Public key encryption with keyword search secure against keyword guessing attacks without random oracle L Fang, W Susilo, C Ge, J Wang Information sciences 238, 221-241, 2013 | 263 | 2013 |
Revocable identity-based broadcast proxy re-encryption for data sharing in clouds C Ge, Z Liu, J Xia, L Fang IEEE transactions on dependable and secure computing 18 (3), 1214-1226, 2019 | 190 | 2019 |
Secure keyword search and data sharing mechanism for cloud computing C Ge, W Susilo, Z Liu, J Xia, P Szalachowski, L Fang IEEE Transactions on Dependable and Secure Computing 18 (6), 2787-2800, 2020 | 151 | 2020 |
Revocable attribute-based encryption with data integrity in clouds C Ge, W Susilo, J Baek, Z Liu, J Xia, L Fang IEEE Transactions on Dependable and Secure Computing 19 (5), 2864-2872, 2021 | 147 | 2021 |
A verifiable and fair attribute-based proxy re-encryption scheme for data sharing in clouds C Ge, W Susilo, J Baek, Z Liu, J Xia, L Fang IEEE Transactions on Dependable and Secure Computing 19 (5), 2907-2919, 2021 | 117 | 2021 |
A secure channel free public key encryption with keyword search scheme without random oracle L Fang, W Susilo, C Ge, J Wang Cryptology and Network Security: 8th International Conference, CANS 2009 …, 2009 | 115 | 2009 |
Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search L Fang, W Susilo, C Ge, J Wang Theoretical Computer Science 462, 39-58, 2012 | 74 | 2012 |
A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system C Ge, W Susilo, L Fang, J Wang, Y Shi Designs, Codes and Cryptography 86, 2587-2603, 2018 | 70 | 2018 |
A blockchain based decentralized data security mechanism for the Internet of Things C Ge, Z Liu, L Fang Journal of Parallel and Distributed Computing 141, 1-9, 2020 | 56 | 2020 |
A proxy broadcast re-encryption for cloud data sharing M Sun, C Ge, L Fang, J Wang Multimedia Tools and Applications 77, 10455-10469, 2018 | 55 | 2018 |
A semi-autonomous distributed blockchain-based framework for UAVs system C Ge, X Ma, Z Liu Journal of Systems Architecture 107, 101728, 2020 | 50 | 2020 |
Identity-based conditional proxy re-encryption with fine grain policy C Ge, W Susilo, J Wang, L Fang Computer Standards & Interfaces 52, 1-9, 2017 | 44 | 2017 |
Privacy protection for medical data sharing in smart healthcare L Fang, C Yin, J Zhu, C Ge, M Tanveer, A Jolfaei, Z Cao ACM Transactions on Multimedia Computing, Communications, and Applications …, 2020 | 42 | 2020 |
Y-DWMS: A digital watermark management system based on smart contracts B Zhao, L Fang, H Zhang, C Ge, W Meng, L Liu, C Su Sensors 19 (14), 3091, 2019 | 41 | 2019 |
Interactive conditional proxy re-encryption with fine grain policy L Fang, W Susilo, C Ge, J Wang Journal of Systems and Software 84 (12), 2293-2302, 2011 | 41 | 2011 |
A key-policy attribute-based proxy re-encryption without random oracles C Ge, W Susilo, J Wang, Z Huang, L Fang, Y Ren The Computer Journal 59 (7), 970-982, 2016 | 39 | 2016 |
A CCA-secure multi-conditional proxy broadcast re-encryption scheme for cloud storage system Y Liu, Y Ren, C Ge, J Xia, Q Wang Journal of Information Security and Applications 47, 125-131, 2019 | 37 | 2019 |
A secure and authenticated mobile payment protocol against off-site attack strategy L Fang, M Li, Z Liu, C Lin, S Ji, A Zhou, W Susilo, C Ge IEEE Transactions on Dependable and Secure Computing 19 (5), 3564-3578, 2021 | 35 | 2021 |
Energy-efficient and privacy-preserving data aggregation algorithm for wireless sensor networks L Zhou, C Ge, S Hu, C Su IEEE Internet of Things Journal 7 (5), 3948-3957, 2019 | 35 | 2019 |
A privacy preserve big data analysis system for wearable wireless sensor network C Ge, C Yin, Z Liu, L Fang, J Zhu, H Ling Computers & Security 96, 101887, 2020 | 33 | 2020 |