Follow
Yinghui Zhang
Yinghui Zhang
XUPT & SMU
Verified email at smu.edu.sg
Title
Cited by
Cited by
Year
Secure attribute-based data sharing for resource-limited users in cloud computing
J Li, Y Zhang, X Chen, Y Xiang
Computers & Security 72, 1-12, 2018
4462018
Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control
Y Zhang, D Zheng, RH Deng
IEEE Internet of Things Journal 5 (3), 2130-2145, 2018
3332018
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
Y Zhang, X Chen, J Li, DS Wong, H Li, I You
Information Sciences 379, 42-61, 2017
2672017
Blockchain based Efficient and Robust Fair Payment for Outsourcing Services in Cloud Computing
Y Zhang, RH Deng, X Liu, D Zheng
Information Sciences 462, 262-277, 2018
1872018
Anonymous attribute-based encryption supporting efficient decryption test
Y Zhang, X Chen, J Li, DS Wong, H Li
Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and …, 2013
1352013
Secure and fine-grained access control on e-healthcare records in mobile cloud computing
Y Liu, Y Zhang, J Ling, Z Liu
Future Generation Computer Systems 78, 1020-1026, 2018
1172018
Efficient and Robust Certificateless Signature for Data Crowdsensing in Cloud-assisted Industrial IoT
Y Zhang, R Deng, D Zheng, J Li, P Wu, J Cao
IEEE Transactions on Industrial Informatics, 2019
1082019
Outsourcing Service Fair Payment based on Blockchain and its Applications in Cloud Computing
Y Zhang, RH Deng, X Liu, D Zheng
IEEE Transactions on Services Computing 14 (4), 1152-1166, 2021
102*2021
TKSE: Trustworthy Keyword Search over Encrypted Data with Two-side Verifiability via Blockchain
Y Zhang, RH Deng, J Shu, K Yang, D Zheng
IEEE Access 6, 31077-31087, 2018
922018
Computationally efficient ciphertext-policy attribute-based encryption with constant-size ciphertexts
Y Zhang, D Zheng, X Chen, J Li, H Li
International Conference on Provable Security, 259-273, 2014
772014
Robust and Universal Seamless Handover Authentication in 5G HetNets
Y Zhang, R Deng, E Bertino, D Zheng
IEEE Transactions on Dependable and Secure Computing 18 (2), 858-874, 2021
762021
Efficient and privacy-preserving traceable attribute-based encryption in blockchain
A Wu, Y Zhang, X Zheng, R Guo, Q Zhao, D Zheng
Annals of Telecommunications, 1-11, 2019
732019
Anonymous attribute‐based proxy re‐encryption for access control in cloud computing
Y Zhang, J Li, X Chen, H Li
Security and Communication Networks 9 (14), 2397-2411, 2016
712016
Privacy-preserving communication and power injection over vehicle networks and 5G smart grid slice
Y Zhang, J Li, D Zheng, P Li, Y Tian
Journal of Network and Computer Applications 122, 50-60, 2018
692018
Attribute-Based Encryption for Cloud Computing Access Control: A Survey
Y Zhang, R Deng, S Xu, J Sun, Q Li, D Zheng
ACM Computing Surveys (CSUR) 53 (4), Article No.: 83, pp 1-41, 2020
602020
Attribute-Based Encryption for Cloud Computing Access Control: A Survey
Y Zhang, R Deng, S Xu, J Sun, Q Li, D Zheng
ACM Computing Surveys (CSUR), 0
60
Privacy-aware attribute-based PHR sharing with user accountability in cloud computing
F Xhafa, J Feng, Y Zhang, X Chen, J Li
The Journal of Supercomputing 71 (5), 1607-1619, 2015
592015
Efficient attribute-based data sharing in mobile clouds
Y Zhang, D Zheng, X Chen, J Li, H Li
Pervasive and Mobile Computing 28, 135-149, 2016
582016
Secure smart health with privacy-aware aggregate authentication and access control in Internet of Things
Y Zhang, RH Deng, G Han, D Zheng
Journal of Network and Computer Applications 123, 89-100, 2018
542018
Comments on “A Large-Scale Concurrent Data Anonymous Batch Verification Scheme for Mobile Healthcare Crowd Sensing”
Y Zhang, J Shu, X Liu, J Li, D Zheng
IEEE Internet of Things Journal, 2018
452018
The system can't perform the operation now. Try again later.
Articles 1–20