Hanyu Quan
Cited by
Cited by
Publicly verifiable inner product evaluation over outsourced data streams under multiple keys
X Liu, W Sun, H Quan, W Lou, Y Zhang, H Li
IEEE Transactions on Services Computing 10 (5), 826-838, 2016
Lightweight handover authentication with location privacy-preserving in mobile wireless networks
L Liu, H Quan, X Liu, Y Zhang
International Journal of Embedded Systems 7 (3-4), 280-288, 2015
Are friends of my friends too social? limitations of location privacy in a socially-connected world
B Aronov, A Efrat, M Li, J Gao, JSB Mitchell, V Polishchuk, B Wang, ...
Proceedings of the Eighteenth ACM International Symposium on Mobile Ad Hoc …, 2018
Efficient and secure top-k queries with top order-preserving encryption
H Quan, B Wang, Y Zhang, G Wu
IEEE Access 6, 31525-31540, 2018
Randex: Mitigating Range Injection Attacks on Searchable Encryption
H Quan, H Liu, B Wang, M Li, Y Zhang
2019 IEEE Conference on Communications and Network Security (CNS), 133-141, 2019
张丽丽, 张玉清, 刘雪峰, 全韩彧
Journal of Software 6, 1577-1591, 2016
Data inference from encrypted databases: a multi-dimensional order-preserving matching approach
Y Pan, A Efrat, M Li, B Wang, H Quan, J Mitchell, J Gao, E Arkin
Proceedings of the Twenty-First International Symposium on Theory …, 2020
SecReach: Secure Reachability Computation on Encrypted Location Check-in Data
H Quan, B Wang, I Leontiadis, M Li, Y Zhang
International Conference on Cryptology and Network Security, 419-434, 2016
A lightweight attribute-based access control scheme for intelligent transportation system with full privacy protection
H Tian, X Li, H Quan, CC Chang, T Baker
IEEE Sensors Journal, 2020
The system can't perform the operation now. Try again later.
Articles 1–9