Secure deduplication with efficient and reliable convergent key management J Li, X Chen, M Li, J Li, PPC Lee, W Lou IEEE transactions on parallel and distributed systems 25 (6), 1615-1625, 2013 | 807 | 2013 |
A hybrid cloud approach for secure authorized deduplication J Li, YK Li, X Chen, PPC Lee, W Lou IEEE transactions on parallel and distributed systems 26 (5), 1206-1216, 2014 | 563 | 2014 |
New algorithms for secure outsourcing of modular exponentiations X Chen, J Li, J Ma, Q Tang, W Lou IEEE Transactions on Parallel and Distributed Systems 25 (9), 2386-2396, 2013 | 539 | 2013 |
Secure attribute-based data sharing for resource-limited users in cloud computing J Li, Y Zhang, X Chen, Y Xiang Computers & Security 72, 1-12, 2018 | 513 | 2018 |
Securely outsourcing attribute-based encryption with checkability J Li, X Huang, J Li, X Chen, Y Xiang IEEE Transactions on Parallel and Distributed Systems 25 (8), 2201-2210, 2013 | 495 | 2013 |
Identity-based encryption with outsourced revocation in cloud computing J Li, J Li, X Chen, C Jia, W Lou IEEE Transactions on computers 64 (2), 425-437, 2013 | 462 | 2013 |
An efficient public auditing protocol with novel dynamic structure for cloud data J Shen, J Shen, X Chen, X Huang, W Susilo IEEE Transactions on Information Forensics and Security 12 (10), 2402-2415, 2017 | 402 | 2017 |
Certificateless remote anonymous authentication schemes for wirelessbody area networks J Liu, Z Zhang, X Chen, KS Kwak IEEE Transactions on parallel and distributed systems 25 (2), 332-342, 2013 | 345 | 2013 |
Verifiable computation over large database with incremental updates X Chen, J Li, J Weng, J Ma, W Lou IEEE transactions on Computers 65 (10), 3184-3195, 2015 | 325 | 2015 |
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing Y Zhang, X Chen, J Li, DS Wong, H Li, I You Information Sciences 379, 42-61, 2017 | 288 | 2017 |
New publicly verifiable databases with efficient updates X Chen, J Li, X Huang, J Ma, W Lou IEEE Transactions on Dependable and Secure Computing 12 (5), 546-556, 2014 | 280 | 2014 |
Anonymous and traceable group data sharing in cloud computing J Shen, T Zhou, X Chen, J Li, W Susilo IEEE Transactions on Information Forensics and Security 13 (4), 912-925, 2017 | 277 | 2017 |
Multiobjective cloud workflow scheduling: A multiple populations ant colony system approach ZG Chen, ZH Zhan, Y Lin, YJ Gong, TL Gu, F Zhao, HQ Yuan, X Chen, ... IEEE transactions on cybernetics 49 (8), 2912-2926, 2018 | 257 | 2018 |
New algorithms for secure outsourcing of large-scale systems of linear equations X Chen, X Huang, J Li, J Ma, W Lou, DS Wong IEEE transactions on information forensics and security 10 (1), 69-78, 2014 | 256 | 2014 |
Public integrity auditing for shared dynamic cloud data with group user revocation T Jiang, X Chen, J Ma IEEE Transactions on Computers 65 (8), 2363-2373, 2015 | 228 | 2015 |
Multi-authority ciphertext-policy attribute-based encryption with accountability J Li, Q Huang, X Chen, SSM Chow, DS Wong, D Xie Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011 | 224 | 2011 |
New ID-based group signature from pairings X Chen, F Zhang, K Kim Journal of Electronics (China) 23 (6), 892-900, 2006 | 207 | 2006 |
Fine-grained access control system based on outsourced attribute-based encryption J Li, X Chen, J Li, C Jia, J Ma, W Lou Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013 | 206 | 2013 |
L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing J Li, Z Liu, X Chen, F Xhafa, X Tan, DS Wong Knowledge-Based Systems 79, 18-26, 2015 | 197 | 2015 |
Secure distributed deduplication systems with improved reliability J Li, X Chen, X Huang, S Tang, Y Xiang, MM Hassan, A Alelaiwi IEEE Transactions on Computers 64 (12), 3569-3579, 2015 | 185 | 2015 |