Creditcoin: A privacy-preserving blockchain-based incentive announcement network for communications of smart vehicles L Li, J Liu, L Cheng, S Qiu, W Wang, X Zhang, Z Zhang IEEE Transactions on Intelligent Transportation Systems 19 (7), 2204-2220, 2018 | 592 | 2018 |
Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack S Qiu, J Liu, Y Shi, R Zhang Sci. China Inf. Sci 60 (5), 1-12, 2017 | 115 | 2017 |
Toward practical privacy-preserving frequent itemset mining on encrypted cloud data S Qiu, B Wang, M Li, J Liu, Y Shi IEEE Transactions on Cloud Computing 8 (1), 312-323, 2017 | 47 | 2017 |
Attribute-based proxy re-encryption with keyword search Y Shi, J Liu, Z Han, Q Zheng, R Zhang, S Qiu PloS one 9 (12), e116325, 2014 | 41 | 2014 |
Locally private Jaccard similarity estimation Z Yan, Q Wu, M Ren, J Liu, S Liu, S Qiu Concurrency and Computation: Practice and Experience 31 (24), e4889, 2019 | 15 | 2019 |
Privmin: Differentially private minhash for jaccard similarity computation Z Yan, J Liu, G Li, Z Han, S Qiu arXiv preprint arXiv:1705.07258, 2017 | 9 | 2017 |
Delegated Key‐Policy Attribute‐Based Set Intersection over Outsourced Encrypted Data Sets for CloudIoT Y Shi, S Qiu Security and Communication Networks 2021 (1), 5595243, 2021 | 7 | 2021 |
Identity-based symmetric private set intersection S Qiu, J Liu, Y Shi 2013 International Conference on Social Computing, 653-658, 2013 | 7 | 2013 |
PUF-based key distribution in wireless sensor networks Z Zhang, Y Liu, Q Zuo, L Harn, S Qiu, Y Cheng Computers, Materials & Continua 64 (2), 1261-1280, 2020 | 5 | 2020 |
PPSI: Practical private set intersection over large-scale datasets S Qiu, Z Dai, D Zha, Z Zhang, Y Liu 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced …, 2019 | 4 | 2019 |
PUF‐Based Mutual‐Authenticated Key Distribution for Dynamic Sensor Networks Y Liu, Y Cui, L Harn, Z Zhang, H Yan, Y Cheng, S Qiu Security and Communication Networks 2021 (1), 5532683, 2021 | 3 | 2021 |
Ciphertext-policy attribute-based encryption with outsourced set intersection in multimedia cloud computing Y Shi, S Qiu Electronics 10 (21), 2685, 2021 | 2 | 2021 |
SE-PSI: Fog/Cloud server-aided enhanced secure and effective private set intersection on scalable datasets with Bloom Filter S Qiu, Z Zhang, Y Liu, H Yan, Y Cheng Mathematical Biosciences and Engineering 19 (2), 1861-1876, 2021 | 2 | 2021 |
Towards Public Integrity Audition for Cloud-IoT Data Based on Blockchain. H Yan, Y Liu, S Qiu, S Hu, W Zhang, J Xia Comput. Syst. Sci. Eng. 41 (3), 1129-1142, 2022 | 1 | 2022 |
Novel efficient lattice-based IBE schemes with CPK for fog computing Y Shi, S Qiu, J Liu, T Ma Mathematical Biosciences and Engineering 17 (6), 8105-8122, 2020 | 1 | 2020 |
An efficient lattice-based ibe scheme using combined public key Y Shi, S Qiu, J Liu Big Data and Security: First International Conference, ICBDS 2019, Nanjing …, 2020 | 1 | 2020 |
Public Data Integrity Checking for Cloud Storage with Privacy Preserving H Yan, Z Zhang, S Qiu, H Qian, Z Bian, Y Liu 2019 IEEE 19th International Conference on Communication Technology (ICCT …, 2019 | 1 | 2019 |
Multi-party identity-based symmetric privacy-preserving matching with cloud storage S Qiu, J Liu, Y Shi, Z Han Wuhan University Journal of Natural Sciences 19 (5), 426-432, 2014 | 1 | 2014 |
Public Integrity Verification for Cloud Storage with Efficient Key-update H Yan, Y Liu, D Huang, S Qiu, Z Zhang Journal of Internet Technology 24 (6), 1263-1271, 2023 | | 2023 |
Comments on a dynamic cloud data integrity verification scheme: security analysis and improvement H Yan, Z Zhang, Y Liu, S Qiu, Q Wu International Journal of Security and Networks 18 (2), 125-132, 2023 | | 2023 |