When private set intersection meets big data: an efficient and scalable protocol C Dong, L Chen, Z Wen Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 391 | 2013 |
Shared and searchable encrypted data for untrusted servers C Dong, G Russello, N Dulay Journal of Computer Security 19 (3), 367-397, 2011 | 297 | 2011 |
Shared and searchable encrypted data for untrusted servers C Dong, G Russello, N Dulay Data and Applications Security XXII: 22nd Annual IFIP WG 11.3 Working …, 2008 | 161 | 2008 |
Betrayal, distrust, and rationality: Smart counter-collusion contracts for verifiable cloud computing C Dong, Y Wang, A Aldweesh, P McCorry, A van Moorsel Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 158 | 2017 |
Searchable symmetric encryption with forward search privacy J Li, Y Huang, Y Wei, S Lv, Z Liu, C Dong, W Lou IEEE Transactions on Dependable and Secure Computing 18 (1), 460-474, 2019 | 148 | 2019 |
Forward private searchable symmetric encryption with optimized I/O efficiency X Song, C Dong, D Yuan, Q Xu, M Zhao IEEE Transactions on Dependable and Secure Computing 17 (5), 912-927, 2018 | 117 | 2018 |
Authorisation and conflict resolution for hierarchical domains G Russello, C Dong, N Dulay Eighth IEEE International Workshop on Policies for Distributed Systems and …, 2007 | 92 | 2007 |
VeriFL: Communication-Efficient and Fast Verifiable Aggregation for Federated Learning X Guo, Z Liu, J Li, J Gao, B Hou, C Dong, T Baker IEEE Transactions on Information Forensics and Security 16, 1736-1751, 2020 | 81 | 2020 |
Efficient delegated private set intersection on outsourced private datasets A Abadi, S Terzis, R Metere, C Dong IEEE Transactions on Dependable and Secure Computing 16 (4), 608-624, 2017 | 61 | 2017 |
O-PSI: delegated private set intersection on outsourced datasets A Abadi, S Terzis, C Dong ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International …, 2015 | 61 | 2015 |
Fair private set intersection with a semi-trusted arbiter C Dong, L Chen, J Camenisch, G Russello Data and Applications Security and Privacy XXVII: 27th Annual IFIP WG 11.3 …, 2013 | 58 | 2013 |
Toward a decentralized, trust-less marketplace for brokered IoT data trading using blockchain S Bajoudah, C Dong, P Missier 2019 IEEE international conference on blockchain (Blockchain), 339-346, 2019 | 56 | 2019 |
VD-PSI: verifiable delegated private set intersection on outsourced private datasets A Abadi, S Terzis, C Dong Financial Cryptography and Data Security: 20th International Conference, FC …, 2017 | 51 | 2017 |
A fast single server private information retrieval protocol with low communication cost C Dong, L Chen Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014 | 51 | 2014 |
Consent-based workflows for healthcare management G Russello, C Dong, N Dulay Policies for Distributed Systems and Networks, 2008. POLICY 2008. IEEE …, 2008 | 48 | 2008 |
A workflow-based access control framework for e-health applications G Russello, C Dong, N Dulay Advanced Information Networking and Applications-Workshops, 2008. AINAW 2008 …, 2008 | 46 | 2008 |
A fast secure dot product protocol with application to privacy preserving association rule mining C Dong, L Chen Advances in Knowledge Discovery and Data Mining: 18th Pacific-Asia …, 2014 | 42 | 2014 |
Approximating private set union/intersection cardinality with logarithmic complexity C Dong, G Loukides IEEE Transactions on Information Forensics and Security 12 (11), 2792-2806, 2017 | 34 | 2017 |
Mas-encryption and its applications in privacy-preserving classifiers C Gao, J Li, S Xia, KKR Choo, W Lou, C Dong IEEE Transactions on Knowledge and Data Engineering 34 (5), 2306-2323, 2020 | 30 | 2020 |
Longitude: A privacy-preserving location sharing protocol for mobile applications C Dong, N Dulay Trust Management V: 5th IFIP WG 11.11 International Conference, IFIPTM 2011 …, 2011 | 30 | 2011 |