Achieving secure, scalable, and fine-grained data access control in cloud computing S Yu, C Wang, K Ren, W Lou 2010 Proceedings IEEE INFOCOM, 1-9, 2010 | 2775 | 2010 |
Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption M Li, S Yu, Y Zheng, K Ren, W Lou IEEE transactions on parallel and distributed systems 24 (1), 131-143, 2012 | 1574 | 2012 |
Attribute based data sharing with attribute revocation S Yu, C Wang, K Ren, W Lou Proceedings of the 5th ACM symposium on information, computer and …, 2010 | 1086 | 2010 |
Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings M Li, S Yu, K Ren, W Lou Security and Privacy in Communication Networks: 6th Iternational ICST …, 2010 | 694 | 2010 |
Authorized private keyword search over encrypted data in cloud computing M Li, S Yu, N Cao, W Lou 2011 31st international conference on distributed computing systems, 383-392, 2011 | 579 | 2011 |
Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud B Wang, S Yu, W Lou, YT Hou IEEE INFOCOM 2014-IEEE conference on computer communications, 2112-2120, 2014 | 531 | 2014 |
Achieving usable and privacy-assured similarity search over outsourced cloud data C Wang, K Ren, S Yu, KMR Urs 2012 Proceedings IEEE INFOCOM, 451-459, 2012 | 443 | 2012 |
Protecting your right: Verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud W Sun, S Yu, W Lou, YT Hou, H Li IEEE Transactions on Parallel and Distributed Systems 27 (4), 1187-1198, 2014 | 333 | 2014 |
Findu: Privacy-preserving personal profile matching in mobile social networks M Li, N Cao, S Yu, W Lou 2011 Proceedings IEEE INFOCOM, 2435-2443, 2011 | 327 | 2011 |
Privacy preserving back-propagation neural network learning made practical with cloud computing J Yuan, S Yu IEEE Transactions on Parallel and Distributed Systems 25 (1), 212-221, 2013 | 292 | 2013 |
Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud W Sun, S Yu, W Lou, YT Hou, H Li IEEE INFOCOM 2014-IEEE conference on computer communications, 226-234, 2014 | 284 | 2014 |
LT codes-based secure and reliable cloud storage service N Cao, S Yu, Z Yang, W Lou, YT Hou 2012 Proceedings IEEE Infocom, 693-701, 2012 | 273 | 2012 |
FDAC: Toward fine-grained distributed data access control in wireless sensor networks S Yu, K Ren, W Lou IEEE transactions on parallel and distributed systems 22 (4), 673-686, 2010 | 248 | 2010 |
Multi-user broadcast authentication in wireless sensor networks K Ren, S Yu, W Lou, Y Zhang IEEE Transactions on Vehicular Technology 58 (8), 4554-4564, 2009 | 242 | 2009 |
Dependable and secure sensor data storage with dynamic integrity assurance Q Wang, K Ren, S Yu, W Lou ACM Transactions on Sensor Networks (TOSN) 8 (1), 1-24, 2011 | 238 | 2011 |
Secure and constant cost public cloud storage auditing with deduplication J Yuan, S Yu 2013 IEEE Conference on Communications and Network Security (CNS), 145-153, 2013 | 222 | 2013 |
BANA: Body area network authentication exploiting channel characteristics L Shi, M Li, S Yu, J Yuan Proceedings of the fifth ACM conference on Security and Privacy in Wireless …, 2012 | 212 | 2012 |
: Privacy-Preserving Communication and Precise Reward Architecture for V2G Networks in Smart Grid Z Yang, S Yu, W Lou, C Liu IEEE Transactions on Smart Grid 2 (4), 697-706, 2011 | 191 | 2011 |
Proofs of retrievability with public verifiability and constant communication cost in cloud J Yuan, S Yu Proceedings of the 2013 international workshop on Security in cloud …, 2013 | 188 | 2013 |
Public integrity auditing for dynamic data sharing with multiuser modification J Yuan, S Yu IEEE Transactions on Information Forensics and Security 10 (8), 1717-1726, 2015 | 166 | 2015 |