Follow
Changyu Dong
Changyu Dong
Guangzhou University
Verified email at gzhu.edu.cn - Homepage
Title
Cited by
Cited by
Year
When private set intersection meets big data: an efficient and scalable protocol
C Dong, L Chen, Z Wen
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
3912013
Shared and searchable encrypted data for untrusted servers
C Dong, G Russello, N Dulay
Journal of Computer Security 19 (3), 367-397, 2011
2972011
Shared and searchable encrypted data for untrusted servers
C Dong, G Russello, N Dulay
Data and Applications Security XXII: 22nd Annual IFIP WG 11.3 Working …, 2008
1612008
Betrayal, distrust, and rationality: Smart counter-collusion contracts for verifiable cloud computing
C Dong, Y Wang, A Aldweesh, P McCorry, A van Moorsel
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1582017
Searchable symmetric encryption with forward search privacy
J Li, Y Huang, Y Wei, S Lv, Z Liu, C Dong, W Lou
IEEE Transactions on Dependable and Secure Computing 18 (1), 460-474, 2019
1482019
Forward private searchable symmetric encryption with optimized I/O efficiency
X Song, C Dong, D Yuan, Q Xu, M Zhao
IEEE Transactions on Dependable and Secure Computing 17 (5), 912-927, 2018
1172018
Authorisation and conflict resolution for hierarchical domains
G Russello, C Dong, N Dulay
Eighth IEEE International Workshop on Policies for Distributed Systems and …, 2007
922007
VeriFL: Communication-Efficient and Fast Verifiable Aggregation for Federated Learning
X Guo, Z Liu, J Li, J Gao, B Hou, C Dong, T Baker
IEEE Transactions on Information Forensics and Security 16, 1736-1751, 2020
812020
Efficient delegated private set intersection on outsourced private datasets
A Abadi, S Terzis, R Metere, C Dong
IEEE Transactions on Dependable and Secure Computing 16 (4), 608-624, 2017
612017
O-PSI: delegated private set intersection on outsourced datasets
A Abadi, S Terzis, C Dong
ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International …, 2015
612015
Fair private set intersection with a semi-trusted arbiter
C Dong, L Chen, J Camenisch, G Russello
Data and Applications Security and Privacy XXVII: 27th Annual IFIP WG 11.3 …, 2013
582013
Toward a decentralized, trust-less marketplace for brokered IoT data trading using blockchain
S Bajoudah, C Dong, P Missier
2019 IEEE international conference on blockchain (Blockchain), 339-346, 2019
562019
VD-PSI: verifiable delegated private set intersection on outsourced private datasets
A Abadi, S Terzis, C Dong
Financial Cryptography and Data Security: 20th International Conference, FC …, 2017
512017
A fast single server private information retrieval protocol with low communication cost
C Dong, L Chen
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
512014
Consent-based workflows for healthcare management
G Russello, C Dong, N Dulay
Policies for Distributed Systems and Networks, 2008. POLICY 2008. IEEE …, 2008
482008
A workflow-based access control framework for e-health applications
G Russello, C Dong, N Dulay
Advanced Information Networking and Applications-Workshops, 2008. AINAW 2008 …, 2008
462008
A fast secure dot product protocol with application to privacy preserving association rule mining
C Dong, L Chen
Advances in Knowledge Discovery and Data Mining: 18th Pacific-Asia …, 2014
422014
Approximating private set union/intersection cardinality with logarithmic complexity
C Dong, G Loukides
IEEE Transactions on Information Forensics and Security 12 (11), 2792-2806, 2017
342017
Mas-encryption and its applications in privacy-preserving classifiers
C Gao, J Li, S Xia, KKR Choo, W Lou, C Dong
IEEE Transactions on Knowledge and Data Engineering 34 (5), 2306-2323, 2020
302020
Longitude: A privacy-preserving location sharing protocol for mobile applications
C Dong, N Dulay
Trust Management V: 5th IFIP WG 11.11 International Conference, IFIPTM 2011 …, 2011
302011
The system can't perform the operation now. Try again later.
Articles 1–20