An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks Q Huang, H Li Information Sciences 403, 1-14, 2017 | 350 | 2017 |
Probabilistic public key encryption with equality test G Yang, CH Tan, Q Huang, DS Wong Topics in Cryptology-CT-RSA 2010: The Cryptographers’ Track at the RSA …, 2010 | 334 | 2010 |
Multi-authority ciphertext-policy attribute-based encryption with accountability J Li, Q Huang, X Chen, SSM Chow, DS Wong, D Xie Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011 | 230 | 2011 |
Efficient public key encryption with equality test supporting flexible authorization S Ma, Q Huang, M Zhang, B Yang IEEE Transactions on Information Forensics and Security 10 (3), 458-470, 2014 | 208 | 2014 |
Universal authentication protocols for anonymous wireless communications G Yang, Q Huang, DS Wong, X Deng IEEE Transactions on Wireless Communications 9 (1), 168-174, 2010 | 176 | 2010 |
Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles Z Liu, Z Cao, Q Huang, DS Wong, TH Yuen Computer Security–ESORICS 2011: 16th European Symposium on Research in …, 2011 | 159 | 2011 |
Multi-authority fine-grained access control with accountability and its application in cloud J Li, X Chen, SSM Chow, Q Huang, DS Wong, Z Liu Journal of Network and Computer Applications 112, 89-96, 2018 | 147 | 2018 |
User-defined privacy grid system for continuous location-based services R Schlegel, CY Chow, Q Huang, DS Wong IEEE Transactions on Mobile Computing 14 (10), 2158-2172, 2015 | 143 | 2015 |
Public-key authenticated encryption with keyword search revisited: Security model and constructions B Qin, Y Chen, Q Huang, X Liu, D Zheng Information Sciences 516, 515-528, 2020 | 133 | 2020 |
Designated-server identity-based authenticated encryption with keyword search for encrypted emails H Li, Q Huang, J Shen, G Yang, W Susilo Information Sciences 481, 330-343, 2019 | 129 | 2019 |
Public key encryption with delegated equality test in a multi-user setting S Ma, M Zhang, Q Huang, B Yang The Computer Journal 58 (4), 986-1002, 2015 | 126 | 2015 |
Heterogeneous signcryption with key privacy Q Huang, DS Wong, G Yang The Computer Journal 54 (4), 525-536, 2011 | 88 | 2011 |
Generic certificateless encryption in the standard model Q Huang, DS Wong International workshop on security, 278-291, 2007 | 78 | 2007 |
Generic transformation to strongly unforgeable signatures Q Huang, DS Wong, Y Zhao International Conference on Applied Cryptography and Network Security, 1-17, 2007 | 73 | 2007 |
Efficient strong designated verifier signature schemes without random oracle or with non-delegatability Q Huang, G Yang, DS Wong, W Susilo International Journal of Information Security 10, 373-385, 2011 | 70 | 2011 |
Cryptographic solutions for cloud storage: Challenges and research opportunities L Zhang, H Xiong, Q Huang, J Li, KKR Choo, J Li IEEE Transactions on Services Computing 15 (1), 567-587, 2019 | 65 | 2019 |
Ambiguous optimistic fair exchange Q Huang, G Yang, DS Wong, W Susilo Advances in Cryptology-ASIACRYPT 2008: 14th International Conference on the …, 2008 | 65 | 2008 |
Public-key authenticated encryption with keyword search supporting constant trapdoor generation and fast search H Li, Q Huang, J Huang, W Susilo IEEE Transactions on Information Forensics and Security 18, 396-410, 2022 | 63 | 2022 |
Digital provenance: Enabling secure data forensics in cloud computing J Li, X Chen, Q Huang, DS Wong Future Generation Computer Systems 37, 259-266, 2014 | 61 | 2014 |
Efficient optimistic fair exchange secure in the multi-user setting and chosen-key model without random oracles Q Huang, G Yang, DS Wong, W Susilo Cryptographers’ Track at the RSA Conference, 106-120, 2008 | 61 | 2008 |