Dual-server public-key encryption with keyword search for secure cloud storage R Chen, Y Mu, G Yang, F Guo, X Wang IEEE transactions on information forensics and security 11 (4), 789-798, 2015 | 239 | 2015 |
BL-MLE: Block-level message-locked encryption for secure large file deduplication R Chen, Y Mu, G Yang, F Guo IEEE Transactions on Information Forensics and Security 10 (12), 2643-2652, 2015 | 124 | 2015 |
Server-aided public key encryption with keyword search R Chen, Y Mu, G Yang, F Guo, X Huang, X Wang, Y Wang IEEE Transactions on Information Forensics and Security 11 (12), 2833-2842, 2016 | 112 | 2016 |
A new general framework for secure public key encryption with keyword search R Chen, Y Mu, G Yang, F Guo, X Wang Information Security and Privacy: 20th Australasian Conference, ACISP 2015 …, 2015 | 97 | 2015 |
Cryptographic reverse firewall via malleable smooth projective hash functions R Chen, Y Mu, G Yang, W Susilo, F Guo, M Zhang Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016 | 47 | 2016 |
Strongly leakage-resilient authenticated key exchange R Chen, Y Mu, G Yang, W Susilo, F Guo Topics in Cryptology-CT-RSA 2016: The Cryptographers' Track at the RSA …, 2016 | 45 | 2016 |
Anonymous identity-based broadcast encryption with revocation for file sharing J Lai, Y Mu, F Guo, W Susilo, R Chen Information Security and Privacy: 21st Australasian Conference, ACISP 2016 …, 2016 | 43 | 2016 |
Towards practical privacy-preserving decision tree training and evaluation in the cloud L Liu, R Chen, X Liu, J Su, L Qiao IEEE Transactions on Information Forensics and Security 15, 2914-2929, 2020 | 41 | 2020 |
Recipient revocable identity-based broadcast encryption: How to revoke some recipients in IBBE without knowledge of the plaintext W Susilo, R Chen, F Guo, G Yang, Y Mu, YW Chow Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 41 | 2016 |
Toward highly secure yet efficient KNN classification scheme on outsourced cloud data L Liu, J Su, X Liu, R Chen, K Huang, RH Deng, X Wang IEEE Internet of Things Journal 6 (6), 9841-9852, 2019 | 40 | 2019 |
An efficient privacy‐preserving aggregation and billing protocol for smart grid XF Wang, Y Mu, RM Chen Security and Communication Networks 9 (17), 4536-4547, 2016 | 36 | 2016 |
Strong authenticated key exchange with auxiliary inputs R Chen, Y Mu, G Yang, W Susilo, F Guo Designs, Codes and Cryptography 85, 145-173, 2017 | 34 | 2017 |
Fully privacy-preserving and revocable ID-based broadcast encryption for data access control in smart city J Lai, Y Mu, F Guo, W Susilo, R Chen Personal and Ubiquitous computing 21, 855-868, 2017 | 27 | 2017 |
Secure channel free id-based searchable encryption for peer-to-peer group XF Wang, Y Mu, R Chen, XS Zhang Journal of Computer Science and Technology 31, 1012-1027, 2016 | 27 | 2016 |
Privacy-preserving mining of association rule on outsourced cloud data from multiple parties L Liu, J Su, R Chen, X Liu, X Wang, S Chen, H Leung Information Security and Privacy: 23rd Australasian Conference, ACISP 2018 …, 2018 | 21 | 2018 |
A practical authentication framework for VANETs B Wang, Y Wang, R Chen Security and communication networks 2019, 2019 | 20 | 2019 |
One-round privacy-preserving meeting location determination for smartphone applications X Wang, Y Mu, R Chen IEEE Transactions on Information Forensics and Security 11 (8), 1712-1721, 2016 | 20 | 2016 |
Optimal security reductions for unique signatures: bypassing impossibilities with a counterexample F Guo, R Chen, W Susilo, J Lai, G Yang, Y Mu Advances in Cryptology–CRYPTO 2017: 37th Annual International Cryptology …, 2017 | 19 | 2017 |
Fully privacy-preserving ID-based broadcast encryption with authorization J Lai, Y Mu, F Guo, R Chen The Computer Journal 60 (12), 1809-1821, 2017 | 16 | 2017 |
Subvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryption R Chen, X Huang, M Yung Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020 | 14 | 2020 |