关注
Yinghui Zhang
Yinghui Zhang
XUPT & SMU
在 smu.edu.sg 的电子邮件经过验证
标题
引用次数
引用次数
年份
Secure attribute-based data sharing for resource-limited users in cloud computing
J Li, Y Zhang, X Chen, Y Xiang
Computers & Security 72, 1-12, 2018
4812018
Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control
Y Zhang, D Zheng, RH Deng
IEEE Internet of Things Journal 5 (3), 2130-2145, 2018
4042018
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
Y Zhang, X Chen, J Li, DS Wong, H Li, I You
Information Sciences 379, 42-61, 2017
2842017
Blockchain based Efficient and Robust Fair Payment for Outsourcing Services in Cloud Computing
Y Zhang, RH Deng, X Liu, D Zheng
Information Sciences 462, 262-277, 2018
2192018
Anonymous attribute-based encryption supporting efficient decryption test
Y Zhang, X Chen, J Li, DS Wong, H Li
Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and …, 2013
1452013
Secure and fine-grained access control on e-healthcare records in mobile cloud computing
Y Liu, Y Zhang, J Ling, Z Liu
Future Generation Computer Systems 78, 1020-1026, 2018
1372018
Efficient and Robust Certificateless Signature for Data Crowdsensing in Cloud-assisted Industrial IoT
Y Zhang, R Deng, D Zheng, J Li, P Wu, J Cao
IEEE Transactions on Industrial Informatics, 2019
1282019
Outsourcing Service Fair Payment based on Blockchain and its Applications in Cloud Computing
Y Zhang, RH Deng, X Liu, D Zheng
IEEE Transactions on Services Computing 14 (4), 1152-1166, 2021
127*2021
Attribute-Based Encryption for Cloud Computing Access Control: A Survey
Y Zhang, R Deng, S Xu, J Sun, Q Li, D Zheng
ACM Computing Surveys (CSUR) 53 (4), Article No.: 83, pp 1-41, 2020
1132020
Attribute-Based Encryption for Cloud Computing Access Control: A Survey
Y Zhang, R Deng, S Xu, J Sun, Q Li, D Zheng
ACM Computing Surveys (CSUR), 0
113
TKSE: Trustworthy Keyword Search over Encrypted Data with Two-side Verifiability via Blockchain
Y Zhang, RH Deng, J Shu, K Yang, D Zheng
IEEE Access 6, 31077-31087, 2018
1092018
Efficient and privacy-preserving traceable attribute-based encryption in blockchain
A Wu, Y Zhang, X Zheng, R Guo, Q Zhao, D Zheng
Annals of Telecommunications, 1-11, 2019
1042019
Robust and Universal Seamless Handover Authentication in 5G HetNets
Y Zhang, R Deng, E Bertino, D Zheng
IEEE Transactions on Dependable and Secure Computing 18 (2), 858-874, 2021
942021
Computationally efficient ciphertext-policy attribute-based encryption with constant-size ciphertexts
Y Zhang, D Zheng, X Chen, J Li, H Li
International Conference on Provable Security, 259-273, 2014
892014
Privacy-preserving communication and power injection over vehicle networks and 5G smart grid slice
Y Zhang, J Li, D Zheng, P Li, Y Tian
Journal of Network and Computer Applications 122, 50-60, 2018
762018
Anonymous attributebased proxy reencryption for access control in cloud computing
Y Zhang, J Li, X Chen, H Li
Security and Communication Networks 9 (14), 2397-2411, 2016
762016
Lightweight and Privacy-Aware Fine-Grained Access Control for IoT-oriented Smart Health
J Sun, H Xiong, X Liu, Y Zhang, X Nie, RH Deng
IEEE Internet of Things Journal, 2020
652020
Privacy-aware attribute-based PHR sharing with user accountability in cloud computing
F Xhafa, J Feng, Y Zhang, X Chen, J Li
The Journal of Supercomputing 71 (5), 1607-1619, 2015
652015
Efficient attribute-based data sharing in mobile clouds
Y Zhang, D Zheng, X Chen, J Li, H Li
Pervasive and Mobile Computing 28, 135-149, 2016
612016
Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing
S Xu, J Ning, Y Li, Y Zhang, G Xu, X Huang, R Deng
IEEE Transactions on Dependable and Secure Computing 19 (2), 1064-1077, 2022
602022
系统目前无法执行此操作,请稍后再试。
文章 1–20