Hierarchical attribute-based encryption for fine-grained access control in cloud storage services G Wang, Q Liu, J Wu Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 899 | 2010 |
Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers G Wang, Q Liu, J Wu, M Guo computers & security 30 (5), 320-331, 2011 | 317 | 2011 |
Time-based proxy re-encryption scheme for secure data sharing in a cloud environment Q Liu, G Wang, J Wu Information sciences 258, 355-370, 2014 | 307 | 2014 |
Secure and privacy preserving keyword searching for cloud storage services Q Liu, G Wang, J Wu Journal of network and computer applications 35 (3), 927-933, 2012 | 188 | 2012 |
Collaborative trajectory privacy preserving scheme in location-based services T Peng, Q Liu, D Meng, G Wang Information Sciences 387, 165-179, 2017 | 177 | 2017 |
An efficient privacy preserving keyword search scheme in cloud computing Q Liu, G Wang, J Wu 2009 International Conference on Computational Science and Engineering 2 …, 2009 | 166 | 2009 |
Preserving privacy with probabilistic indistinguishability in weighted social networks Q Liu, G Wang, F Li, S Yang, J Wu IEEE Transactions on Parallel and Distributed Systems 28 (5), 1417-1429, 2016 | 151 | 2016 |
A dual privacy preserving scheme in continuous location-based services S Zhang, G Wang, MZA Bhuiyan, Q Liu IEEE Internet of Things Journal 5 (5), 4191-4200, 2018 | 141 | 2018 |
Enabling verifiable and dynamic ranked search over outsourced data Q Liu, Y Tian, J Wu, T Peng, G Wang IEEE Transactions on Services Computing 15 (1), 69-82, 2019 | 104 | 2019 |
Enhanced location privacy preserving scheme in location-based services T Peng, Q Liu, G Wang IEEE Systems Journal 11 (1), 219-230, 2014 | 102 | 2014 |
Intelligent route planning on large road networks with efficiency and privacy Q Liu, P Hou, G Wang, T Peng, S Zhang Journal of Parallel and Distributed Computing 133, 93-106, 2019 | 94 | 2019 |
Enhancing privacy through uniform grid and caching in location-based services S Zhang, KKR Choo, Q Liu, G Wang Future Generation Computer Systems 86, 881-892, 2018 | 91 | 2018 |
A Trajectory Privacy-Preserving Scheme Based on Dual-K Mechanism for Continuous Location-Based Services S Zhang, G Wang, Q Liu, X Wen, J Liao 2017 IEEE International Symposium on Parallel and Distributed Processing …, 2017 | 88 | 2017 |
Achieving reliable and secure services in cloud computing environments Q Liu, G Wang, X Liu, T Peng, J Wu Computers & Electrical Engineering 59, 153-164, 2017 | 80 | 2017 |
Hierarchical multi-authority and attribute-based encryption friend discovery scheme in mobile social networks E Luo, Q Liu, G Wang IEEE Communications Letters 20 (9), 1772-1775, 2016 | 77 | 2016 |
Efficient information retrieval for ranked queries in cost-effective cloud environments Q Liu, CC Tan, J Wu, G Wang 2012 Proceedings IEEE INFOCOM, 2581-2585, 2012 | 72 | 2012 |
Reliable re-encryption in unreliable clouds Q Liu, CC Tan, J Wu, G Wang 2011 IEEE Global Telecommunications Conference-GLOBECOM 2011, 1-5, 2011 | 72 | 2011 |
A secure self-destructing scheme for electronic data G Wang, F Yue, Q Liu Journal of Computer and System Sciences 79 (2), 279-290, 2013 | 64 | 2013 |
Effective query grouping strategy in clouds Q Liu, Y Guo, J Wu, G Wang Journal of Computer Science and Technology 32, 1231-1249, 2017 | 58 | 2017 |
Achieving fine‐grained access control for secure data sharing on cloud servers G Wang, Q Liu, J Wu Concurrency and Computation: Practice and Experience 23 (12), 1443-1464, 2011 | 58 | 2011 |