Securely outsourcing attribute-based encryption with checkability J Li, X Huang, J Li, X Chen, Y Xiang IEEE Transactions on Parallel and Distributed Systems 25 (8), 2201-2210, 2013 | 416 | 2013 |
On the security of certificateless signature schemes from Asiacrypt 2003 X Huang, W Susilo, Y Mu, F Zhang International Conference on Cryptology and Network Security, 13-25, 2005 | 402 | 2005 |
An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks D He, S Zeadally, B Xu, X Huang IEEE Transactions on Information Forensics and Security 10 (12), 2681-2691, 2015 | 388 | 2015 |
Certificateless signature revisited X Huang, Y Mu, W Susilo, DS Wong, W Wu Australasian Conference on Information Security and Privacy, 308-322, 2007 | 355 | 2007 |
An overview of fog computing and its security issues I Stojmenovic, S Wen, X Huang, H Luan Concurrency and Computation: Practice and Experience 28 (10), 2991-3005, 2016 | 324 | 2016 |
Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage Y Yu, MH Au, G Ateniese, X Huang, W Susilo, Y Dai, G Min IEEE Transactions on Information Forensics and Security 12 (4), 767-778, 2016 | 244 | 2016 |
A secure cloud computing based framework for big data information management of smart grid J Baek, QH Vu, JK Liu, X Huang, Y Xiang IEEE transactions on cloud computing 3 (2), 233-244, 2014 | 234 | 2014 |
A generic framework for three-factor authentication: Preserving security and privacy in distributed systems X Huang, Y Xiang, A Chonka, J Zhou, RH Deng IEEE Transactions on Parallel and Distributed Systems 22 (8), 1390-1397, 2010 | 230 | 2010 |
An efficient public auditing protocol with novel dynamic structure for cloud data J Shen, J Shen, X Chen, X Huang, W Susilo IEEE Transactions on Information Forensics and Security 12 (10), 2402-2415, 2017 | 226 | 2017 |
New publicly verifiable databases with efficient updates X Chen, J Li, X Huang, J Ma, W Lou IEEE Transactions on Dependable and Secure Computing 12 (5), 546-556, 2014 | 216 | 2014 |
Targeted online password guessing: An underestimated threat D Wang, Z Zhang, P Wang, J Yan, X Huang Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016 | 207 | 2016 |
Secure sharing of personal health records in cloud computing: ciphertext-policy attribute-based signcryption J Liu, X Huang, JK Liu Future Generation Computer Systems 52, 67-76, 2015 | 187 | 2015 |
New algorithms for secure outsourcing of large-scale systems of linear equations X Chen, X Huang, J Li, J Ma, W Lou, DS Wong IEEE transactions on information forensics and security 10 (1), 69-78, 2014 | 187 | 2014 |
Certificate-based signature: security model and efficient construction J Li, X Huang, Y Mu, W Susilo, Q Wu European Public Key Infrastructure Workshop, 110-125, 2007 | 146 | 2007 |
Dynamic secure cloud storage with provenance SSM Chow, CK Chu, X Huang, J Zhou, RH Deng Cryptography and security: From theory to applications, 442-464, 2012 | 145 | 2012 |
Secure distributed deduplication systems with improved reliability J Li, X Chen, X Huang, S Tang, Y Xiang, MM Hassan, A Alelaiwi IEEE Transactions on Computers 64 (12), 3569-3579, 2015 | 134 | 2015 |
Cost-effective authentic and anonymous data sharing with forward security X Huang, JK Liu, S Tang, Y Xiang, K Liang, L Xu, J Zhou IEEE Transactions on computers 64 (4), 971-983, 2014 | 132 | 2014 |
Verifiable auditing for outsourced database in cloud computing J Wang, X Chen, X Huang, I You, Y Xiang IEEE transactions on computers 64 (11), 3293-3303, 2015 | 126 | 2015 |
Fine-grained two-factor access control for web-based cloud computing services JK Liu, MH Au, X Huang, R Lu, J Li IEEE Transactions on Information Forensics and Security 11 (3), 484-497, 2015 | 116 | 2015 |
Robust multi-factor authentication for fragile communications X Huang, Y Xiang, E Bertino, J Zhou, L Xu IEEE Transactions on Dependable and Secure Computing 11 (6), 568-581, 2014 | 115 | 2014 |