HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing Z Wan, JL Liu, RH Deng Information Forensics and Security, IEEE Transactions on 7 (2), 743-754, 2012 | 744 | 2012 |
Attribute-based encryption with verifiable outsourced decryption J Lai, RH Deng, C Guan, J Weng IEEE Transactions on information forensics and security 8 (8), 1343-1354, 2013 | 582 | 2013 |
CrowdBC: A blockchain-based decentralized framework for crowdsourcing M Li, J Weng, A Yang, W Lu, Y Zhang, L Hou, JN Liu, Y Xiang, RH Deng IEEE transactions on parallel and distributed systems 30 (6), 1251-1266, 2018 | 542 | 2018 |
Efficient and practical fair exchange protocols with off-line TTP F Bao, RH Deng, W Mao Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No. 98CB36186 …, 1998 | 503 | 1998 |
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage CK CHU, S Chow, WG Tzeng, J Zhou, RH DENG IEEE Transactions on Parallel and Distributed Systems 25 (2), 468, 2014 | 479 | 2014 |
Security and privacy in smart health: Efficient policy-hiding attribute-based access control Y Zhang, D Zheng, RH Deng IEEE Internet of Things Journal 5 (3), 2130-2145, 2018 | 475 | 2018 |
Variations of diffie-hellman problem F Bao, RH Deng, H Zhu International conference on information and communications security, 301-312, 2003 | 432 | 2003 |
Efficient unidirectional proxy re-encryption SSM Chow, J Weng, Y Yang, RH Deng Progress in Cryptology–AFRICACRYPT 2010: Third International Conference on …, 2010 | 429 | 2010 |
ROPecker: A generic and practical approach for defending against ROP attack Y Cheng, Z Zhou, Y Miao, X Ding, RH DENG | 405 | 2014 |
Chosen-ciphertext secure proxy re-encryption without pairings RH Deng, J Weng, S Liu, K Chen Cryptology and Network Security: 7th International Conference, CANS 2008 …, 2008 | 360 | 2008 |
Trellis coded multidimensional phase modulation SS Pietrobon, RH Deng, A Lafanechere, G Ungerboeck, DJ Costello IEEE Trans. on Information Theory 36, 63, 1990 | 353 | 1990 |
A signcryption scheme with signature directly verifiable by public key F Bao, RH Deng International workshop on public key cryptography, 55-59, 1998 | 345 | 1998 |
Private query on encrypted data in multi-user settings F Bao, RH Deng, X Ding, Y Yang International Conference on Information Security Practice and Experience, 71-85, 2008 | 330 | 2008 |
Practical protocols for certified electronic mail RH Deng, L Gong, AA Lazar, W Wang Journal of network and systems management 4, 279-297, 1996 | 322 | 1996 |
Anonymous secure routing in mobile ad-hoc networks B Zhu, Z Wan, MS Kankanhalli, F Bao, RH Deng 29th annual IEEE international conference on local computer networks, 102-108, 2004 | 317 | 2004 |
A generic framework for three-factor authentication: Preserving security and privacy in distributed systems X Huang, Y Xiang, A Chonka, J Zhou, RH Deng IEEE Transactions on Parallel and Distributed Systems 22 (8), 1390-1397, 2010 | 301 | 2010 |
On the equivalence of McEliece's and Niederreiter's public-key cryptosystems YX Li, RH Deng, XM Wang IEEE Transactions on Information Theory 40 (1), 271-273, 1994 | 283 | 1994 |
Conditional proxy re-encryption secure against chosen-ciphertext attack J Weng, RH Deng, X Ding, CK Chu, J Lai Proceedings of the 4th international symposium on information, computer, and …, 2009 | 271 | 2009 |
An efficient privacy-preserving outsourced calculation toolkit with multiple keys X Liu, RH Deng, KKR Choo, J Weng IEEE Transactions on Information Forensics and Security 11 (11), 2401-2414, 2016 | 262 | 2016 |
Blockchain based efficient and robust fair payment for outsourcing services in cloud computing Y Zhang, RH Deng, X Liu, D Zheng Information Sciences 462, 262-277, 2018 | 242 | 2018 |