Security and privacy for cloud-based IoT: Challenges J Zhou, Z Cao, X Dong, AV Vasilakos IEEE Communications Magazine 55 (1), 26-33, 2017 | 750 | 2017 |
Security and privacy for storage and computation in cloud computing L Wei, H Zhu, Z Cao, X Dong, W Jia, Y Chen, AV Vasilakos Information sciences 258, 371-386, 2014 | 733 | 2014 |
CCA-secure proxy re-encryption without pairings J Shao, Z Cao International Workshop on Public Key Cryptography, 357-376, 2009 | 440 | 2009 |
Attribute based proxy re-encryption with delegating capabilities X Liang, Z Cao, H Lin, J Shao Proceedings of the 4th international symposium on information, computer, and …, 2009 | 363 | 2009 |
信息安全综述 沈昌祥, 张焕国, 冯登国, 曹珍富, 黄继武 中国科学: E 辑 37 (002), 129-150, 2007 | 337 | 2007 |
丢番图方程引论 曹珍富 哈尔滨工业大学出版社, 1989 | 267 | 1989 |
White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures Z Liu, Z Cao, DS Wong IEEE Transactions on Information Forensics and Security 8 (1), 76-88, 2012 | 259 | 2012 |
White-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes J Ning, X Dong, Z Cao, L Wei, X Lin IEEE Transactions on Information Forensics and Security 10 (6), 1274-1288, 2015 | 230 | 2015 |
Proxy re-encryption with keyword search J Shao, Z Cao, X Liang, H Lin Information Sciences 180 (13), 2576-2587, 2010 | 227 | 2010 |
Simple three-party key exchange protocol R Lu, Z Cao Computers & Security 26 (1), 94-97, 2007 | 221 | 2007 |
A probabilistic misbehavior detection scheme toward efficient trust establishment in delay-tolerant networks H Zhu, S Du, Z Gao, M Dong, Z Cao IEEE Transactions on Parallel and Distributed Systems 25 (1), 22-32, 2013 | 217 | 2013 |
Secure threshold multi authority attribute based encryption without a central authority H Lin, Z Cao, X Liang, J Shao Progress in Cryptology-INDOCRYPT 2008: 9th International Conference on …, 2008 | 206 | 2008 |
4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks J Zhou, Z Cao, X Dong, N Xiong, AV Vasilakos Information Sciences 314, 255-276, 2015 | 201 | 2015 |
Auditable -Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing J Ning, Z Cao, X Dong, K Liang, H Ma, L Wei IEEE Transactions on Information Forensics and Security 13 (1), 94-105, 2017 | 198 | 2017 |
Provably secure and efficient bounded ciphertext policy attribute based encryption X Liang, Z Cao, H Lin, D Xing Proceedings of the 4th international symposium on information, computer, and …, 2009 | 191 | 2009 |
PDAFT: A privacy-preserving data aggregation scheme with fault tolerance for smart grid communications L Chen, R Lu, Z Cao Peer-to-Peer networking and applications 8, 1122-1132, 2015 | 173 | 2015 |
Secure threshold multi authority attribute based encryption without a central authority H Lin, Z Cao, X Liang, J Shao Information Sciences 180 (13), 2618-2632, 2010 | 172 | 2010 |
Blackbox traceable CP-ABE: how to catch people leaking their keys by selling decryption devices on ebay Z Liu, Z Cao, DS Wong Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 171 | 2013 |
Survey of information security C Shen, HG Zhang, D Feng, ZF Cao, JW Huang Science in China Series F: Information Sciences 50 (3), 273-298, 2007 | 171 | 2007 |
Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles Z Liu, Z Cao, Q Huang, DS Wong, TH Yuen Computer Security–ESORICS 2011: 16th European Symposium on Research in …, 2011 | 155 | 2011 |