Dual-server public-key encryption with keyword search for secure cloud storage R Chen, Y Mu, G Yang, F Guo, X Wang IEEE transactions on information forensics and security 11 (4), 789-798, 2015 | 273 | 2015 |
BL-MLE: Block-level message-locked encryption for secure large file deduplication R Chen, Y Mu, G Yang, F Guo IEEE Transactions on Information Forensics and Security 10 (12), 2643-2652, 2015 | 146 | 2015 |
Server-aided public key encryption with keyword search R Chen, Y Mu, G Yang, F Guo, X Huang, X Wang, Y Wang IEEE Transactions on Information Forensics and Security 11 (12), 2833-2842, 2016 | 144 | 2016 |
A new general framework for secure public key encryption with keyword search R Chen, Y Mu, G Yang, F Guo, X Wang Information Security and Privacy: 20th Australasian Conference, ACISP 2015 …, 2015 | 102 | 2015 |
Towards practical privacy-preserving decision tree training and evaluation in the cloud L Liu, R Chen, X Liu, J Su, L Qiao IEEE Transactions on Information Forensics and Security 15, 2914-2929, 2020 | 62 | 2020 |
Toward highly secure yet efficient KNN classification scheme on outsourced cloud data L Liu, J Su, X Liu, R Chen, K Huang, RH Deng, X Wang IEEE Internet of Things Journal 6 (6), 9841-9852, 2019 | 58 | 2019 |
Cryptographic reverse firewall via malleable smooth projective hash functions R Chen, Y Mu, G Yang, W Susilo, F Guo, M Zhang International Conference on the Theory and Application of Cryptology and …, 2016 | 58 | 2016 |
Strongly leakage-resilient authenticated key exchange R Chen, Y Mu, G Yang, W Susilo, F Guo Cryptographers’ Track at the RSA Conference, 19-36, 2016 | 49 | 2016 |
Anonymous identity-based broadcast encryption with revocation for file sharing J Lai, Y Mu, F Guo, W Susilo, R Chen Information Security and Privacy: 21st Australasian Conference, ACISP 2016 …, 2016 | 48 | 2016 |
Recipient revocable identity-based broadcast encryption: How to revoke some recipients in IBBE without knowledge of the plaintext W Susilo, R Chen, F Guo, G Yang, Y Mu, YW Chow Proceedings of the 11th ACM on Asia conference on computer and …, 2016 | 43 | 2016 |
An efficient privacy‐preserving aggregation and billing protocol for smart grid XF Wang, Y Mu, RM Chen Security and Communication Networks 9 (17), 4536-4547, 2016 | 39 | 2016 |
Secure channel free id-based searchable encryption for peer-to-peer group XF Wang, Y Mu, R Chen, XS Zhang Journal of Computer Science and Technology 31, 1012-1027, 2016 | 37 | 2016 |
Strong authenticated key exchange with auxiliary inputs R Chen, Y Mu, G Yang, W Susilo, F Guo Designs, Codes and Cryptography 85, 145-173, 2017 | 33 | 2017 |
Fully privacy-preserving and revocable ID-based broadcast encryption for data access control in smart city J Lai, Y Mu, F Guo, W Susilo, R Chen Personal and Ubiquitous computing 21, 855-868, 2017 | 31 | 2017 |
Subvert KEM to break DEM: Practical algorithm-substitution attacks on public-key encryption R Chen, X Huang, M Yung Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020 | 28 | 2020 |
A practical authentication framework for VANETs B Wang, Y Wang, R Chen Security and communication networks 2019 (1), 4752612, 2019 | 26 | 2019 |
Privacy-preserving mining of association rule on outsourced cloud data from multiple parties L Liu, J Su, R Chen, X Liu, X Wang, S Chen, H Leung Information Security and Privacy: 23rd Australasian Conference, ACISP 2018 …, 2018 | 24 | 2018 |
Optimal security reductions for unique signatures: bypassing impossibilities with a counterexample F Guo, R Chen, W Susilo, J Lai, G Yang, Y Mu Annual International Cryptology Conference, 517-547, 2017 | 23 | 2017 |
ME-TLS: middlebox-enhanced TLS for internet-of-things devices J Li, R Chen, J Su, X Huang, X Wang IEEE Internet of Things Journal 7 (2), 1216-1229, 2019 | 22 | 2019 |
One-round privacy-preserving meeting location determination for smartphone applications X Wang, Y Mu, R Chen IEEE Transactions on Information Forensics and Security 11 (8), 1712-1721, 2016 | 21 | 2016 |