A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security K Liang, L Fang, W Susilo, DS Wong 2013 5th international conference on intelligent networking and …, 2013 | 329 | 2013 |
Public key encryption with keyword search secure against keyword guessing attacks without random oracle L Fang, W Susilo, C Ge, J Wang Information sciences 238, 221-241, 2013 | 264 | 2013 |
Revocable identity-based broadcast proxy re-encryption for data sharing in clouds C Ge, Z Liu, J Xia, L Fang IEEE transactions on dependable and secure computing 18 (3), 1214-1226, 2019 | 196 | 2019 |
Secure keyword search and data sharing mechanism for cloud computing C Ge, W Susilo, Z Liu, J Xia, P Szalachowski, L Fang IEEE Transactions on Dependable and Secure Computing 18 (6), 2787-2800, 2020 | 165 | 2020 |
Revocable attribute-based encryption with data integrity in clouds C Ge, W Susilo, J Baek, Z Liu, J Xia, L Fang IEEE Transactions on Dependable and Secure Computing 19 (5), 2864-2872, 2021 | 154 | 2021 |
Provably secure dynamic ID-based anonymous two-factor authenticated key exchange protocol with extended security model Q Xie, DS Wong, G Wang, X Tan, K Chen, L Fang IEEE Transactions on Information Forensics and Security 12 (6), 1382-1392, 2017 | 153 | 2017 |
A verifiable and fair attribute-based proxy re-encryption scheme for data sharing in clouds C Ge, W Susilo, J Baek, Z Liu, J Xia, L Fang IEEE Transactions on Dependable and Secure Computing 19 (5), 2907-2919, 2021 | 129 | 2021 |
A secure channel free public key encryption with keyword search scheme without random oracle L Fang, W Susilo, C Ge, J Wang Cryptology and Network Security: 8th International Conference, CANS 2009 …, 2009 | 115 | 2009 |
Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search L Fang, W Susilo, C Ge, J Wang Theoretical Computer Science 462, 39-58, 2012 | 76 | 2012 |
A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system C Ge, W Susilo, L Fang, J Wang, Y Shi Designs, Codes and Cryptography 86, 2587-2603, 2018 | 75 | 2018 |
Cluster-guided contrastive graph clustering network X Yang, Y Liu, S Zhou, S Wang, W Tu, Q Zheng, X Liu, L Fang, E Zhu Proceedings of the AAAI conference on artificial intelligence 37 (9), 10834 …, 2023 | 73 | 2023 |
Anonymous conditional proxy re-encryption without random oracle L Fang, W Susilo, J Wang Provable Security: Third International Conference, ProvSec 2009, Guangzhou …, 2009 | 72 | 2009 |
A large-scale empirical study on the vulnerability of deployed IoT devices B Zhao, S Ji, WH Lee, C Lin, H Weng, J Wu, P Zhou, L Fang, R Beyah IEEE Transactions on Dependable and Secure Computing 19 (3), 1826-1840, 2020 | 59 | 2020 |
A proxy broadcast re-encryption for cloud data sharing M Sun, C Ge, L Fang, J Wang Multimedia Tools and Applications 77, 10455-10469, 2018 | 56 | 2018 |
A blockchain based decentralized data security mechanism for the Internet of Things C Ge, Z Liu, L Fang Journal of Parallel and Distributed Computing 141, 1-9, 2020 | 55 | 2020 |
THP: A novel authentication scheme to prevent multiple attacks in SDN-based IoT network L Fang, Y Li, X Yun, Z Wen, S Ji, W Meng, Z Cao, M Tanveer IEEE Internet of Things Journal 7 (7), 5745-5759, 2019 | 49 | 2019 |
Privacy protection for medical data sharing in smart healthcare L Fang, C Yin, J Zhu, C Ge, M Tanveer, A Jolfaei, Z Cao ACM Transactions on Multimedia Computing, Communications, and Applications …, 2020 | 47 | 2020 |
A practical model based on anomaly detection for protecting medical IoT control services against external attacks L Fang, Y Li, Z Liu, C Yin, M Li, ZJ Cao IEEE Transactions on Industrial Informatics 17 (6), 4260-4269, 2020 | 46 | 2020 |
Secure transmission of compressed sampling data using edge clouds Y Zhang, P Wang, L Fang, X He, H Han, B Chen IEEE Transactions on Industrial Informatics 16 (10), 6641-6651, 2020 | 45 | 2020 |
Identity-based conditional proxy re-encryption with fine grain policy C Ge, W Susilo, J Wang, L Fang Computer Standards & Interfaces 52, 1-9, 2017 | 45 | 2017 |