Yinghui Zhang
Yinghui Zhang
Verified email at smu.edu.sg
Cited by
Cited by
Secure attribute-based data sharing for resource-limited users in cloud computing
J Li, Y Zhang, X Chen, Y Xiang
Computers & Security 72, 1-12, 2018
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
Y Zhang, X Chen, J Li, DS Wong, H Li, I You
Information Sciences 379, 42-61, 2017
Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control
Y Zhang, D Zheng, RH Deng
IEEE Internet of Things Journal 5 (3), 2130-2145, 2018
Anonymous attribute-based encryption supporting efficient decryption test
Y Zhang, X Chen, J Li, DS Wong, H Li
Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and …, 2013
Blockchain based Efficient and Robust Fair Payment for Outsourcing Services in Cloud Computing
Y Zhang, RH Deng, X Liu, D Zheng
Information Sciences 462, 262-277, 2018
Secure and fine-grained access control on e-healthcare records in mobile cloud computing
Y Liu, Y Zhang, J Ling, Z Liu
Future Generation Computer Systems 78, 1020-1026, 2018
Computationally efficient ciphertext-policy attribute-based encryption with constant-size ciphertexts
Y Zhang, D Zheng, X Chen, J Li, H Li
International Conference on Provable Security, 259-273, 2014
Outsourcing Service Fair Payment based on Blockchain and its Applications in Cloud Computing
Y Zhang, RH Deng, X Liu, D Zheng
IEEE Transactions on Services Computing, 2018
Efficient attribute-based data sharing in mobile clouds
Y Zhang, D Zheng, X Chen, J Li, H Li
Pervasive and Mobile Computing 28, 135-149, 2016
TKSE: Trustworthy Keyword Search over Encrypted Data with Two-side Verifiability via Blockchain
Y Zhang, RH Deng, J Shu, K Yang, D Zheng
IEEE Access 6, 31077-31087, 2018
Privacy-aware attribute-based PHR sharing with user accountability in cloud computing
F Xhafa, J Feng, Y Zhang, X Chen, J Li
The Journal of Supercomputing 71 (5), 1607-1619, 2015
Anonymous attribute‐based proxy re‐encryption for access control in cloud computing
Y Zhang, J Li, X Chen, H Li
Security and Communication Networks 9 (14), 2397-2411, 2016
Efficient and Robust Certificateless Signature for Data Crowdsensing in Cloud-assisted Industrial IoT
Y Zhang, R Deng, D Zheng, J Li, P Wu, J Cao
IEEE Transactions on Industrial Informatics, 2019
Privacy-preserving communication and power injection over vehicle networks and 5G smart grid slice
Y Zhang, J Li, D Zheng, P Li, Y Tian
Journal of Network and Computer Applications 122, 50-60, 2018
Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks
Y Zhang, X Chen, J Li, H Li
Computer Networks 75, 192-211, 2014
郑东, 赵庆兰, 张应辉
西安邮电大学学报 18 (6), 1-10, 2013
Online/offline unbounded multi‐authority attribute‐based encryption for data sharing in mobile cloud computing
Y Zhang, D Zheng, Q Li, J Li, H Li
Security and Communication Networks 9 (16), 3688-3702, 2016
Attribute-Based Data Sharing with Flexible and Direct Revocation in Cloud Computing.
Y Zhang, X Chen, J Li, H Li, F Li
KSII Transactions on Internet & Information Systems 8 (11), 2014
FDR-ABE: attribute-based encryption with flexible and direct revocation
Y Zhang, X Chen, J Li, H Li, F Li
2013 5th International Conference on Intelligent Networking and …, 2013
Efficient and robust identity-based handoff authentication in wireless networks
Q Han, Y Zhang, X Chen, H Li, J Quan
International Conference on Network and System Security, 180-191, 2012
The system can't perform the operation now. Try again later.
Articles 1–20