Block design-based key agreement for group data sharing in cloud computing J Shen, T Zhou, D He, Y Zhang, X Sun, Y Xiang IEEE transactions on dependable and secure computing 16 (6), 996-1010, 2017 | 312 | 2017 |
Anonymous and traceable group data sharing in cloud computing J Shen, T Zhou, X Chen, J Li, W Susilo IEEE Transactions on Information Forensics and Security 13 (4), 912-925, 2017 | 280 | 2017 |
Privacy-preserving and lightweight key agreement protocol for V2G in the social Internet of Things J Shen, T Zhou, F Wei, X Sun, Y Xiang IEEE Internet of things Journal 5 (4), 2526-2536, 2017 | 127 | 2017 |
Quantum cryptography for the future internet and the security analysis T Zhou, J Shen, X Li, C Wang, J Shen Security and Communication Networks 2018 (1), 8214619, 2018 | 90 | 2018 |
Collaborative filtering-based recommendation system for big data J Shen, T Zhou, L Chen International Journal of Computational Science and Engineering 21 (2), 219-225, 2020 | 59 | 2020 |
Movie recommendation system employing the user-based cf in cloud computing T Zhou, L Chen, J Shen 2017 IEEE International Conference on Computational Science and Engineering …, 2017 | 43 | 2017 |
Logarithmic encryption scheme for cyber–physical systems employing Fibonacci Q-matrix T Zhou, J Shen, X Li, C Wang, H Tan Future Generation Computer Systems 108, 1307-1313, 2020 | 41 | 2020 |
An efficient and certificateless conditional privacy-preserving authentication scheme for wireless body area networks big data services S Ji, Z Gui, T Zhou, H Yan, J Shen IEEE Access 6, 69603-69611, 2018 | 41 | 2018 |
Human-in-the-loop-aided privacy-preserving scheme for smart healthcare T Zhou, J Shen, D He, P Vijayakumar, N Kumar IEEE transactions on emerging topics in computational intelligence 6 (1), 6-15, 2020 | 37 | 2020 |
A novel latin-square-based secret sharing for M2M communications J Shen, T Zhou, X Liu, YC Chang IEEE Transactions on Industrial Informatics 14 (8), 3659-3668, 2018 | 30 | 2018 |
Lightweight authentication and matrix-based key agreement scheme for healthcare in fog computing J Shen, H Yang, A Wang, T Zhou, C Wang Peer-to-Peer Networking and Applications 12, 924-933, 2019 | 27 | 2019 |
Searchable and secure edge pre-cache scheme for intelligent 6G wireless systems C Wang, T Zhou, J Shen, W Wang, X Zhou Future Generation Computer Systems 140, 129-137, 2023 | 24 | 2023 |
Efficient data integrity auditing with corrupted data recovery for edge computing in enterprise multimedia security D Liu, J Shen, P Vijayakumar, A Wang, T Zhou Multimedia Tools and Applications 79, 10851-10870, 2020 | 24 | 2020 |
Secure and efficient data sharing in dynamic vehicular networks J Shen, T Zhou, J Lai, P Li, S Moh IEEE Internet of Things Journal 7 (9), 8208-8217, 2020 | 18 | 2020 |
Hierarchical trust level evaluation for pervasive social networking J Shen, T Zhou, CF Lai, J Li, X Li IEEE Access 5, 1178-1187, 2017 | 18 | 2017 |
Secure emergent data protection scheme for a space-terrestrial integrated network J Shen, C Wang, S Ji, T Zhou, H Yang IEEE Network 33 (1), 44-50, 2019 | 17 | 2019 |
Threshold Key Management Scheme for Blockchain-Based Intelligent Transportation Systems T Zhou, J Shen, Y Ren, S Ji Security and Communication Networks 2021, 2021 | 15 | 2021 |
A flexible and privacy-preserving collaborative filtering scheme in cloud computing for vanets H Yang, J Shen, T Zhou, S Ji, P Vijayakumar ACM Transactions on Internet Technology (TOIT) 22 (2), 1-19, 2021 | 13 | 2021 |
A privacy‐preserving data transmission scheme based on oblivious transfer and blockchain technology in the smart healthcare H Yang, J Shen, J Lu, T Zhou, X Xia, S Ji Security and Communication Networks 2021 (1), 5781354, 2021 | 13 | 2021 |
Mutual authentication scheme for smart devices in IoT-enabled smart home systems Q Ma, H Tan, T Zhou Computer Standards & Interfaces 86, 103743, 2023 | 10 | 2023 |