Seguir
Chunpeng Ge
Chunpeng Ge
University of Wollongong, Research Fellow
Email confirmado em uow.edu.au
Título
Citado por
Citado por
Ano
Public key encryption with keyword search secure against keyword guessing attacks without random oracle
L Fang, W Susilo, C Ge, J Wang
Information Sciences 238, 221-241, 2013
2252013
A secure channel free public key encryption with keyword search scheme without random oracle
L Fang, W Susilo, C Ge, J Wang
International Conference on Cryptology and Network Security, 248-258, 2009
1012009
Revocable identity-based broadcast proxy re-encryption for data sharing in clouds
C Ge, Z Liu, J Xia, L Fang
IEEE Transactions on Dependable and Secure Computing 18 (3), 1214-1226, 2019
722019
Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search
L Fang, W Susilo, C Ge, J Wang
Theoretical Computer Science 462, 39-58, 2012
612012
Secure keyword search and data sharing mechanism for cloud computing
C Ge, W Susilo, Z Liu, J Xia, P Szalachowski, L Fang
IEEE Transactions on Dependable and Secure Computing 18 (6), 2787-2800, 2020
522020
A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system
C Ge, W Susilo, L Fang, J Wang, Y Shi
Designs, Codes and Cryptography 86 (11), 2587-2603, 2018
512018
Interactive conditional proxy re-encryption with fine grain policy
L Fang, W Susilo, C Ge, J Wang
Journal of Systems and Software 84 (12), 2293-2302, 2011
402011
A proxy broadcast re-encryption for cloud data sharing
M Sun, C Ge, L Fang, J Wang
Multimedia Tools and Applications 77 (9), 10455-10469, 2018
372018
Identity-based conditional proxy re-encryption with fine grain policy
C Ge, W Susilo, J Wang, L Fang
Computer Standards & Interfaces 52, 1-9, 2017
342017
Revocable Attribute-Based Encryption with Data Integrity in Clouds
C Ge, W Susilo, J Baek, Z Liu, J Xia, L Fang
IEEE Transactions on Dependable and Secure Computing, 2021
302021
A semi-autonomous distributed blockchain-based framework for UAVs system
C Ge, X Ma, Z Liu
Journal of Systems Architecture 107, 101728, 2020
292020
A key-policy attribute-based proxy re-encryption without random oracles
C Ge, W Susilo, J Wang, Z Huang, L Fang, Y Ren
The Computer Journal 59 (7), 970-982, 2016
282016
A blockchain based decentralized data security mechanism for the Internet of Things
C Ge, Z Liu, L Fang
Journal of Parallel and Distributed Computing 141, 1-9, 2020
252020
Fuzzy conditional proxy re-encryption
LM Fang, JD Wang, CP Ge, YJ Ren
Science China Information Sciences 56 (5), 1-13, 2013
252013
A Verifiable and Fair Attribute-based Proxy Re-encryption Scheme for Data Sharing in Clouds
C Ge, W Susilo, J Baek, Z Liu, J Xia, L Fang
IEEE Transactions on Dependable and Secure Computing, 2021
242021
Hierarchical conditional proxy re-encryption
L Fang, W Susilo, C Ge, J Wang
Computer Standards & Interfaces 34 (4), 380-389, 2012
222012
A CCA-secure multi-conditional proxy broadcast re-encryption scheme for cloud storage system
Y Liu, Y Ren, C Ge, J Xia, Q Wang
Journal of Information Security and Applications 47, 125-131, 2019
192019
Decryptable Public Key Encryption with Keyword Search Schemes.
L Fang, J Wang, C Ge, Y Ren
J. Digit. Content Technol. its Appl. 4 (9), 141-150, 2010
192010
A privacy preserve big data analysis system for wearable wireless sensor network
C Ge, C Yin, Z Liu, L Fang, J Zhu, H Ling
Computers & Security 96, 101887, 2020
182020
Y-DWMS: A Digital Watermark Management System Based on Smart Contracts
B Zhao, L Fang, H Zhang, C Ge, W Meng, L Liu, C Su
Sensors 19 (14), 3091, 2019
182019
O sistema não pode efectuar a operação agora. Tente novamente mais tarde.
Artigos 1–20