Follow
Hui Li
Title
Cited by
Cited by
Year
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
B Wang, B Li, H Li
IEEE Cloud 2012, 2012
7562012
Public Auditing for Shared Data with Efficient User Revocation in the Cloud
B Wang, B Li, H Li
IEEE INFOCOM, 2904 - 2912, 2013
630*2013
Medblock: Efficient and secure medical data sharing via blockchain
K Fan, S Wang, Y Ren, H Li, Y Yang
Journal of medical systems 42, 1-11, 2018
5922018
Achieving k-anonymity in privacy-aware location-based services
B Niu, Q Li, X Zhu, G Cao, H Li
IEEE INFOCOM 2014-IEEE conference on computer communications, 754-762, 2014
5532014
Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking
W Sun, B Wang, N Cao, M Li, W Lou, YT Hou, H Li
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
4962013
A survey on security aspects for LTE and LTE-A networks
J Cao, M Ma, H Li, Y Zhang, Z Luo
IEEE communications surveys & tutorials 16 (1), 283-302, 2013
3762013
A novel attribute-based access control scheme using blockchain for IoT
S Ding, J Cao, C Li, K Fan, H Li
IEEE Access 7, 38431-38441, 2019
3292019
Protecting your right: Verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud
W Sun, S Yu, W Lou, YT Hou, H Li
IEEE Transactions on Parallel and Distributed Systems 27 (4), 1187-1198, 2014
3232014
Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking
W Sun, B Wang, N Cao, M Li, W Lou, YT Hou, H Li
IEEE transactions on parallel and distributed systems 25 (11), 3025-3035, 2013
3122013
Enhancing privacy through caching in location-based services
B Niu, Q Li, X Zhu, G Cao, H Li
2015 IEEE conference on computer communications (INFOCOM), 1017-1025, 2015
3082015
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
Y Zhang, X Chen, J Li, DS Wong, H Li, I You
Information Sciences 379, 42-61, 2017
2852017
Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud
B Wang, B Li, H Li
ACNS 2012, LNCS 7341, 507-525, 2012
2822012
Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud
W Sun, S Yu, W Lou, YT Hou, H Li
IEEE INFOCOM 2014-IEEE conference on computer communications, 226-234, 2014
2812014
Storing shared data on the cloud via security-mediator
B Wang, SSM Chow, M Li, H Li
2013 IEEE 33rd International Conference on Distributed Computing Systems …, 2013
2392013
A survey on security aspects for 3GPP 5G networks
J Cao, M Ma, H Li, R Ma, Y Sun, P Yu, L Xiong
IEEE communications surveys & tutorials 22 (1), 170-195, 2019
2252019
Efficient privacy-preserving authentication for vehicular ad hoc networks
X Zhu, S Jiang, L Wang, H Li
IEEE Transactions on Vehicular Technology 63 (2), 907-919, 2013
2122013
SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks
C Lai, H Li, R Lu, XS Shen
Computer Networks 57 (17), 3492-3510, 2013
2072013
Lightweight RFID protocol for medical privacy protection in IoT
K Fan, W Jiang, H Li, Y Yang
IEEE Transactions on Industrial Informatics 14 (4), 1656-1665, 2018
2042018
Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data
W Sun, X Liu, W Lou, YT Hou, H Li
2015 IEEE Conference on Computer Communications (INFOCOM), 2110-2118, 2015
1732015
Blockchain‐based efficient privacy preserving and data sharing scheme of content‐centric network in 5G
K Fan, Y Ren, Y Wang, H Li, Y Yang
IET communications 12 (5), 527-532, 2018
1592018
The system can't perform the operation now. Try again later.
Articles 1–20