An improved authentication scheme for telecare medicine information systems J Wei, X Hu, W Liu Journal of medical systems 36 (6), 3597-3604, 2012 | 176 | 2012 |
A certificateless aggregate signature scheme for healthcare wireless sensor network P Kumar, S Kumari, V Sharma, AK Sangaiah, J Wei, X Li Sustainable Computing: Informatics and Systems 18, 80-89, 2018 | 68 | 2018 |
Secure data sharing in cloud computing using revocable-storage identity-based encryption J Wei, W Liu, X Hu IEEE Transactions on Cloud Computing 6 (4), 1136 - 1148, 2018 | 48 | 2018 |
Cryptanalysis and improvement of a robust smart card authentication scheme for multi-server architecture J Wei, W Liu, X Hu Wireless personal communications 77 (3), 2255-2269, 2014 | 39 | 2014 |
Secure and Efficient Smart Card Based Remote User Password Authentication Scheme. J Wei, W Liu, X Hu IJ Network Security 18 (4), 782-792, 2016 | 33 | 2016 |
Secure and Efficient Attribute-Based Access Control for Multiauthority Cloud Storage J Wei, W Liu, X Hu IEEE Systems Journal 12 (2), 1731-1742, 2018 | 32 | 2018 |
Traceable attributebased signcryption J Wei, X Hu, W Liu Security and Communication Networks 7 (12), 2302-2317, 2014 | 28 | 2014 |
Fuzzy-means and cluster ensemble with random projection for big data clustering M Ye, W Liu, J Wei, X Hu Mathematical Problems in Engineering 2016, 2016 | 18 | 2016 |
Secure control protocol for universal serial bus mass storage devices J Wei, W Liu, X Hu IET Computers & Digital Techniques 9 (6), 321-327, 2015 | 15 | 2015 |
Forward-secure identity-based signature with efficient revocation J Wei, W Liu, X Hu International Journal of Computer Mathematics 94 (7), 1390-1411, 2017 | 12 | 2017 |
Revocable threshold attribute-based signature against signing key exposure J Wei, X Huang, X Hu, W Liu International Conference on Information Security Practice and Experience …, 2015 | 11 | 2015 |
RS-HABE: Revocable-storage and hierarchical attribute-based access scheme for secure sharing of e-health records in public cloud J Wei, X Chen, X Huang, X Hu, W Susilo IEEE Transactions on Dependable and Secure Computing, 2019 | 9 | 2019 |
Twofactor authentication scheme using attribute and password J Wei, X Hu, W Liu International Journal of Communication Systems 30 (1), e2915, 2017 | 9 | 2017 |
Forward-secure threshold attribute-based signature scheme J Wei, W Liu, X Hu The Computer Journal 58 (10), 2492-2506, 2015 | 8 | 2015 |
前向安全的密文策略基于属性加密方案 魏江宏, 刘文芬, 胡学先 通信学报 35 (7), 38-45, 2014 | 8 | 2014 |
Forward and backward secure fuzzy encryption for data sharing in cloud computing J Wei, X Hu, W Liu, Q Zhang Soft Computing 23 (2), 497–506, 2019 | 7 | 2019 |
A two-phase algorithm for generating synthetic graph under local differential privacy Y Zhang, J Wei, X Zhang, X Hu, W Liu Proceedings of the 8th International Conference on Communication and Network …, 2018 | 6 | 2018 |
Cost-effective and scalable data sharing in cloud storage using hierarchical attribute-based encryption with forward security J Wei, X Huang, W Liu, X Hu International Journal of Foundations of Computer Science 28 (07), 843-868, 2017 | 6 | 2017 |
Forward-secure puncturable identity-based encryption for securing cloud emails J Wei, X Chen, J Wang, X Hu, J Ma European Symposium on Research in Computer Security, 134-150, 2019 | 5 | 2019 |
Text clustering algorithm based on deep representation learning B Wang, W Liu, Z Lin, X Hu, J Wei, C Liu The Journal of Engineering 2018 (16), 1407-1414, 2018 | 5 | 2018 |