Follow
Jinguang Han
Title
Cited by
Cited by
Year
When intrusion detection meets blockchain technology: a review
W Meng, EW Tischhauser, Q Wang, Y Wang, J Han
Ieee Access 6, 10179-10188, 2018
4062018
Flexible and fine-grained attribute-based data storage in cloud computing
J Li, W Yao, Y Zhang, H Qian, J Han
IEEE Transactions on Services Computing 10 (5), 785-796, 2016
2542016
KSF-OABE: Outsourced attribute-based encryption with keyword search function for cloud storage
J Li, X Lin, Y Zhang, J Han
IEEE Transactions on Services Computing 10 (5), 715-725, 2016
2442016
Privacy-preserving decentralized key-policy attribute-based encryption
J Han, W Susilo, Y Mu, J Yan
IEEE transactions on parallel and distributed systems 23 (11), 2150-2162, 2012
2172012
Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation
H Qian, J Li, Y Zhang, J Han
International Journal of Information Security 14 (6), 487-497, 2015
2022015
Improving privacy and security in decentralized ciphertext-policy attribute-based encryption
J Han, W Susilo, Y Mu, J Zhou, MHA Au
IEEE transactions on information forensics and security 10 (3), 665-678, 2014
1742014
User collusion avoidance CP-ABE with efficient attribute revocation for cloud storage
J Li, W Yao, J Han, Y Zhang, J Shen
IEEE Systems Journal 12 (2), 1767-1777, 2017
1672017
Full verifiability for outsourced decryption in attribute based encryption
J Li, Y Wang, Y Zhang, J Han
IEEE transactions on services computing 13 (3), 478-487, 2017
1252017
A novel efficient remote data possession checking protocol in cloud storage
H Yan, J Li, J Han, Y Zhang
IEEE Transactions on Information Forensics and Security 12 (1), 78-88, 2016
1122016
Identity-based data storage in cloud computing
J Han, W Susilo, Y Mu
Future Generation Computer Systems 29 (3), 673-681, 2013
1062013
User collusion avoidance scheme for privacy-preserving decentralized key-policy attribute-based encryption
Y Rahulamathavan, S Veluru, J Han, F Li, M Rajarajan, R Lu
IEEE Transactions on Computers 65 (9), 2939-2946, 2015
662015
Towards leakage-resilient fine-grained access control in fog computing
Z Yu, MH Au, Q Xu, R Yang, J Han
Future Generation Computer Systems 78, 763-777, 2018
492018
PPDCP-ABE: Privacy-preserving decentralized ciphertext-policy attribute-based encryption
J Han, W Susilo, Y Mu, J Zhou, MH Au
European Symposium on Research in Computer Security, 73-90, 2014
432014
VOD-ADAC: Anonymous distributed fine-grained access control protocol with verifiable outsourced decryption in public cloud
H Wang, D He, J Han
IEEE transactions on services computing 13 (3), 572-583, 2017
342017
Toward practical privacy-preserving processing over encrypted data in IoT: an assistive healthcare use case
L Jiang, L Chen, T Giannetsos, B Luo, K Liang, J Han
IEEE Internet of Things Journal 6 (6), 10177-10190, 2019
282019
Accountable mobile E-commerce scheme via identity-based plaintext-checkable encryption
J Han, Y Yang, X Huang, TH Yuen, J Li, J Cao
Information Sciences 345, 143-155, 2016
272016
A generic construction of dynamic single sign-on with strong security
J Han, Y Mu, W Susilo, J Yan
International Conference on Security and Privacy in Communication Systems …, 2010
272010
Enhancing the security of FinTech applications with map-based graphical password authentication
W Meng, L Zhu, W Li, J Han, Y Li
Future Generation Computer Systems 101, 1018-1027, 2019
262019
Attribute-based oblivious access control
J Han, W Susilo, Y Mu, J Yan
The Computer Journal 55 (10), 1202-1215, 2012
252012
Expressive attribute-based keyword search with constant-size ciphertext
J Han, Y Yang, JK Liu, J Li, K Liang, J Shen
Soft Computing 22 (15), 5163-5177, 2018
222018
The system can't perform the operation now. Try again later.
Articles 1–20