Security and privacy for storage and computation in cloud computing L Wei, H Zhu, Z Cao, X Dong, W Jia, Y Chen, AV Vasilakos Information sciences 258, 371-386, 2014 | 731 | 2014 |
White-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes J Ning, X Dong, Z Cao, L Wei, X Lin IEEE Transactions on Information Forensics and Security 10 (6), 1274-1288, 2015 | 226 | 2015 |
Auditable -Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing J Ning, Z Cao, X Dong, K Liang, H Ma, L Wei IEEE Transactions on Information Forensics and Security 13 (1), 94-105, 2017 | 197 | 2017 |
SDSM: a secure data service mechanism in mobile cloud computing W Jia, H Zhu, Z Cao, L Wei, X Lin 2011 IEEE conference on computer communications workshops (INFOCOM WKSHPS …, 2011 | 137 | 2011 |
SecCloud: Bridging secure storage and computation in cloud L Wei, H Zhu, Z Cao, W Jia, AV Vasilakos 2010 IEEE 30th international conference on distributed computing systems …, 2010 | 130 | 2010 |
Large universe ciphertext-policy attribute-based encryption with white-box traceability J Ning, Z Cao, X Dong, L Wei, X Lin Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014 | 106 | 2014 |
White-box traceable CP-ABE for cloud storage service: How to catch people leaking their access credentials effectively J Ning, Z Cao, X Dong, L Wei IEEE Transactions on Dependable and Secure Computing 15 (5), 883-897, 2016 | 103 | 2016 |
CryptCloud: Secure and Expressive Data Access Control for Cloud Storage J Ning, Z Cao, X Dong, K Liang, L Wei, KKR Choo IEEE Transactions on Services Computing 14 (1), 111-124, 2018 | 85 | 2018 |
Accountable authority ciphertext-policy attribute-based encryption with white-box traceability and public auditing in the cloud J Ning, X Dong, Z Cao, L Wei Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015 | 84 | 2015 |
Mobigame: A user-centric reputation based incentive protocol for delay/disruption tolerant networks L Wei, Z Cao, H Zhu 2011 IEEE Global Telecommunications Conference-GLOBECOM 2011, 1-5, 2011 | 65 | 2011 |
MobiID: A user-centric and social-aware reputation based incentive scheme for delay/disruption tolerant networks L Wei, H Zhu, Z Cao, X Shen Ad-hoc, Mobile, and Wireless Networks: 10th International Conference, ADHOC …, 2011 | 64 | 2011 |
Modeling and analysis in marine big data: Advances and challenges D Huang, D Zhao, L Wei, Z Wang, Y Du Mathematical Problems in Engineering 2015, 2015 | 56 | 2015 |
: An Efficient Privacy-Preserving Data-Forwarding Scheme for Service-Oriented Vehicular Ad Hoc Networks X Dong, L Wei, H Zhu, Z Cao, L Wang IEEE Transactions on Vehicular Technology 60 (2), 580-591, 2010 | 51 | 2010 |
SUCCESS: A Secure User-centric and Social-aware Reputation Based Incentive Scheme for DTNs. L Wei, H Zhu, Z Cao, Xuemin (Sherman) Shen Ad Hoc Sens. Wirel. Networks 19 (1-2), 95-118, 2013 | 25 | 2013 |
山东省审定大豆品种的产量, 品质及株型演变 徐冉, 张礼凤, 王彩洁, 李伟 中国油料作物学报 29 (3), 242-247, 2007 | 17 | 2007 |
MEDAPs: secure multi‐entities delegated authentication protocols for mobile cloud computing L Zhang, L Wei, D Huang, K Zhang, M Dong, K Ota Security and Communication Networks 9 (16), 3777-3789, 2016 | 16 | 2016 |
Traceable and revocable CP-ABE with shorter ciphertexts. J Ning, Z Cao, X Dong, L Wei Sci. China Inf. Sci. 59 (11), 119102:1-119102:3, 2016 | 14 | 2016 |
Decoding method and device J Xu, L Xu, Q Zhang, W Li, S Shenghu, Z Du US Patent 8,447,622, 2013 | 12 | 2013 |
Role of Ca^ 2^+ and Calmodulin on Freezing Tolerance of Citrus Protoplasts W Li, ZH Sun, WC Zhang, XT Ma, DH Liu Acta Phytophysiologica Sinica 23, 262-266, 1997 | 12 | 1997 |
Efficient and provably secure identity-based multi-signature schemes for data aggregation in marine wireless sensor networks L Wei, L Zhang, D Huang, K Zhang 2017 IEEE 14th International Conference on Networking, Sensing and Control …, 2017 | 8 | 2017 |