An improved authentication scheme for telecare medicine information systems J Wei, X Hu, W Liu Journal of Medical Systems 36 (6), 3597-3604, 2012 | 229 | 2012 |
A certificateless aggregate signature scheme for healthcare wireless sensor network P Kumar, S Kumari, V Sharma, AK Sangaiah, J Wei, X Li Sustainable Computing: Informatics and Systems 18, 80-89, 2018 | 150 | 2018 |
Secure data sharing in cloud computing using revocable-storage identity-based encryption J Wei, W Liu, X Hu IEEE Transactions on Cloud Computing 6 (4), 1136-1148, 2018 | 119 | 2018 |
RS-HABE: Revocable-storage and hierarchical attribute-based access scheme for secure sharing of e-health records in public cloud J Wei, X Chen, X Huang, X Hu, W Susilo IEEE Transactions on Dependable and Secure Computing 18 (5), 2301-2315, 2021 | 113 | 2021 |
Secure and efficient attribute-based access control for multiauthority cloud storage J Wei, W Liu, X Hu IEEE Systems Journal 12 (2), 1731-1742, 2018 | 74 | 2018 |
Blockchain-based secure deduplication and shared auditing in decentralized storage G Tian, Y Hu, J Wei, Z Liu, X Huang, X Chen, W Susilo IEEE Transactions on Dependable and Secure Computing 19 (6), 3941 - 3954, 2022 | 73 | 2022 |
Cryptanalysis and improvement of a robust smart card authentication scheme for multi-server architecture J Wei, W Liu, X Hu Wireless Personal Communications 77, 2255-2269, 2014 | 46 | 2014 |
Secure and Efficient Smart Card Based Remote User Password Authentication Scheme J Wei, W Liu, X Hu International Journal of Network Security 18 (4), 782-792, 2016 | 35 | 2016 |
Fuzzy c‐Means and Cluster Ensemble with Random Projection for Big Data Clustering M Ye, W Liu, J Wei, X Hu Mathematical Problems in Engineering 2016 (1), 6529794, 2016 | 35 | 2016 |
Forward-secure puncturable identity-based encryption for securing cloud emails J Wei, X Chen, J Wang, X Hu, J Ma Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019 | 33 | 2019 |
Enabling (end-to-end) encrypted cloud emails with practical forward secrecy J Wei, X Chen, J Wang, X Hu, J Ma IEEE Transactions on Dependable and Secure Computing 19 (4), 2318 - 2332, 2022 | 31 | 2022 |
Traceable attribute‐based signcryption J Wei, X Hu, W Liu Security and Communication Networks 7 (12), 2302-2317, 2014 | 30 | 2014 |
An efficient biometric identification in cloud computing with enhanced privacy security C Liu, X Hu, Q Zhang, J Wei, W Liu IEEE Access 7, 105363-105375, 2019 | 28 | 2019 |
Forward-secure identity-based signature with efficient revocation J Wei, W Liu, X Hu International Journal of Computer Mathematics 94 (7), 1390-1411, 2017 | 24 | 2017 |
A two-phase algorithm for generating synthetic graph under local differential privacy Y Zhang, J Wei, X Zhang, X Hu, W Liu Proceedings of the 8th International Conference on Communication and Network …, 2018 | 23 | 2018 |
VRBC: a verifiable redactable blockchain with efficient query and integrity auditing G Tian, J Wei, M Kutyłowski, W Susilo, X Huang, X Chen IEEE Transactions on Computers 72 (7), 1928-1942, 2023 | 21 | 2023 |
Secure control protocol for universal serial bus mass storage devices J Wei, W Liu, X Hu IET Computers & Digital Techniques 9 (6), 321-327, 2015 | 21 | 2015 |
Forward and backward secure fuzzy encryption for data sharing in cloud computing J Wei, X Hu, W Liu, Q Zhang Soft Computing 23 (2), 497-506, 2019 | 16 | 2019 |
Communication-Efficient and Fine-Grained Forward-Secure Asynchronous Messaging J Wei, X Chen, J Ma, X Hu, K Ren IEEE/ACM Transactions on Networking 29 (5), 2242-2253, 2021 | 14 | 2021 |
PMDP: A framework for preserving multiparty data privacy in cloud computing J Li, J Wei, W Liu, X Hu Security and Communication Networks 2017 (1), 6097253, 2017 | 14 | 2017 |