·Paper Publications
- [21] Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search.IEEE Transactions on Information Forensics & Security,2015,
- [22] A Practical Framework for t-Out-of-n Oblivious Transfer with Security Against Covert Adversaries.IEEE Transactions on Information Forensics & Security,2012,
- [23] Conditional Identity-based Broadcast Proxy Re-Encryption and Its Application to Cloud Email.IEEE Transactions on Computers,2016,
- [24] Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack.IEEE Transactions on Computers,2013,
- [25] Attribute-Based Access Control Encryption.IEEE Transactions on Dependable and Secure Computing,2024,
- [26] Efficient Server-Aided Secure Two-Party Computation in Heterogeneous Mobile Cloud Computing.IEEE Transactions on Dependable and Secure Computing,2021,
- [27] Practical Multi-Keyword and Boolean Search Over Encrypted E-mail in Cloud Server.IEEE Transactions on Services Computing,2021,
- [28] Cloud-Assisted Key Distribution in Batch for Secure Real-time Mobile Services.IEEE Transactions on Services Computing,2018,
- [29] A Fairness-based Collaborative Communication Eco-system over Sustainable D2D Fogs in a 5G Industrial IoT.IEEE Transactions on Industrial Informatics,2021,
- [30] Lightweighted Secure Searching over Public-key Ciphertexts for Edge-Cloud Assisted Industrial IoT Devices.IEEE Transactions on Industrial Informatics,2020,