Mobile device assisted secure computer network communication B Zhu, M Feng, X Yin, Y Yang, Y Zhang, J Shao US Patent 8,209,744, 2012 | 463 | 2012 |
CCA-secure proxy re-encryption without pairings J Shao, Z Cao International Workshop on Public Key Cryptography, 357-376, 2009 | 440 | 2009 |
Toward efficient and privacy-preserving computing in big data era R Lu, H Zhu, X Liu, JK Liu, J Shao IEEE Network 28 (4), 46-50, 2014 | 424 | 2014 |
Attribute based proxy re-encryption with delegating capabilities X Liang, Z Cao, H Lin, J Shao Proceedings of the 4th international symposium on information, computer, and …, 2009 | 360 | 2009 |
A threshold anonymous authentication protocol for VANETs J Shao, X Lin, R Lu, C Zuo IEEE Transactions on vehicular technology 65 (3), 1711-1720, 2015 | 347 | 2015 |
Cryptographic primitives in blockchains L Wang, X Shen, J Li, J Shao, Y Yang Journal of Network and Computer Applications 127, 43-58, 2019 | 244 | 2019 |
REPLACE: A reliable trust-based platoon service recommendation scheme in VANET H Hu, R Lu, Z Zhang, J Shao IEEE Transactions on Vehicular Technology 66 (2), 1786-1797, 2016 | 227 | 2016 |
Privacy-preserving-outsourced association rule mining on vertically partitioned databases L Li, R Lu, KKR Choo, A Datta, J Shao IEEE transactions on information forensics and security 11 (8), 1847-1861, 2016 | 226 | 2016 |
Proxy re-encryption with keyword search J Shao, Z Cao, X Liang, H Lin Information Sciences 180 (13), 2576-2587, 2010 | 225 | 2010 |
Secure threshold multi authority attribute based encryption without a central authority H Lin, Z Cao, X Liang, J Shao Progress in Cryptology-INDOCRYPT 2008: 9th International Conference on …, 2008 | 206 | 2008 |
Secure threshold multi authority attribute based encryption without a central authority H Lin, Z Cao, X Liang, J Shao Information Sciences 180 (13), 2618-2632, 2010 | 171 | 2010 |
CCA-secure ABE with outsourced decryption for fog computing C Zuo, J Shao, G Wei, M Xie, M Ji Future Generation Computer Systems 78, 730-738, 2018 | 167 | 2018 |
FINE: A fine-grained privacy-preserving location-based service framework for mobile devices J Shao, R Lu, X Lin IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 244-252, 2014 | 164 | 2014 |
CAM: cloud-assisted privacy preserving mobile health monitoring H Lin, J Shao, C Zhang, Y Fang IEEE Transactions on Information Forensics and Security 8 (6), 985-997, 2013 | 156 | 2013 |
A new efficient (t, n) verifiable multi-secret sharing (VMSS) based on YCH scheme J Shao, Z Cao Applied Mathematics and Computation 168 (1), 135-140, 2005 | 139 | 2005 |
Data security and privacy in fog computing Y Guan, J Shao, G Wei, M Xie IEEE Network 32 (5), 106-111, 2018 | 121 | 2018 |
A dynamic membership data aggregation (DMDA) protocol for smart grid J Song, Y Liu, J Shao, C Tang IEEE Systems Journal 14 (1), 900-908, 2019 | 120 | 2019 |
Proxy re-signature schemes without random oracles J Shao, Z Cao, L Wang, X Liang International Conference on Cryptology in India, 197-209, 2007 | 111 | 2007 |
Dynamic searchable symmetric encryption with forward and stronger backward privacy C Zuo, SF Sun, JK Liu, J Shao, J Pieprzyk European symposium on research in computer security, 283-303, 2019 | 89 | 2019 |
Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption J Shao, Z Cao Information Sciences 206, 83-95, 2012 | 88 | 2012 |