Follow
Hui Ma
Hui Ma
Verified email at iie.ac.cn
Title
Cited by
Cited by
Year
Auditable -Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing
J Ning, Z Cao, X Dong, K Liang, H Ma, L Wei
IEEE Transactions on Information Forensics and Security 13 (1), 94-105, 2017
1972017
Revisiting attribute-based encryption with verifiable outsourced decryption
S Lin, R Zhang, H Ma, M Wang
IEEE Transactions on Information Forensics and Security 10 (10), 2119-2130, 2015
1542015
Verifiable and exculpable outsourced attribute-based encryption for access control in cloud computing
H Ma, R Zhang, Z Wan, Y Lu, S Lin
IEEE transactions on dependable and secure computing 14 (6), 679-692, 2017
1072017
Fine-grained access control system based on fully outsourced attribute-based encryption
R Zhang, H Ma, Y Lu
Journal of Systems and Software 125, 344-353, 2017
652017
Efficient fine-grained data sharing mechanism for electronic medical record systems with mobile devices
H Ma, R Zhang, G Yang, Z Song, K He, Y Xiao
IEEE Transactions on Dependable and Secure Computing 17 (5), 1026-1038, 2018
442018
Efficient Multi-Factor Authenticated Key Exchange Scheme for Mobile Communications
R Zhang, Y Xiao, S Sun, H Ma
IEEE Transactions on Dependable and Secure Computing 16 (4), 625-634, 2019
372019
Concessive online/offline attribute based encryption with cryptographic reverse firewalls—Secure and efficient fine-grained access control on corrupted machines
H Ma, R Zhang, G Yang, Z Song, S Sun, Y Xiao
Computer Security: 23rd European Symposium on Research in Computer Security …, 2018
332018
Efficient Parallelism of Post-Quantum Signature Scheme SPHINCS
S Sun, R Zhang, M Hui
IEEE Transactions on Parallel and Distributed Systems 31 (11), 2542-2555, 2020
272020
Access control encryption based on LWE
G Tan, R Zhang, H Ma, Y Tao
Proceedings of the 4th ACM International Workshop on ASIA Public-Key …, 2017
252017
Server-aided fine-grained access control mechanism with robust revocation in cloud computing
H Ma, R Zhang, S Sun, Z Song, G Tan
IEEE Transactions on Services Computing 15 (1), 164-173, 2019
232019
Provably secure cloud storage for mobile networks with less computation and smaller overhead
R Zhang, H Ma, Y Lu, Y Li
Science China Information Sciences 60, 1-13, 2017
222017
RKA security of identity-based homomorphic signature scheme
J Chang, H Ma, A Zhang, M Xu, R Xue
IEEE Access 7, 50858-50868, 2019
162019
Comments on “control cloud data access privilege and anonymity with fully anonymous attribute-based encryption”
H Ma, R Zhang, W Yuan
IEEE Transactions on Information Forensics and Security 11 (4), 866-867, 2015
152015
Fully Accountable Data Sharing for Pay-As-You-Go Cloud Scenes
T Wang, H Ma, Y Zhou, R Zhang, Z Song
IEEE Transactions on Dependable and Secure Computing, 2019
122019
WebCloud: Web-Based Cloud Storage for Secure Data Sharing across Platforms
S Sun, H Ma, R Zhang, Z Song
IEEE Transactions on Dependable and Secure Computing, 2020
102020
Server-aided immediate and robust user revocation mechanism for SM9
S Sun, H Ma, R Zhang, W Xu
Cybersecurity 3 (1), 12, 2020
92020
Wolverine: a scalable and transaction-consistent redactable permissionless blockchain
J Li, H Ma, J Wang, Z Song, W Xu, R Zhang
IEEE Transactions on Information Forensics and Security 18, 1653-1666, 2023
72023
Enhanced dual-policy attribute-based encryption for secure data sharing in the cloud
T Wang, Y Zhou, H Ma, R Zhang
Security and Communication Networks 2022, 2022
52022
Everything Under Control: Secure Data Sharing Mechanism for Cloud-Edge Computing
Z Song, H Ma, R Zhang, W Xu, J Li
IEEE Transactions on Information Forensics and Security, 2023
42023
Tightly Secure Two-Pass Authenticated Key Exchange Protocol in the CK Model
Y Xiao, R Zhang, H Ma
The Cryptographers' Track at the RSA Conference 2020, 2020
32020
The system can't perform the operation now. Try again later.
Articles 1–20