Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage Y Yu, MH Au, G Ateniese, X Huang, W Susilo, Y Dai, G Min IEEE Transactions on Information Forensics and Security 12 (4), 767-778, 2016 | 501 | 2016 |
Blockchain-based solutions to security and privacy issues in the internet of things Y Yu, Y Li, J Tian, J Liu IEEE Wireless Communications 25 (6), 12-18, 2018 | 321 | 2018 |
Fuzzy identity-based data integrity auditing for reliable cloud storage systems Y Li, Y Yu, G Min, W Susilo, J Ni, KKR Choo IEEE Transactions on Dependable and Secure Computing 16 (1), 72-83, 2017 | 267 | 2017 |
A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing K Liang, MH Au, JK Liu, W Susilo, DS Wong, G Yang, Y Yu, A Yang Future Generation Computer Systems 52, 95-108, 2015 | 181 | 2015 |
Machine learning based privacy-preserving fair data trading in big data market Y Zhao, Y Yu, Y Li, G Han, X Du Information Sciences 478, 449-460, 2019 | 152 | 2019 |
Providing task allocation and secure deduplication for mobile crowdsensing via fog computing J Ni, K Zhang, Y Yu, X Lin, XS Shen IEEE Transactions on Dependable and Secure Computing 17 (3), 581-594, 2018 | 145 | 2018 |
Cloud data integrity checking with an identity-based auditing mechanism from RSA Y Yu, L Xue, MH Au, W Susilo, J Ni, Y Zhang, AV Vasilakos, J Shen Future Generation Computer Systems 62, 85-91, 2016 | 145 | 2016 |
Efficient attribute-based encryption with attribute revocation for assured data deletion L Xue, Y Yu, Y Li, MH Au, X Du, B Yang Information Sciences 479, 640-650, 2019 | 144 | 2019 |
Identity based signcryption scheme without random oracles Y Yu, B Yang, Y Sun, S Zhu Computer Standards & Interfaces 31 (1), 56-62, 2009 | 141 | 2009 |
Traceable monero: Anonymous cryptocurrency with enhanced accountability Y Li, G Yang, W Susilo, Y Yu, MH Au, D Liu IEEE Transactions on Dependable and Secure Computing 18 (2), 679-691, 2019 | 117 | 2019 |
Privacy-preserving smart parking navigation supporting efficient driving guidance retrieval J Ni, K Zhang, Y Yu, X Lin, X Shen IEEE Transactions on Vehicular Technology 67 (7), 6504-6517, 2018 | 114 | 2018 |
Secure pub-sub: Blockchain-based fair payment with reputation for reliable cyber physical systems Y Zhao, Y Li, Q Mu, B Yang, Y Yu IEEE Access 6, 12295-12303, 2018 | 110 | 2018 |
Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage Y Yu, MH Au, Y Mu, S Tang, J Ren, W Susilo, L Dong International Journal of Information Security 14, 307-318, 2015 | 99 | 2015 |
Attribute-based cloud data integrity auditing for secure outsourced storage Y Yu, Y Li, B Yang, W Susilo, G Yang, J Bai IEEE Transactions on Emerging Topics in Computing 8 (2), 377-390, 2017 | 95 | 2017 |
Assured data deletion with fine-grained access control for fog-based industrial applications Y Yu, L Xue, Y Li, X Du, M Guizani, B Yang IEEE Transactions on Industrial Informatics 14 (10), 4538-4547, 2018 | 92 | 2018 |
A blockchain-based self-tallying voting protocol in decentralized IoT Y Li, W Susilo, G Yang, Y Yu, D Liu, X Du, M Guizani IEEE Transactions on Dependable and Secure Computing 19 (1), 119-130, 2020 | 90 | 2020 |
Efficient identity-based signcryption scheme for multiple receivers Y Yu, B Yang, X Huang, M Zhang International Conference on Autonomic and Trusted Computing, 13-21, 2007 | 88 | 2007 |
On the security of an efficient dynamic auditing protocol in cloud storage J Ni, Y Yu, Y Mu, Q Xia IEEE Transactions on Parallel and Distributed Systems 25 (10), 2760-2761, 2013 | 83 | 2013 |
Blockchain-based anonymous authentication with selective revocation for smart industrial applications Y Yu, Y Zhao, Y Li, X Du, L Wang, M Guizani IEEE Transactions on Industrial Informatics 16 (5), 3290-3300, 2019 | 79 | 2019 |
Privacy preserving cloud data auditing with efficient key update Y Li, Y Yu, B Yang, G Min, H Wu Future Generation Computer Systems 78, 789-798, 2018 | 78 | 2018 |