Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud B Wang, B Li, H Li IEEE Cloud 2012, 2012 | 756 | 2012 |
Public Auditing for Shared Data with Efficient User Revocation in the Cloud B Wang, B Li, H Li IEEE INFOCOM, 2904 - 2912, 2013 | 630* | 2013 |
Medblock: Efficient and secure medical data sharing via blockchain K Fan, S Wang, Y Ren, H Li, Y Yang Journal of medical systems 42, 1-11, 2018 | 625 | 2018 |
Achieving k-anonymity in privacy-aware location-based services B Niu, Q Li, X Zhu, G Cao, H Li IEEE INFOCOM 2014-IEEE conference on computer communications, 754-762, 2014 | 560 | 2014 |
Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking W Sun, B Wang, N Cao, M Li, W Lou, YT Hou, H Li Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013 | 499 | 2013 |
A survey on security aspects for LTE and LTE-A networks J Cao, M Ma, H Li, Y Zhang, Z Luo IEEE communications surveys & tutorials 16 (1), 283-302, 2013 | 375 | 2013 |
A novel attribute-based access control scheme using blockchain for IoT S Ding, J Cao, C Li, K Fan, H Li IEEE Access 7, 38431-38441, 2019 | 353 | 2019 |
Protecting your right: Verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud W Sun, S Yu, W Lou, YT Hou, H Li IEEE Transactions on Parallel and Distributed Systems 27 (4), 1187-1198, 2014 | 326 | 2014 |
Enhancing privacy through caching in location-based services B Niu, Q Li, X Zhu, G Cao, H Li 2015 IEEE conference on computer communications (INFOCOM), 1017-1025, 2015 | 314 | 2015 |
Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking W Sun, B Wang, N Cao, M Li, W Lou, YT Hou, H Li IEEE transactions on parallel and distributed systems 25 (11), 3025-3035, 2013 | 313 | 2013 |
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing Y Zhang, X Chen, J Li, DS Wong, H Li, I You Information Sciences 379, 42-61, 2017 | 289 | 2017 |
Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud B Wang, B Li, H Li ACNS 2012, LNCS 7341, 507-525, 2012 | 284 | 2012 |
Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud W Sun, S Yu, W Lou, YT Hou, H Li IEEE INFOCOM 2014-IEEE conference on computer communications, 226-234, 2014 | 278 | 2014 |
A survey on security aspects for 3GPP 5G networks J Cao, M Ma, H Li, R Ma, Y Sun, P Yu, L Xiong IEEE communications surveys & tutorials 22 (1), 170-195, 2019 | 246 | 2019 |
Storing shared data on the cloud via security-mediator B Wang, SSM Chow, M Li, H Li 2013 IEEE 33rd International Conference on Distributed Computing Systems …, 2013 | 242 | 2013 |
SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks C Lai, H Li, R Lu, XS Shen Computer Networks 57 (17), 3492-3510, 2013 | 222 | 2013 |
Efficient privacy-preserving authentication for vehicular ad hoc networks X Zhu, S Jiang, L Wang, H Li IEEE Transactions on Vehicular Technology 63 (2), 907-919, 2013 | 216 | 2013 |
Lightweight RFID protocol for medical privacy protection in IoT K Fan, W Jiang, H Li, Y Yang IEEE Transactions on Industrial Informatics 14 (4), 1656-1665, 2018 | 203 | 2018 |
Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data W Sun, X Liu, W Lou, YT Hou, H Li 2015 IEEE Conference on Computer Communications (INFOCOM), 2110-2118, 2015 | 177 | 2015 |
Blockchain‐based efficient privacy preserving and data sharing scheme of content‐centric network in 5G K Fan, Y Ren, Y Wang, H Li, Y Yang IET communications 12 (5), 527-532, 2018 | 166 | 2018 |