A social-network-based cryptocurrency wallet-management scheme S He, Q Wu, X Luo, Z Liang, D Li, H Feng, H Zheng, Y Li IEEE Access 6, 7654-7663, 2018 | 50 | 2018 |
Secure communications in unmanned aerial vehicle network S He, Q Wu, J Liu, W Hu, B Qin, YN Li Information Security Practice and Experience: 13th International Conference …, 2017 | 36 | 2017 |
A decentralized and secure blockchain platform for open fair data trading YN Li, X Feng, J Xie, H Feng, Z Guan, Q Wu Concurrency and Computation: Practice and Experience 32 (7), e5578, 2020 | 30 | 2020 |
CCA updatable encryption against malicious re-encryption attacks L Chen, Y Li, Q Tang Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020 | 20 | 2020 |
Traceable ring signatures with post-quantum security H Feng, J Liu, Q Wu, YN Li Topics in Cryptology–CT-RSA 2020: The Cryptographers’ Track at the RSA …, 2020 | 19 | 2020 |
Traceable ring signatures: general framework and post-quantum security H Feng, J Liu, D Li, YN Li, Q Wu Designs, Codes and Cryptography 89, 1111-1145, 2021 | 18 | 2021 |
Functional privacy-preserving outsourcing scheme with computation verifiability in fog computing W Tang, B Qin, Y Li, Q Wu KSII Transactions on Internet and Information Systems (TIIS) 14 (1), 281-298, 2020 | 6 | 2020 |
{End-to-Same-End} Encryption: Modularly Augmenting an App with an Efficient, Portable, and Blind Cloud Storage L Chen, YN Li, Q Tang, M Yung 31st USENIX Security Symposium (USENIX Security 22), 2353-2370, 2022 | 5 | 2022 |
Outsourcing encrypted excel files YN Li, Q Wu, W Tang, B Qin, Q Wang, M Miao Information Security Practice and Experience: 13th International Conference …, 2017 | 2 | 2017 |