Cryptographic primitives in blockchains L Wang, X Shen, J Li, J Shao, Y Yang Journal of Network and Computer Applications 127, 43-58, 2019 | 201 | 2019 |
Mistore: a blockchain-based medical insurance storage system L Zhou, L Wang, Y Sun Journal of medical systems 42 (8), 149, 2018 | 183 | 2018 |
Beekeeper: A blockchain-based iot system with secure storage and homomorphic computation L Zhou, L Wang, Y Sun, P Lv IEEE Access 6, 43472-43488, 2018 | 169 | 2018 |
Secure data access control with ciphertext update and computation outsourcing in fog computing for Internet of Things Q Huang, Y Yang, L Wang IEEE Access 5, 12941-12950, 2017 | 135 | 2017 |
Proxy re-signature schemes without random oracles J Shao, Z Cao, L Wang, X Liang International Conference on Cryptology in India, 197-209, 2007 | 106 | 2007 |
A robust mutual authentication scheme based on elliptic curve cryptography for telecare medical information systems S Qiu, G Xu, H Ahmad, L Wang IEEE access 6, 7452-7463, 2017 | 82 | 2017 |
New identity-based proxy re-encryption schemes to prevent collusion attacks L Wang, L Wang, M Mambo, E Okamoto International Conference on Pairing-Based Cryptography, 327-346, 2010 | 79 | 2010 |
Multi-use and unidirectional identity-based proxy re-encryption schemes H Wang, Z Cao, L Wang Information Sciences 180 (20), 4042-4059, 2010 | 75 | 2010 |
Key-policy attribute-based encryption with equality test in cloud computing H Zhu, L Wang, H Ahmad, X Niu IEEE Access 5, 20428-20439, 2017 | 67 | 2017 |
Simulatability and security of certificateless threshold signatures L Wang, Z Cao, X Li, H Qian Information Sciences 177 (6), 1382-1394, 2007 | 64 | 2007 |
Compressive sensing of medical images with confidentially homomorphic aggregations L Wang, L Li, J Li, J Li, BB Gupta, X Liu IEEE Internet of Things Journal 6 (2), 1402-1409, 2018 | 59 | 2018 |
An IOT-Oriented Privacy-Preserving Publish/Subscribe Model Over Blockchains P Lv, L Wang, H Zhu, W Deng, L Gu IEEE Access 7, 41309-41314, 2019 | 57 | 2019 |
New Public Key Cryptosystems Using Polynomials over Non-commutative Rings. Z Cao, X Dong, L Wang IACR Cryptology ePrint Archive 2007, 9, 2007 | 56 | 2007 |
: An Efficient Privacy-Preserving Data-Forwarding Scheme for Service-Oriented Vehicular Ad Hoc Networks X Dong, L Wei, H Zhu, Z Cao, L Wang IEEE Transactions on Vehicular Technology 60 (2), 580-591, 2010 | 48 | 2010 |
DECENT: Secure and fine-grained data access control with policy updating for constrained IoT devices Q Huang, L Wang, Y Yang World Wide Web 21 (1), 151-167, 2018 | 43 | 2018 |
Prediction of rising stars in the game of cricket H Ahmad, A Daud, L Wang, H Hong, H Dawood, Y Yang IEEE Access 5, 4104-4124, 2017 | 42 | 2017 |
New public key cryptosystems based on non‐Abelian factorization problems L Gu, L Wang, K Ota, M Dong, Z Cao, Y Yang Security and Communication Networks 6 (7), 912-922, 2013 | 42 | 2013 |
Multi-level multi-secret sharing scheme for decentralized e-voting in cloud computing J Li, X Wang, Z Huang, L Wang, Y Xiang Journal of Parallel and Distributed Computing 130, 91-97, 2019 | 41 | 2019 |
Lightweight Cryptographic Techniques for Automotive Cybersecurity AK Jadoon, L Wang, T Li, MA Zia Wireless Communications and Mobile Computing 2018, 2018 | 41 | 2018 |
BeeKeeper 2.0: Confidential Blockchain-Enabled IoT System with Fully Homomorphic Computation L Zhou, L Wang, T Ai, Y Sun Sensors 18 (11), 3785, 2018 | 35 | 2018 |