Follow
Peng Xu
Title
Cited by
Cited by
Year
Public-key encryption with fuzzy keyword search: A provably secure scheme under keyword guessing attack
P Xu, H Jin, Q Wu, W Wang
IEEE Transactions on Computers 62 (11), 2266-2277, 2013
3252013
Conditional identity-based broadcast proxy re-encryption and its application to cloud email
P Xu, T Jiao, Q Wu, W Wang, H Jin
IEEE Transactions on Computers 65 (1), 66-79, 2016
1522016
Lightweight Searchable Public-key Encryption for Cloud-assisted Wireless Sensor Networks
P Xu, S He, W Wang, W Susilo, H Jin
IEEE Transactions on Industrial Informatics 14 (8), 3712-3723, 2018
952018
Secure Data Collection, Storage and Access in Cloud-Assisted IoT
W Wang, P Xu, LT Yang
IEEE Cloud Computing 5 (4), 77-88, 2018
852018
Generating searchable public-key ciphertexts with hidden structures for fast keyword search
P Xu, Q Wu, W Wang, W Susilo, J Domingo-Ferrer, H Jin
IEEE Transactions on Information Forensics and Security 10 (9), 1993-2006, 2015
712015
Scalable influence maximization under independent cascade model
F Lu, W Zhang, L Shao, X Jiang, P Xu, H Jin
Journal of Network and Computer Applications 86, 15-23, 2017
562017
Practical multi-keyword and boolean search over encrypted e-mail in cloud server
P Xu, S Tang, P Xu, Q Wu, H Hu, W Susilo
IEEE Transactions on Services Computing 14 (6), 1877-1889, 2019
492019
Secure data sharing and search for cloud-edge-collaborative storage
Y Tao, P Xu, H Jin
IEEE Access 8, 15963-15972, 2019
462019
Lightweighted Secure Searching over Public-key Ciphertexts for Edge-Cloud Assisted Industrial IoT Devices
W Wang, P Xu, D Liu, LT Yang, Z Yan
IEEE Transactions on Industrial Informatics 16 (6), 4221-4230, 2019
462019
Fine-grained and heterogeneous proxy re-encryption for secure cloud storage
P Xu, H Chen, D Zou, H Jin
Chinese Science Bulletin 59 (32), 4201-4209, 2014
442014
Bestie: Very practical searchable encryption with forward and backward security
T Chen, P Xu, W Wang, Y Zheng, W Susilo, H Jin
European Symposium on Research in Computer Security, 3-23, 2021
302021
ROSE: Robust searchable encryption with forward and backward security
P Xu, W Susilo, W Wang, T Chen, Q Wu, K Liang, H Jin
IEEE transactions on information forensics and security 17, 1115-1130, 2022
242022
Dynamic Searchable Symmetric Encryption with Physical Deletion and Small Leakage
P Xu, S Liang, W Wang, W Susilo, Q Wu, H Jin
22nd Australasian Conference on Information Security and Privacy, 207-226, 2017
212017
A Practical Framework for-Out-of-Oblivious Transfer With Security Against Covert Adversaries
B Zeng, C Tartary, P Xu, J Jing, X Tang
IEEE Transactions on Information Forensics and Security 7 (2), 465-479, 2012
212012
Anonymous Identity-Based Broadcast Encryption with Constant Decryption Complexity and Strong Security
P Xu, J Li, W Wang, H Jin
11th ACM on Asia Conference on Computer and Communications Security, 223-233, 2016
202016
Secure hybrid-indexed search for high efficiency over keyword searchable ciphertexts
W Wang, P Xu, H Li, LT Yang
Future Generation Computer Systems 55, 353-361, 2016
192016
Efficient server-aided secure two-party computation in heterogeneous mobile cloud computing
Y Wu, X Wang, W Susilo, G Yang, ZL Jiang, Q Chen, P Xu
IEEE Transactions on Dependable and Secure Computing 18 (6), 2820-2834, 2020
182020
Fast and parallel keyword search over public-key ciphertexts for cloud-assisted IoT
P Xu, X Tang, W Wang, H Jin, LT Yang
IEEE Access 5, 24775-24784, 2017
182017
Towards efficient yet privacy-preserving approximate search in cloud computing
A Ibrahim, H Jin, AA Yassin, D Zou, P Xu
The Computer Journal 57 (2), 241-254, 2014
182014
LaF: Lattice-Based and Communication-efficient Federated Learning
P Xu, M Hu, T Chen, W Wang, H Jin
IEEE Transactions on Information Forensics and Security 17, 2483-2496, 2022
172022
The system can't perform the operation now. Try again later.
Articles 1–20