Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage W Shen, J Qin, J Yu, R Hao, J Hu IEEE Transactions on Information Forensics and Security 14 (2), 331-346, 2018 | 350 | 2018 |
Enabling cloud storage auditing with key-exposure resistance J Yu, K Ren, C Wang, V Varadharajan IEEE Transactions on Information forensics and security 10 (6), 1167-1179, 2015 | 247 | 2015 |
Enabling efficient user revocation in identity-based cloud storage auditing for shared big data Y Zhang, J Yu, R Hao, C Wang, K Ren IEEE Transactions on Dependable and Secure computing 17 (3), 608-619, 2018 | 203 | 2018 |
Enabling cloud storage auditing with verifiable outsourcing of key updates J Yu, K Ren, C Wang IEEE transactions on information forensics and security 11 (6), 1362-1375, 2016 | 188 | 2016 |
Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability G Yang, J Yu, W Shen, Q Su, Z Fu, R Hao Journal of Systems and Software 113, 130-139, 2016 | 166 | 2016 |
Strong key-exposure resilient auditing for secure cloud storage J Yu, H Wang IEEE Transactions on Information Forensics and Security 12 (8), 1931-1940, 2017 | 149 | 2017 |
Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium W Shen, J Yu, H Xia, H Zhang, X Lu, R Hao Journal of Network and Computer Applications 82, 56-64, 2017 | 125 | 2017 |
Blockchain-based privacy-preserving and rewarding private data sharing for IoT T Li, H Wang, D He, J Yu IEEE Internet of Things Journal 9 (16), 15138-15149, 2022 | 119 | 2022 |
Incentive and unconditionally anonymous identity-based public provable data possession H Wang, D He, J Yu, Z Wang IEEE Transactions on Services Computing 12 (5), 824-835, 2016 | 115 | 2016 |
Towards achieving keyword search over dynamic encrypted cloud data with symmetric-key based verification X Ge, J Yu, H Zhang, C Hu, Z Li, Z Qin, R Hao IEEE Transactions on Dependable and Secure computing 18 (1), 490-504, 2019 | 114 | 2019 |
Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data X Jiang, J Yu, J Yan, R Hao Information Sciences 403, 22-41, 2017 | 102 | 2017 |
Forward-secure identity-based signature: security notions and construction J Yu, R Hao, F Kong, X Cheng, J Fan, Y Chen Information Sciences 181 (3), 648-660, 2011 | 92 | 2011 |
Symmetric-key based proofs of retrievability supporting public verification C Guan, K Ren, F Zhang, F Kerschbaum, J Yu Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015 | 91 | 2015 |
Energy-efficient routing algorithm based on unequal clustering and connected graph in wireless sensor networks H Xia, R Zhang, J Yu, Z Pan International Journal of Wireless Information Networks 23, 141-150, 2016 | 76 | 2016 |
Data integrity auditing without private key storage for secure cloud storage W Shen, J Qin, J Yu, R Hao, J Hu, J Ma IEEE Transactions on Cloud Computing 9 (4), 1408-1421, 2019 | 71 | 2019 |
Achieving privacy-preserving DSSE for intelligent IoT healthcare system Y Liu, J Yu, J Fan, P Vijayakumar, V Chang IEEE Transactions on Industrial Informatics 18 (3), 2010-2020, 2021 | 63 | 2021 |
Checking only when it is necessary: Enabling integrity auditing based on the keyword with sensitive information privacy for encrypted cloud data X Gao, J Yu, Y Chang, H Wang, J Fan IEEE Transactions on Dependable and Secure Computing 19 (6), 3774-3789, 2021 | 57 | 2021 |
Enabling efficient verifiable fuzzy keyword search over encrypted data in cloud computing X Ge, J Yu, C Hu, H Zhang, R Hao IEEE Access 6, 45725-45739, 2018 | 57 | 2018 |
Efficient unicast in bijective connection networks with the restricted faulty node set J Fan, X Jia, X Liu, S Zhang, J Yu Information Sciences 181 (11), 2303-2315, 2011 | 48 | 2011 |
Cloud storage for electronic health records based on secret sharing with verifiable reconstruction outsourcing H Zhang, J Yu, C Tian, P Zhao, G Xu, J Lin IEEE Access 6, 40713-40722, 2018 | 46 | 2018 |