Publicly verifiable inner product evaluation over outsourced data streams under multiple keys X Liu, W Sun, H Quan, W Lou, Y Zhang, H Li IEEE Transactions on Services Computing 10 (5), 826-838, 2016 | 13 | 2016 |
Lightweight handover authentication with location privacy-preserving in mobile wireless networks L Liu, H Quan, X Liu, Y Zhang International Journal of Embedded Systems 7 (3-4), 280-288, 2015 | 6 | 2015 |
Are friends of my friends too social? limitations of location privacy in a socially-connected world B Aronov, A Efrat, M Li, J Gao, JSB Mitchell, V Polishchuk, B Wang, ... Proceedings of the Eighteenth ACM International Symposium on Mobile Ad Hoc …, 2018 | 5 | 2018 |
Efficient and secure top-k queries with top order-preserving encryption H Quan, B Wang, Y Zhang, G Wu IEEE Access 6, 31525-31540, 2018 | 4 | 2018 |
Randex: Mitigating Range Injection Attacks on Searchable Encryption H Quan, H Liu, B Wang, M Li, Y Zhang 2019 IEEE Conference on Communications and Network Security (CNS), 133-141, 2019 | 2 | 2019 |
对加密电子医疗记录有效的连接关键词的搜索 张丽丽, 张玉清, 刘雪峰, 全韩彧 Journal of Software 6, 1577-1591, 2016 | 2 | 2016 |
Data inference from encrypted databases: a multi-dimensional order-preserving matching approach Y Pan, A Efrat, M Li, B Wang, H Quan, J Mitchell, J Gao, E Arkin Proceedings of the Twenty-First International Symposium on Theory …, 2020 | 1 | 2020 |
SecReach: Secure Reachability Computation on Encrypted Location Check-in Data H Quan, B Wang, I Leontiadis, M Li, Y Zhang International Conference on Cryptology and Network Security, 419-434, 2016 | 1 | 2016 |
A lightweight attribute-based access control scheme for intelligent transportation system with full privacy protection H Tian, X Li, H Quan, CC Chang, T Baker IEEE Sensors Journal, 2020 | | 2020 |