Probabilistic public key encryption with equality test G Yang, CH Tan, Q Huang, DS Wong Topics in Cryptology-CT-RSA 2010: The Cryptographers’ Track at the RSA …, 2010 | 306 | 2010 |
Malicious KGC attacks in certificateless cryptography MH Au, J Chen, JK Liu, Y Mu, DS Wong, G Yang Proceedings of the 2nd ACM symposium on Information, computer and …, 2007 | 290 | 2007 |
Dual-server public-key encryption with keyword search for secure cloud storage R Chen, Y Mu, G Yang, F Guo, X Wang IEEE transactions on information forensics and security 11 (4), 789-798, 2015 | 273 | 2015 |
Two-factor mutual authentication based on smart cards and passwords G Yang, DS Wong, H Wang, X Deng Journal of computer and system sciences 74 (7), 1160-1172, 2008 | 250 | 2008 |
A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing K Liang, MH Au, JK Liu, W Susilo, DS Wong, G Yang, Y Yu, A Yang Future Generation Computer Systems 52, 95-108, 2015 | 181 | 2015 |
Hidden ciphertext policy attribute-based encryption under standard assumptions TVX Phuong, G Yang, W Susilo IEEE transactions on information forensics and security 11 (1), 35-45, 2015 | 180 | 2015 |
Universal authentication protocols for anonymous wireless communications G Yang, Q Huang, DS Wong, X Deng IEEE Transactions on Wireless Communications 9 (1), 168-174, 2010 | 173 | 2010 |
A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing K Liang, MH Au, JK Liu, W Susilo, DS Wong, G Yang, TVX Phuong, Q Xie IEEE Transactions on Information Forensics and Security 9 (10), 1667-1680, 2014 | 160 | 2014 |
BL-MLE: Block-level message-locked encryption for secure large file deduplication R Chen, Y Mu, G Yang, F Guo IEEE Transactions on Information Forensics and Security 10 (12), 2643-2652, 2015 | 146 | 2015 |
Server-aided public key encryption with keyword search R Chen, Y Mu, G Yang, F Guo, X Huang, X Wang, Y Wang IEEE Transactions on Information Forensics and Security 11 (12), 2833-2842, 2016 | 144 | 2016 |
Traceable monero: Anonymous cryptocurrency with enhanced accountability Y Li, G Yang, W Susilo, Y Yu, MH Au, D Liu IEEE Transactions on Dependable and Secure Computing 18 (2), 679-691, 2019 | 117 | 2019 |
Designated-server identity-based authenticated encryption with keyword search for encrypted emails H Li, Q Huang, J Shen, G Yang, W Susilo Information Sciences 481, 330-343, 2019 | 113 | 2019 |
Secure fine-grained access control and data sharing for dynamic groups in the cloud S Xu, G Yang, Y Mu, RH Deng IEEE Transactions on Information Forensics and Security 13 (8), 2101-2113, 2018 | 107 | 2018 |
A new general framework for secure public key encryption with keyword search R Chen, Y Mu, G Yang, F Guo, X Wang Information Security and Privacy: 20th Australasian Conference, ACISP 2015 …, 2015 | 102 | 2015 |
Building redactable consortium blockchain for industrial Internet-of-Things K Huang, X Zhang, Y Mu, X Wang, G Yang, X Du, F Rezaeibagha, Q Xia, ... IEEE Transactions on Industrial Informatics 15 (6), 3670-3679, 2019 | 101 | 2019 |
Attribute-based cloud data integrity auditing for secure outsourced storage Y Yu, Y Li, B Yang, W Susilo, G Yang, J Bai IEEE Transactions on Emerging Topics in Computing 8 (2), 377-390, 2017 | 95 | 2017 |
Anonymous and authenticated key exchange for roaming networks G Yang, DS Wong, X Deng IEEE Transactions on Wireless Communications 6 (9), 3461-3472, 2007 | 93 | 2007 |
A blockchain-based self-tallying voting protocol in decentralized IoT Y Li, W Susilo, G Yang, Y Yu, D Liu, X Du, M Guizani IEEE Transactions on Dependable and Secure Computing 19 (1), 119-130, 2020 | 90 | 2020 |
Strongly secure certificateless key exchange without pairing G Yang, CH Tan Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011 | 89 | 2011 |
Exploiting the error correction mechanism in QR codes for secret sharing YW Chow, W Susilo, G Yang, JG Phillips, I Pranata, AM Barmawi Information Security and Privacy: 21st Australasian Conference, ACISP 2016 …, 2016 | 84 | 2016 |