Secure outsourcing of modular exponentiations under single untrusted programme model Y Ding, Z Xu, J Ye, KKR Choo Journal of Computer and System Sciences 90, 1-13, 2017 | 37 | 2017 |
Controllable keyword search scheme supporting multiple users J Ye, Y Ding Future Generation Computer Systems 81, 433-442, 2018 | 23 | 2018 |
Fine-grained searchable encryption in multi-user setting J Ye, J Wang, J Zhao, J Shen, KC Li Soft Computing 21 (20), 6201-6212, 2017 | 22 | 2017 |
Efficient and secure encrypted image search in mobile cloud computing Q Zou, J Wang, J Ye, J Shen, X Chen Soft Computing 21 (11), 2959-2969, 2017 | 21 | 2017 |
An improved algorithm for secure outsourcing of modular exponentiations J Ye, X Chen, J Ma 2015 IEEE 29th International Conference on Advanced Information Networking …, 2015 | 18 | 2015 |
Verifiable delegation of polynomials. J Ye, H Zhang, C Fu IJ Network Security 18 (2), 283-290, 2016 | 14 | 2016 |
Secure and efficient fine-grained data access control scheme in cloud computing1 C Yang, J Ye Journal of High Speed Networks 21 (4), 259-271, 2015 | 13 | 2015 |
Efficient request-based comparable encryption scheme based on sliding window method P Chen, J Ye, X Chen Soft Computing 20 (11), 4589-4596, 2016 | 12 | 2016 |
Image search scheme over encrypted database J Ye, Z Xu, Y Ding Future Generation Computer Systems 87, 251-258, 2018 | 10 | 2018 |
Attribute-based fine-grained access control with user revocation J Ye, W Zhang, S Wu, Y Gao, J Qiu Information and Communication Technology-EurAsia Conference, 586-595, 2014 | 10 | 2014 |
Secure outsourcing of modular exponentiation with single untrusted server J Ye, J Wang 2015 18th International Conference on Network-Based Information Systems, 643-645, 2015 | 6 | 2015 |
A new efficient request-based comparable encryption scheme P Chen, J Ye, X Chen 2015 IEEE 29th International Conference on Advanced Information Networking …, 2015 | 6 | 2015 |
Identity-based re-encryption scheme with lightweight re-encryption key generation L Liu, J Ye Journal of Discrete Mathematical Sciences and Cryptography 21 (1), 41-57, 2018 | 4 | 2018 |
Group signature scheme based on verifiable random number J Ye, L Li Journal of Discrete Mathematical Sciences and Cryptography 20 (2), 525-533, 2017 | 4 | 2017 |
A Homomorphic Universal Re-encryptor for Identity-based Encryption. L Liu, J Ye IJ Network Security 19 (1), 11-19, 2017 | 4 | 2017 |
Secure Outsourcing Algorithm of Polynomials in Cloud Computing. X Zhou, Y Ding, Z Wang, X Li, J Ye, Z Xu SEKE, 46-51, 2016 | 4 | 2016 |
Comparable encryption scheme supporting multiple users in cloud computing J Ye, M Miao, P Chen, X Chen International Journal of High Performance Computing and Networking 11 (1), 24-33, 2018 | 3 | 2018 |
An efficient traceable data sharing scheme in cloud computing for mobile devices Z Wang, J Ye, J Wang International Journal of High Performance Computing and Networking 12 (2 …, 2018 | 2 | 2018 |
Verifiable outsourcing of high-degree polynomials and its application in keyword search J Ye, X Zhou, Z Xu, Y Ding Intelligent Automation & Soft Computing, 1-6, 2017 | 2 | 2017 |
Request-based comparable encryption scheme with multiple users J Ye, M Miao, P Chen, X Chen 2015 10th International Conference on Broadband and Wireless Computing …, 2015 | 2 | 2015 |