A scalable robust authentication protocol for secure vehicular communications L Zhang, Q Wu, A Solanas, J Domingo-Ferrer IEEE Transactions on vehicular Technology 59 (4), 1606-1617, 2009 | 388 | 2009 |
Public-key encryption with fuzzy keyword search: A provably secure scheme under keyword guessing attack P Xu, H Jin, Q Wu, W Wang IEEE Transactions on computers 62 (11), 2266-2277, 2012 | 331 | 2012 |
Distributed aggregate privacy-preserving authentication in VANETs L Zhang, Q Wu, J Domingo-Ferrer, B Qin, C Hu IEEE Transactions on Intelligent Transportation Systems 18 (3), 516-526, 2016 | 294 | 2016 |
Balanced trustworthiness, safety, and privacy in vehicle-to-vehicle communications Q Wu, J Domingo-Ferrer, U Gonzalez-Nicolas IEEE Transactions on Vehicular Technology 59 (2), 559-573, 2009 | 294 | 2009 |
Asymmetric group key agreement Q Wu, Y Mu, W Susilo, B Qin, J Domingo-Ferrer Advances in Cryptology-EUROCRYPT 2009: 28th Annual International Conference …, 2009 | 253 | 2009 |
Identity‐based remote data possession checking in public clouds H Wang, Q Wu, B Qin, J Domingo‐Ferrer IET Information Security 8 (2), 114-121, 2014 | 177 | 2014 |
Efficient many-to-one authentication with certificateless aggregate signatures L Zhang, B Qin, Q Wu, F Zhang Computer Networks 54 (14), 2482-2491, 2010 | 168 | 2010 |
Conditional identity-based broadcast proxy re-encryption and its application to cloud email P Xu, T Jiao, Q Wu, W Wang, H Jin IEEE Transactions on Computers 65 (1), 66-79, 2015 | 164 | 2015 |
Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts H Deng, Q Wu, B Qin, J Domingo-Ferrer, L Zhang, J Liu, W Shi Information Sciences 275, 370-384, 2014 | 162 | 2014 |
Certificate-based signature: security model and efficient construction J Li, X Huang, Y Mu, W Susilo, Q Wu Public Key Infrastructure: 4th European PKI Workshop: Theory and Practice …, 2007 | 158 | 2007 |
Bitcoin-based fair payments for outsourcing computations of fog devices H Huang, X Chen, Q Wu, X Huang, J Shen Future Generation Computer Systems 78, 850-858, 2018 | 137 | 2018 |
Privacy-preserving vehicular communication authentication with hierarchical aggregation and fast response L Zhang, C Hu, Q Wu, J Domingo-Ferrer, B Qin IEEE Transactions on Computers 65 (8), 2562-2574, 2015 | 137 | 2015 |
Identity-based data outsourcing with comprehensive auditing in clouds Y Wang, Q Wu, B Qin, W Shi, RH Deng, J Hu IEEE transactions on information forensics and security 12 (4), 940-952, 2016 | 128 | 2016 |
Privacy-preserving cloud-based road condition monitoring with source authentication in VANETs Y Wang, Y Ding, Q Wu, Y Wei, B Qin, H Wang IEEE Transactions on Information Forensics and Security 14 (7), 1779-1790, 2018 | 125 | 2018 |
Securely outsourcing exponentiations with single untrusted program for cloud storage Y Wang, Q Wu, DS Wong, B Qin, SSM Chow, Z Liu, X Tan Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014 | 125 | 2014 |
Secure and efficient cloud data deduplication with randomized tag T Jiang, X Chen, Q Wu, J Ma, W Susilo, W Lou IEEE transactions on information forensics and security 12 (3), 532-543, 2016 | 123 | 2016 |
Simulatable certificateless two-party authenticated key agreement protocol L Zhang, F Zhang, Q Wu, J Domingo-Ferrer Information Sciences 180 (6), 1020-1030, 2010 | 108 | 2010 |
DeyPoS: Deduplicatable dynamic proof of storage for multi-user environments K He, J Chen, R Du, Q Wu, G Xue, X Zhang IEEE Transactions on Computers 65 (12), 3631-3645, 2016 | 102 | 2016 |
User-private information retrieval based on a peer-to-peer community J Domingo-Ferrer, M Bras-Amorós, Q Wu, J Manjón Data & Knowledge Engineering 68 (11), 1237-1252, 2009 | 100 | 2009 |
Identity-based encryption transformation for flexible sharing of encrypted data in public cloud H Deng, Z Qin, Q Wu, Z Guan, RH Deng, Y Wang, Y Zhou IEEE Transactions on Information Forensics and Security 15, 3168-3180, 2020 | 91 | 2020 |