| Publication | Date of Publication | Type |
|---|
Thermodynamic phase transition of AdS black holes in massive gravity on free energy landscape International Journal of Theoretical Physics | 2024-08-19 | Paper |
| Public key based searchable encryption with fine-grained sender permission control | 2023-04-13 | Paper |
| Efficient and secure outsourcing of differentially private data publication | 2022-08-25 | Paper |
Lattice-based unidirectional infinite-use proxy re-signatures with private re-signature key Journal of Computer and System Sciences | 2021-06-30 | Paper |
Multilevel similarity model for high-resolution remote sensing image registration Information Sciences | 2021-03-16 | Paper |
Privacy-preserving naive Bayes classifiers secure against the substitution-then-comparison attack Information Sciences | 2020-09-08 | Paper |
Differentially private naive Bayes learning over multiple data sources Information Sciences | 2020-09-08 | Paper |
Insight of the protection for data security under selective opening attacks Information Sciences | 2020-07-02 | Paper |
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing Information Sciences | 2020-02-06 | Paper |
Simulation-based selective opening security for receivers under chosen-ciphertext attacks Designs, Codes and Cryptography | 2019-05-24 | Paper |
| Hedged nonce-based public-key encryption: adaptive security under randomness failures | 2018-05-16 | Paper |
Design and theoretical analysis of virtual machine placement algorithm based on peak workload characteristics Soft Computing | 2018-02-27 | Paper |
Model approach to grammatical evolution: deep-structured analyzing of model and representation Soft Computing | 2018-02-27 | Paper |
Privacy-preserving outsourcing of image feature extraction in cloud computing Soft Computing | 2018-02-27 | Paper |
CDPS: a cryptographic data publishing system Journal of Computer and System Sciences | 2017-09-07 | Paper |
Verifiable Computation over Large Database with Incremental Updates IEEE Transactions on Computers | 2017-05-16 | Paper |
Secure Auditing and Deduplicating Data in Cloud IEEE Transactions on Computers | 2017-05-16 | Paper |
Secure Distributed Deduplication Systems with Improved Reliability IEEE Transactions on Computers | 2017-05-16 | Paper |
Identity-Based Encryption with Outsourced Revocation in Cloud Computing IEEE Transactions on Computers | 2017-05-16 | Paper |
Verifiable searchable encryption with aggregate keys for data sharing in outsourcing storage Information Security and Privacy | 2016-09-02 | Paper |
Accountable large-universe attribute-based encryption supporting any monotone access structures Information Security and Privacy | 2016-08-31 | Paper |
N-Mobishare: new privacy-preserving location-sharing system for mobile online social networks International Journal of Computer Mathematics | 2016-05-06 | Paper |
Identity-based chameleon hashing and signatures without key exposure Information Sciences | 2016-01-14 | Paper |
A short non-delegatable strong designated verifier signature Frontiers of Computer Science | 2015-11-20 | Paper |
| Survey on the searchable encryption | 2015-10-28 | Paper |
Computationally efficient ciphertext-policy attribute-based encryption with constant-size ciphertexts Provable Security | 2015-09-29 | Paper |
Secure deduplication storage systems supporting keyword search Journal of Computer and System Sciences | 2015-08-31 | Paper |
Verifiable computation over large database with incremental updates Computer Security - ESORICS 2014 | 2015-07-24 | Paper |
Efficient algorithms for secure outsourcing of bilinear pairings Theoretical Computer Science | 2014-12-02 | Paper |
TMDS: thin-model data sharing scheme supporting keyword search in cloud storage Information Security and Privacy | 2014-07-24 | Paper |
New algorithms for secure outsourcing of modular exponentiations Computer Security – ESORICS 2012 | 2013-10-23 | Paper |
Generic security-amplifying methods of ordinary digital signatures Information Sciences | 2012-10-17 | Paper |
A short non-delegatable strong designated verifier signature Information Security and Privacy | 2012-09-07 | Paper |
Identity-based trapdoor mercurial commitments and applications Theoretical Computer Science | 2011-10-10 | Paper |
Hidden attribute-based signatures without anonymity revocation Information Sciences | 2010-06-11 | Paper |
Defending against key abuse attacks in KP-ABE enabled broadcast systems Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering | 2010-04-24 | Paper |
Privacy-Aware Attribute-Based Encryption with User Accountability Lecture Notes in Computer Science | 2009-09-29 | Paper |
Generic Security-Amplifying Methods of Ordinary Digital Signatures Applied Cryptography and Network Security | 2008-06-13 | Paper |
Practical Threshold Signatures Without Random Oracles Provable Security | 2008-06-10 | Paper |
Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature Provable Security | 2008-06-10 | Paper |