacy Attribute Based Data Sharing in Cloud Computing
|
期刊论文 |
Leyou Zhang;Yilei Cui;Yi Mu |
37 |
Distributed Ciphertext-Policy Attribute-Based Encryption With Enhanced Collusion Resilience and Privacy Preservation
|
期刊论文 |
Leyou Zhang;Xuehuang Gao;Li Kang;Pengfei Liang;Yi Mu |
38 |
Structured Encryption for Knowledge Graphs
|
期刊论文 |
Yujie Xue;Lanxiang Chen;Yi Mu;Lingfang Zeng;Fatemeh Rezaeibagha;Robert H. Deng |
39 |
An enhanced certificateless aggregate signature without pairings for e-healthcare system
|
期刊论文 |
Wenjie Yang;Shangpeng Wang;Yi Mu |