Flexible and fine-grained attribute-based data storage in cloud computing J Li, W Yao, Y Zhang, H Qian, J Han IEEE Transactions on Services Computing 10 (5), 785-796, 2016 | 341 | 2016 |
KSF-OABE: Outsourced attribute-based encryption with keyword search function for cloud storage J Li, X Lin, Y Zhang, J Han IEEE Transactions on Services Computing 10 (5), 715-725, 2016 | 340 | 2016 |
Anonymous and traceable group data sharing in cloud computing J Shen, T Zhou, X Chen, J Li, W Susilo IEEE Transactions on Information Forensics and Security 13 (4), 912-925, 2017 | 281 | 2017 |
User collusion avoidance CP-ABE with efficient attribute revocation for cloud storage J Li, W Yao, J Han, Y Zhang, J Shen IEEE Systems Journal 12 (2), 1767-1777, 2017 | 257 | 2017 |
Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation H Qian, J Li, Y Zhang, J Han International Journal of Information Security 14, 487-497, 2015 | 232 | 2015 |
Certificateless public integrity checking of group shared data on cloud storage J Li, H Yan, Y Zhang IEEE Transactions on Services Computing 14 (1), 71-81, 2018 | 194 | 2018 |
Full verifiability for outsourced decryption in attribute based encryption J Li, Y Wang, Y Zhang, J Han IEEE transactions on services computing 13 (3), 478-487, 2017 | 190 | 2017 |
Attribute based encryption with privacy protection and accountability for CloudIoT J Li, Y Zhang, J Ning, X Huang, GS Poh, D Wang IEEE Transactions on Cloud Computing 10 (2), 762-773, 2020 | 187 | 2020 |
Privacy-preserving attribute-based keyword search in shared multi-owner setting Y Miao, X Liu, KKR Choo, RH Deng, J Li, H Li, J Ma IEEE Transactions on Dependable and Secure Computing 18 (3), 1080-1094, 2019 | 173 | 2019 |
Searchable ciphertext‐policy attribute‐based encryption with revocation in cloud storage J Li, Y Shi, Y Zhang International Journal of Communication Systems 30 (1), e2942, 2017 | 163 | 2017 |
A novel efficient remote data possession checking protocol in cloud storage H Yan, J Li, J Han, Y Zhang IEEE Transactions on Information Forensics and Security 12 (1), 78-88, 2016 | 160 | 2016 |
Certificate-based signature: security model and efficient construction J Li, X Huang, Y Mu, W Susilo, Q Wu Public Key Infrastructure: 4th European PKI Workshop: Theory and Practice …, 2007 | 158 | 2007 |
Efficient identity-based provable multi-copy data possession in multi-cloud storage J Li, H Yan, Y Zhang IEEE Transactions on Cloud Computing 10 (1), 356-365, 2019 | 137 | 2019 |
Key-policy attribute-based encryption against continual auxiliary input leakage J Li, Q Yu, Y Zhang, J Shen Information Sciences 470, 175-188, 2019 | 124 | 2019 |
Hierarchical attribute based encryption with continuous leakage-resilience J Li, Q Yu, Y Zhang Information Sciences 484, 113-134, 2019 | 115 | 2019 |
Identity-based privacy preserving remote data integrity checking for cloud storage J Li, H Yan, Y Zhang IEEE Systems Journal 15 (1), 577-585, 2020 | 105 | 2020 |
Privacy-preserving and pairing-free multirecipient certificateless encryption with keyword search for cloud-assisted IIoT Y Lu, J Li, Y Zhang IEEE Internet of Things Journal 7 (4), 2553-2562, 2019 | 103 | 2019 |
Extended file hierarchy access control scheme with attribute-based encryption in cloud computing J Li, N Chen, Y Zhang IEEE Transactions on Emerging Topics in Computing 9 (2), 983-993, 2019 | 103 | 2019 |
Verifiable outsourced decryption of attribute‐based encryption with constant ciphertext length J Li, F Sha, Y Zhang, X Huang, J Shen Security and Communication Networks 2017 (1), 3596205, 2017 | 93 | 2017 |
An efficient short certificate-based signature scheme J Li, X Huang, Y Zhang, L Xu Journal of Systems and Software 85 (2), 314-322, 2012 | 87 | 2012 |