Achieving secure, scalable, and fine-grained data access control in cloud computing S Yu, C Wang, K Ren, W Lou
2010 Proceedings IEEE INFOCOM, 1-9, 2010
2773 2010 Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption M Li, S Yu, Y Zheng, K Ren, W Lou
IEEE transactions on parallel and distributed systems 24 (1), 131-143, 2012
1572 2012 Attribute based data sharing with attribute revocation S Yu, C Wang, K Ren, W Lou
Proceedings of the 5th ACM symposium on information, computer and …, 2010
1084 2010 Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings M Li, S Yu, K Ren, W Lou
Security and Privacy in Communication Networks: 6th Iternational ICST …, 2010
694 2010 Authorized private keyword search over encrypted data in cloud computing M Li, S Yu, N Cao, W Lou
2011 31st international conference on distributed computing systems, 383-392, 2011
577 2011 Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud B Wang, S Yu, W Lou, YT Hou
IEEE INFOCOM 2014-IEEE conference on computer communications, 2112-2120, 2014
531 2014 Achieving usable and privacy-assured similarity search over outsourced cloud data C Wang, K Ren, S Yu, KMR Urs
2012 Proceedings IEEE INFOCOM, 451-459, 2012
443 2012 Protecting your right: Verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud W Sun, S Yu, W Lou, YT Hou, H Li
IEEE Transactions on Parallel and Distributed Systems 27 (4), 1187-1198, 2014
331 2014 Findu: Privacy-preserving personal profile matching in mobile social networks M Li, N Cao, S Yu, W Lou
2011 Proceedings IEEE INFOCOM, 2435-2443, 2011
327 2011 Privacy preserving back-propagation neural network learning made practical with cloud computing J Yuan, S Yu
IEEE Transactions on Parallel and Distributed Systems 25 (1), 212-221, 2013
291 2013 Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud W Sun, S Yu, W Lou, YT Hou, H Li
IEEE INFOCOM 2014-IEEE conference on computer communications, 226-234, 2014
283 2014 LT codes-based secure and reliable cloud storage service N Cao, S Yu, Z Yang, W Lou, YT Hou
2012 Proceedings IEEE Infocom, 693-701, 2012
273 2012 FDAC: Toward fine-grained distributed data access control in wireless sensor networks S Yu, K Ren, W Lou
IEEE transactions on parallel and distributed systems 22 (4), 673-686, 2010
248 2010 Multi-user broadcast authentication in wireless sensor networks K Ren, S Yu, W Lou, Y Zhang
IEEE Transactions on Vehicular Technology 58 (8), 4554-4564, 2009
242 2009 Dependable and secure sensor data storage with dynamic integrity assurance Q Wang, K Ren, S Yu, W Lou
ACM Transactions on Sensor Networks (TOSN) 8 (1), 1-24, 2011
238 2011 Secure and constant cost public cloud storage auditing with deduplication J Yuan, S Yu
2013 IEEE Conference on Communications and Network Security (CNS), 145-153, 2013
221 2013 BANA: Body area network authentication exploiting channel characteristics L Shi, M Li, S Yu, J Yuan
Proceedings of the fifth ACM conference on Security and Privacy in Wireless …, 2012
212 2012 : Privacy-Preserving Communication and Precise Reward Architecture for V2G Networks in Smart GridZ Yang, S Yu, W Lou, C Liu
IEEE Transactions on Smart Grid 2 (4), 697-706, 2011
191 2011 Proofs of retrievability with public verifiability and constant communication cost in cloud J Yuan, S Yu
Proceedings of the 2013 international workshop on Security in cloud …, 2013
188 2013 Public integrity auditing for dynamic data sharing with multiuser modification J Yuan, S Yu
IEEE Transactions on Information Forensics and Security 10 (8), 1717-1726, 2015
166 2015