A secure and efficient id-based aggregate signature scheme for wireless sensor networks L Shen, J Ma, X Liu, F Wei, M Miao IEEE Internet of Things Journal 4 (2), 546-554, 2016 | 52 | 2016 |
Secure multi-server-aided data deduplication in cloud computing M Miao, J Wang, H Li, X Chen Pervasive and Mobile Computing 24, 129-137, 2015 | 42 | 2015 |
An incentive mechanism for K-anonymity in LBS privacy protection based on credit mechanism X Li, M Miao, H Liu, J Ma, KC Li Soft Computing 21 (14), 3907-3917, 2017 | 40 | 2017 |
A provably secure aggregate signature scheme for healthcare wireless sensor networks L Shen, J Ma, X Liu, M Miao Journal of medical systems 40 (11), 1-10, 2016 | 24 | 2016 |
Publicly verifiable database scheme with efficient keyword search M Miao, J Wang, S Wen, J Ma Information Sciences 475, 18-28, 2019 | 15 | 2019 |
Publicly verifiable databases with efficient insertion/deletion operations M Miao, J Wang, J Ma, W Susilo Journal of Computer and System Sciences 86, 49-58, 2017 | 13 | 2017 |
Towards efficient privacy-preserving encrypted image search in cloud computing Y Wang, M Miao, J Shen, J Wang Soft Computing 23 (6), 2101-2112, 2019 | 12 | 2019 |
Enabling efficient approximate nearest neighbor search for outsourced database in cloud computing J Wang, M Miao, Y Gao, X Chen Soft Computing 20 (11), 4487-4495, 2016 | 11 | 2016 |
Efficient verifiable databases with insertion/deletion operations from delegating polynomial functions M Miao, J Ma, X Huang, Q Wang IEEE Transactions on Information Forensics and Security 13 (2), 511-520, 2017 | 10 | 2017 |
Payment-based incentive mechanism for secure cloud deduplication M Miao, T Jiang, I You International Journal of Information Management 35 (3), 379-386, 2015 | 10 | 2015 |
Secure approximate nearest neighbor search over encrypted data Y Gao, M Miao, J Wang, X Chen 2014 Ninth International Conference on Broadband and Wireless Computing …, 2014 | 10 | 2014 |
Toward forward secure SSE supporting conjunctive keyword search Y Wang, J Wang, S Sun, M Miao, X Chen IEEE Access 7, 142762-142772, 2019 | 7 | 2019 |
New publicly verifiable databases supporting insertion operation M Miao, J Wang, J Ma 2015 18th International Conference on Network-Based Information Systems, 640-642, 2015 | 4 | 2015 |
Comparable encryption scheme supporting multiple users in cloud computing J Ye, M Miao, P Chen, X Chen International Journal of High Performance Computing and Networking 11 (1), 24-33, 2018 | 3 | 2018 |
Outsourcing encrypted excel files YN Li, Q Wu, W Tang, B Qin, Q Wang, M Miao International Conference on Information Security Practice and Experience …, 2017 | 2 | 2017 |
Request-based comparable encryption scheme with multiple users J Ye, M Miao, P Chen, X Chen 2015 10th International Conference on Broadband and Wireless Computing …, 2015 | 2 | 2015 |
Enabling Compressed Encryption for Cloud Based Big Data Stores M Zhang, S Qi, M Miao, F Zhang International Conference on Cryptology and Network Security, 270-287, 2019 | 1 | 2019 |
Verifiable database supporting keyword searches with forward security M Miao, Y Wang, J Wang, X Huang Computer Standards & Interfaces, 103491, 2020 | | 2020 |
Efficient Verifiable Multi-Key Searchable Encryption in Cloud Computing Y Su, J Wang, Y Wang, M Miao IEEE Access 7, 141352-141362, 2019 | | 2019 |
An Unknown Attack Detection Scheme Based on Semi-supervised Learning and Information Gain Ratio MF Xu, XH Li, MX Miao, C Zhong, JF Ma Journal of Internet Technology 20 (2), 629-636, 2019 | | 2019 |