Follow
Yinghui Zhang
Yinghui Zhang
XUPT & SMU
Verified email at smu.edu.sg
Title
Cited by
Cited by
Year
Secure attribute-based data sharing for resource-limited users in cloud computing
J Li, Y Zhang, X Chen, Y Xiang
Computers & Security 72, 1-12, 2018
4982018
Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control
Y Zhang, D Zheng, RH Deng
IEEE Internet of Things Journal 5 (3), 2130-2145, 2018
4332018
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
Y Zhang, X Chen, J Li, DS Wong, H Li, I You
Information Sciences 379, 42-61, 2017
2882017
Blockchain based Efficient and Robust Fair Payment for Outsourcing Services in Cloud Computing
Y Zhang, RH Deng, X Liu, D Zheng
Information Sciences 462, 262-277, 2018
2332018
Anonymous attribute-based encryption supporting efficient decryption test
Y Zhang, X Chen, J Li, DS Wong, H Li
Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and …, 2013
1492013
Secure and fine-grained access control on e-healthcare records in mobile cloud computing
Y Liu, Y Zhang, J Ling, Z Liu
Future Generation Computer Systems 78, 1020-1026, 2018
1412018
Outsourcing Service Fair Payment based on Blockchain and its Applications in Cloud Computing
Y Zhang, RH Deng, X Liu, D Zheng
IEEE Transactions on Services Computing 14 (4), 1152-1166, 2021
136*2021
Attribute-Based Encryption for Cloud Computing Access Control: A Survey
Y Zhang, R Deng, S Xu, J Sun, Q Li, D Zheng
ACM Computing Surveys (CSUR) 53 (4), Article No.: 83, pp 1-41, 2020
1322020
Efficient and Robust Certificateless Signature for Data Crowdsensing in Cloud-assisted Industrial IoT
Y Zhang, R Deng, D Zheng, J Li, P Wu, J Cao
IEEE Transactions on Industrial Informatics, 2019
1322019
Attribute-Based Encryption for Cloud Computing Access Control: A Survey
Y Zhang, R Deng, S Xu, J Sun, Q Li, D Zheng
ACM Computing Surveys (CSUR), 0
132
TKSE: Trustworthy Keyword Search over Encrypted Data with Two-side Verifiability via Blockchain
Y Zhang, RH Deng, J Shu, K Yang, D Zheng
IEEE Access 6, 31077-31087, 2018
1182018
Efficient and privacy-preserving traceable attribute-based encryption in blockchain
A Wu, Y Zhang, X Zheng, R Guo, Q Zhao, D Zheng
Annals of Telecommunications, 1-11, 2019
1142019
Robust and Universal Seamless Handover Authentication in 5G HetNets
Y Zhang, R Deng, E Bertino, D Zheng
IEEE Transactions on Dependable and Secure Computing 18 (2), 858-874, 2021
1132021
Computationally efficient ciphertext-policy attribute-based encryption with constant-size ciphertexts
Y Zhang, D Zheng, X Chen, J Li, H Li
International Conference on Provable Security, 259-273, 2014
902014
Privacy-preserving communication and power injection over vehicle networks and 5G smart grid slice
Y Zhang, J Li, D Zheng, P Li, Y Tian
Journal of Network and Computer Applications 122, 50-60, 2018
822018
Anonymous attribute‐based proxy re‐encryption for access control in cloud computing
Y Zhang, J Li, X Chen, H Li
Security and Communication Networks 9 (14), 2397-2411, 2016
792016
Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing
S Xu, J Ning, Y Li, Y Zhang, G Xu, X Huang, R Deng
IEEE Transactions on Dependable and Secure Computing 19 (2), 1064-1077, 2022
772022
Lightweight and Privacy-Aware Fine-Grained Access Control for IoT-oriented Smart Health
J Sun, H Xiong, X Liu, Y Zhang, X Nie, RH Deng
IEEE Internet of Things Journal, 2020
712020
Secure smart health with privacy-aware aggregate authentication and access control in Internet of Things
Y Zhang, RH Deng, G Han, D Zheng
Journal of Network and Computer Applications 123, 89-100, 2018
712018
Lightweight and Expressive Fine-grained Access Control for Healthcare Internet-of-Things
S Xu, Y Li, R Deng, Y Zhang, X Luo, X Liu
IEEE Transactions on Cloud Computing 10 (1), 474-490, 2022
682022
The system can't perform the operation now. Try again later.
Articles 1–20