A survey on cyber-security of connected and autonomous vehicles (CAVs) X Sun, FR Yu, P Zhang IEEE Transactions on Intelligent Transportation Systems, 2021 | 192 | 2021 |
An efficient access control scheme with outsourcing capability and attribute update for fog computing P Zhang, Z Chen, JK Liu, K Liang, H Liu Future Generation Computer Systems 78, 753-762, 2018 | 186 | 2018 |
Private machine learning classification based on fully homomorphic encryption X Sun, P Zhang, JK Liu, J Yu, W Xie IEEE Transactions on Emerging Topics in Computing 8 (2), 352-364, 2018 | 138 | 2018 |
A survey on access control in fog computing P Zhang, JK Liu, FR Yu, M Sookhak, MH Au, X Luo IEEE Communications Magazine 56 (2), 144-149, 2018 | 136 | 2018 |
A survey on zero-knowledge proof in blockchain X Sun, FR Yu, P Zhang, Z Sun, W Xie, X Peng IEEE network 35 (4), 198-205, 2021 | 131 | 2021 |
Time-based direct revocable ciphertext-policy attribute-based encryption with short revocation list JK Liu, TH Yuen, P Zhang, K Liang International Conference on Applied Cryptography and Network Security, 516-534, 2018 | 94 | 2018 |
A new blockchain-based value-added tax system DA Wijaya, JK Liu, DA Suwarsono, P Zhang International conference on provable security, 471-486, 2017 | 89 | 2017 |
Efficient attribute-based encryption from R-LWE W Zhu, J Yu, T Wang, P Zhang, W Xie Chin. J. Electron 23 (4), 778-782, 2014 | 57 | 2014 |
A cloud-based access control scheme with user revocation and attribute update P Zhang, Z Chen, K Liang, S Wang, T Wang Australasian Conference on Information Security and Privacy, 525-540, 2016 | 43 | 2016 |
Verifiable keyword search for secure big data-based mobile healthcare networks with fine-grained authorization control Z Chen, F Zhang, P Zhang, JK Liu, J Huang, H Zhao, J Shen Future Generation Computer Systems 87, 712-724, 2018 | 38 | 2018 |
Secure and efficient multi-signature schemes for fabric: An enterprise blockchain platform Y Xiao, P Zhang, Y Liu IEEE Transactions on Information Forensics and Security 16, 1782-1794, 2020 | 35 | 2020 |
Building a dynamic searchable encrypted medical database for multi-client L Xu, C Xu, JK Liu, C Zuo, P Zhang Information Sciences 527, 394-405, 2020 | 34 | 2020 |
A homomorphic aggregate signature scheme based on lattice P Zhang, J Yu, T Wang Chinese Journal of Electronics 21 (4), 701-704, 2012 | 34 | 2012 |
Dynamic data operations with deduplication in privacy-preserving public auditing for secure cloud storage Y Wu, ZL Jiang, X Wang, SM Yiu, P Zhang 2017 IEEE International Conference on Computational Science and Engineering …, 2017 | 33 | 2017 |
Research on the hash function structures and its application Y Yang, X Zhang, J Yu, P Zhang Wireless Personal Communications 94 (4), 2969-2985, 2017 | 33 | 2017 |
Utilizing fully homomorphic encryption to implement secure medical computation in smart cities X Sun, P Zhang, M Sookhak, J Yu, W Xie Personal and Ubiquitous Computing 21 (5), 831-839, 2017 | 31 | 2017 |
Public data integrity verification for secure cloud storage H Liu, P Zhang, J Liu Journal of networks 8 (2), 373, 2013 | 29 | 2013 |
Ciphertext policy attribute-based encryption supporting unbounded attribute space from R-LWE Z Chen, P Zhang, F Zhang, J Huang KSII Transactions on Internet and Information Systems (TIIS) 11 (4), 2292-2309, 2017 | 24 | 2017 |
A survey on secure computation based on homomorphic encryption in vehicular ad hoc networks X Sun, FR Yu, P Zhang, W Xie, X Peng Sensors 20 (15), 4253, 2020 | 21 | 2020 |
Privacy-preserving and outsourced multi-party k-means clustering based on multi-key fully homomorphic encryption P Zhang, T Huang, X Sun, W Zhao, H Liu, S Lai, JK Liu IEEE Transactions on Dependable and Secure Computing, 2022 | 19 | 2022 |