Hui Li
Title
Cited by
Cited by
Year
Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking
W Sun, B Wang, N Cao, M Li, W Lou, YT Hou, H Li
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
5592013
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
B Wang, B Li, H Li
IEEE Cloud 2012, 2012
5592012
Public Auditing for Shared Data with Efficient User Revocation in the Cloud
B Wang, B Li, H Li
IEEE INFOCOM, 2904 - 2912, 2013
456*2013
Achieving k-anonymity in privacy-aware location-based services
B Niu, Q Li, X Zhu, G Cao, H Li
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 754-762, 2014
3402014
A survey on security aspects for LTE and LTE-A networks
J Cao, M Ma, H Li, Y Zhang, Z Luo
IEEE communications surveys & tutorials 16 (1), 283-302, 2013
2622013
Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud
B Wang, B Li, H Li
ACNS 2012, LNCS 7341, 507-525, 2012
2212012
Storing shared data on the cloud via security-mediator
B Wang, SSM Chow, M Li, H Li
2013 IEEE 33rd International Conference on Distributed Computing Systems …, 2013
2062013
Enhancing privacy through caching in location-based services
B Niu, Q Li, X Zhu, G Cao, H Li
2015 IEEE conference on computer communications (INFOCOM), 1017-1025, 2015
1922015
Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud
W Sun, S Yu, W Lou, YT Hou, H Li
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 226-234, 2014
1872014
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
Y Zhang, X Chen, J Li, DS Wong, H Li, I You
Information Sciences 379, 42-61, 2017
1852017
Protecting your right: Verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud
W Sun, S Yu, W Lou, YT Hou, H Li
IEEE Transactions on Parallel and Distributed Systems 27 (4), 1187-1198, 2014
1692014
SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks
C Lai, H Li, R Lu, XS Shen
Computer Networks 57 (17), 3492-3510, 2013
1322013
Efficient privacy-preserving authentication for vehicular ad hoc networks
X Zhu, S Jiang, L Wang, H Li
IEEE Transactions on Vehicular Technology 63 (2), 907-919, 2013
1242013
Medblock: Efficient and secure medical data sharing via blockchain
K Fan, S Wang, Y Ren, H Li, Y Yang
Journal of medical systems 42 (8), 136, 2018
1032018
Anonymous attribute-based encryption supporting efficient decryption test
Y Zhang, X Chen, J Li, DS Wong, H Li
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
1032013
Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data
W Sun, X Liu, W Lou, YT Hou, H Li
2015 IEEE Conference on Computer Communications (INFOCOM), 2110-2118, 2015
992015
A simple and robust handover authentication between HeNB and eNB in LTE networks
J Cao, H LI, M Ma, Y Zhang, C Lai
Computer Networks 56 (8), 2119-2131, 2012
922012
Privacy-area aware dummy generation algorithms for location-based services
B Niu, Z Zhang, X Li, H Li
2014 IEEE International Conference on Communications (ICC), 957-962, 2014
902014
Privacy-preserving public auditing for shared cloud data supporting group dynamics
B Wang, H Li, M Li
2013 IEEE International Conference on Communications (ICC), 1946-1950, 2013
862013
Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index
B Wang, Y Hou, M Li, H Wang, H Li
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
842014
The system can't perform the operation now. Try again later.
Articles 1–20