Distributed aggregate privacy-preserving authentication in VANETs L Zhang, Q Wu, J Domingo-Ferrer, B Qin, C Hu IEEE Transactions on Intelligent Transportation Systems 18 (3), 516-526, 2016 | 290 | 2016 |
Asymmetric group key agreement Q Wu, Y Mu, W Susilo, B Qin, J Domingo-Ferrer Advances in Cryptology-EUROCRYPT 2009: 28th Annual International Conference …, 2009 | 249 | 2009 |
Identity‐based remote data possession checking in public clouds H Wang, Q Wu, B Qin, J Domingo‐Ferrer IET Information Security 8 (2), 114-121, 2014 | 173 | 2014 |
Efficient many-to-one authentication with certificateless aggregate signatures L Zhang, B Qin, Q Wu, F Zhang Computer Networks 54 (14), 2482-2491, 2010 | 167 | 2010 |
Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts H Deng, Q Wu, B Qin, J Domingo-Ferrer, L Zhang, J Liu, W Shi Information Sciences 275, 370-384, 2014 | 160 | 2014 |
Privacy-preserving vehicular communication authentication with hierarchical aggregation and fast response L Zhang, C Hu, Q Wu, J Domingo-Ferrer, B Qin IEEE Transactions on Computers 65 (8), 2562-2574, 2015 | 136 | 2015 |
Cecoin: A decentralized PKI mitigating MitM attacks B Qin, J Huang, Q Wang, X Luo, B Liang, W Shi Future Generation Computer Systems 107, 805-815, 2020 | 130 | 2020 |
Identity-based data outsourcing with comprehensive auditing in clouds Y Wang, Q Wu, B Qin, W Shi, RH Deng, J Hu IEEE transactions on information forensics and security 12 (4), 940-952, 2016 | 128 | 2016 |
Securely outsourcing exponentiations with single untrusted program for cloud storage Y Wang, Q Wu, DS Wong, B Qin, SSM Chow, Z Liu, X Tan Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014 | 125 | 2014 |
Privacy-preserving cloud-based road condition monitoring with source authentication in VANETs Y Wang, Y Ding, Q Wu, Y Wei, B Qin, H Wang IEEE Transactions on Information Forensics and Security 14 (7), 1779-1790, 2018 | 120 | 2018 |
Preserving transaction privacy in bitcoin Q Wang, B Qin, J Hu, F Xiao Future Generation Computer Systems 107, 793-804, 2020 | 98 | 2020 |
TPP: Traceable privacy-preserving communication and precise reward for vehicle-to-grid networks in smart grids H Wang, B Qin, Q Wu, L Xu, J Domingo-Ferrer IEEE Transactions on Information Forensics and Security 10 (11), 2340-2351, 2015 | 88 | 2015 |
Provably secure one-round identity-based authenticated asymmetric group key agreement protocol L Zhang, Q Wu, B Qin, J Domingo-Ferrer Information sciences 181 (19), 4318-4329, 2011 | 74 | 2011 |
Round-efficient and sender-unrestricted dynamic group key agreement protocol for secure group communications L Zhang, Q Wu, J Domingo-Ferrer, B Qin, Z Dong IEEE Transactions on Information Forensics and Security 10 (11), 2352-2364, 2015 | 71 | 2015 |
Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme H Wang, Y Zhang, H Xiong, B Qin IET Information Security 6 (1), 20-27, 2012 | 67 | 2012 |
Practical secure and privacy-preserving scheme for value-added applications in VANETs L Zhang, Q Wu, B Qin, J Domingo-Ferrer, B Liu Computer Communications 71, 50-60, 2015 | 61 | 2015 |
Identity-based authenticated asymmetric group key agreement protocol L Zhang, Q Wu, B Qin, J Domingo-Ferrer Computing and Combinatorics: 16th Annual International Conference, COCOON …, 2010 | 61 | 2010 |
A secure versatile light payment system based on blockchain L Zhong, Q Wu, J Xie, J Li, B Qin Future Generation Computer Systems 93, 327-337, 2019 | 60 | 2019 |
Improving image copy-move forgery detection with particle swarm optimization techniques S Wenchang, Z Fei, Q Bo, L Bin China Communications 13 (1), 139-149, 2016 | 57 | 2016 |
Online/offline provable data possession Y Wang, Q Wu, B Qin, S Tang, W Susilo IEEE Transactions on Information Forensics and Security 12 (5), 1182-1194, 2017 | 55 | 2017 |