Efficient unidirectional proxy re-encryption SSM Chow, J Weng, Y Yang, RH Deng Progress in Cryptology–AFRICACRYPT 2010: Third International Conference on …, 2010 | 428 | 2010 |
Private query on encrypted data in multi-user settings F Bao, RH Deng, X Ding, Y Yang International Conference on Information Security Practice and Experience, 71-85, 2008 | 325 | 2008 |
Forensic-by-design framework for cyber-physical cloud systems NH Ab Rahman, WB Glisson, Y Yang, KKR Choo IEEE Cloud Computing 3 (1), 50-59, 2016 | 201 | 2016 |
Privacy and ownership preserving of outsourced medical data E Bertino, BC Ooi, Y Yang, RH Deng 21st International Conference on Data Engineering (ICDE'05), 521-532, 2005 | 194 | 2005 |
Efficient online/offline identity-based signature for wireless sensor network JK Liu, J Baek, J Zhou, Y Yang, JW Wong International Journal of Information Security 9, 287-296, 2010 | 174 | 2010 |
Multi-user private keyword search for cloud computing Y Yang, H Lu, J Weng 2011 IEEE third international conference on cloud computing technology and …, 2011 | 145 | 2011 |
SKM: Scalable key management for advanced metering infrastructure in smart grids Z Wan, G Wang, Y Yang, S Shi IEEE Transactions on Industrial Electronics 61 (12), 7055-7066, 2014 | 126 | 2014 |
Extended proxy-assisted approach: Achieving revocable fine-grained encryption of cloud data Y Yang, JK Liu, K Liang, KKR Choo, J Zhou Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015 | 125 | 2015 |
Efficient conditional proxy re-encryption with chosen-ciphertext security J Weng, Y Yang, Q Tang, RH Deng, F Bao Information Security: 12th International Conference, ISC 2009, Pisa, Italy …, 2009 | 123 | 2009 |
Cloud based data sharing with fine-grained proxy re-encryption Y Yang, H Zhu, H Lu, J Weng, Y Zhang, KKR Choo Pervasive and Mobile computing 28, 122-134, 2016 | 118 | 2016 |
A practical password-based two-server authentication and key exchange system Y Yang, RH Deng, F Bao IEEE Transactions on Dependable and Secure Computing 3 (2), 105-114, 2006 | 117 | 2006 |
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles J Weng, M Chen, Y Yang, R Deng, K Chen, F Bao Science China Information Sciences 53, 593-606, 2010 | 108 | 2010 |
New efficient user identification and key distribution scheme providing enhanced security Y Yang, S Wang, F Bao, J Wang, RH Deng Computers & Security 23 (8), 697-704, 2004 | 104 | 2004 |
Tailored reversible watermarking schemes for authentication of electronic clinical atlas F Bao, RH Deng, BC Ooi, Y Yang IEEE Transactions on information technology in biomedicine 9 (4), 554-563, 2005 | 96 | 2005 |
A smart-card-enabled privacy preserving e-prescription system Y Yang, X Han, F Bao, RH Deng IEEE Transactions on Information Technology in Biomedicine 8 (1), 47-58, 2004 | 80 | 2004 |
Towards lightweight anonymous entity authentication for IoT applications Y Yang, H Cai, Z Wei, H Lu, KKR Choo Information Security and Privacy: 21st Australasian Conference, ACISP 2016 …, 2016 | 61 | 2016 |
A generic scheme for secure data sharing in cloud Y Yang, Y Zhang 2011 40th International Conference on Parallel Processing Workshops, 145-153, 2011 | 58 | 2011 |
Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity BM Goi, RCW Phan, Y Yang, F Bao, RH Deng, MU Siddiqi Applied Cryptography and Network Security: Second International Conference …, 2004 | 57 | 2004 |
V2X security: A case study of anonymous authentication Y Yang, Z Wei, Y Zhang, H Lu, KKR Choo, H Cai Pervasive and Mobile Computing 41, 259-269, 2017 | 55 | 2017 |
Multiuser private queries over encrypted databases Y Yang, F Bao, X Ding, RH Deng International Journal of Applied Cryptography 1 (4), 309-319, 2009 | 46 | 2009 |