Auditable -Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing J Ning, Z Cao, X Dong, K Liang, H Ma, L Wei IEEE Transactions on Information Forensics and Security 13 (1), 94-105, 2017 | 199 | 2017 |
Revisiting attribute-based encryption with verifiable outsourced decryption S Lin, R Zhang, H Ma, M Wang IEEE Transactions on Information Forensics and Security 10 (10), 2119-2130, 2015 | 157 | 2015 |
Verifiable and exculpable outsourced attribute-based encryption for access control in cloud computing H Ma, R Zhang, Z Wan, Y Lu, S Lin IEEE transactions on dependable and secure computing 14 (6), 679-692, 2017 | 109 | 2017 |
Fine-grained access control system based on fully outsourced attribute-based encryption R Zhang, H Ma, Y Lu Journal of Systems and Software 125, 344-353, 2017 | 68 | 2017 |
Efficient fine-grained data sharing mechanism for electronic medical record systems with mobile devices H Ma, R Zhang, G Yang, Z Song, K He, Y Xiao IEEE Transactions on Dependable and Secure Computing 17 (5), 1026-1038, 2018 | 48 | 2018 |
Efficient Multi-Factor Authenticated Key Exchange Scheme for Mobile Communications R Zhang, Y Xiao, S Sun, H Ma IEEE Transactions on Dependable and Secure Computing 16 (4), 625-634, 2019 | 40 | 2019 |
Concessive online/offline attribute based encryption with cryptographic reverse firewalls—Secure and efficient fine-grained access control on corrupted machines H Ma, R Zhang, G Yang, Z Song, S Sun, Y Xiao Computer Security: 23rd European Symposium on Research in Computer Security …, 2018 | 35 | 2018 |
Efficient Parallelism of Post-Quantum Signature Scheme SPHINCS S Sun, R Zhang, M Hui IEEE Transactions on Parallel and Distributed Systems 31 (11), 2542-2555, 2020 | 30 | 2020 |
Access control encryption based on LWE G Tan, R Zhang, H Ma, Y Tao Proceedings of the 4th ACM International Workshop on ASIA Public-Key …, 2017 | 28 | 2017 |
Server-aided fine-grained access control mechanism with robust revocation in cloud computing H Ma, R Zhang, S Sun, Z Song, G Tan IEEE Transactions on Services Computing 15 (1), 164-173, 2019 | 26 | 2019 |
Provably secure cloud storage for mobile networks with less computation and smaller overhead R Zhang, H Ma, Y Lu, Y Li Science China Information Sciences 60, 1-13, 2017 | 22 | 2017 |
RKA security of identity-based homomorphic signature scheme J Chang, H Ma, A Zhang, M Xu, R Xue IEEE Access 7, 50858-50868, 2019 | 18 | 2019 |
Fully Accountable Data Sharing for Pay-As-You-Go Cloud Scenes T Wang, H Ma, Y Zhou, R Zhang, Z Song IEEE Transactions on Dependable and Secure Computing, 2019 | 15 | 2019 |
Comments on “control cloud data access privilege and anonymity with fully anonymous attribute-based encryption” H Ma, R Zhang, W Yuan IEEE Transactions on Information Forensics and Security 11 (4), 866-867, 2015 | 15 | 2015 |
Wolverine: A scalable and transaction-consistent redactable permissionless blockchain J Li, H Ma, J Wang, Z Song, W Xu, R Zhang IEEE Transactions on Information Forensics and Security 18, 1653-1666, 2023 | 13 | 2023 |
Server-aided immediate and robust user revocation mechanism for SM9 S Sun, H Ma, R Zhang, W Xu Cybersecurity 3 (1), 12, 2020 | 11 | 2020 |
WebCloud: Web-Based Cloud Storage for Secure Data Sharing across Platforms S Sun, H Ma, R Zhang, Z Song IEEE Transactions on Dependable and Secure Computing, 2020 | 10 | 2020 |
Everything under control: secure data sharing mechanism for cloud-edge computing Z Song, H Ma, R Zhang, W Xu, J Li IEEE Transactions on Information Forensics and Security 18, 2234-2249, 2023 | 6 | 2023 |
Enhanced Dual‐Policy Attribute‐Based Encryption for Secure Data Sharing in the Cloud T Wang, Y Zhou, H Ma, R Zhang Security and Communication Networks 2022 (1), 1867584, 2022 | 5 | 2022 |
Tightly Secure Two-Pass Authenticated Key Exchange Protocol in the CK Model Y Xiao, R Zhang, H Ma The Cryptographers' Track at the RSA Conference 2020, 2020 | 4 | 2020 |