Secure key distribution for the smart grid J Xia, Y Wang IEEE Transactions on Smart Grid 3 (3), 1437-1443, 2012 | 222 | 2012 |
Revocable identity-based broadcast proxy re-encryption for data sharing in clouds C Ge, Z Liu, J Xia, L Fang IEEE Transactions on Dependable and Secure Computing 18 (3), 1214-1226, 2019 | 109 | 2019 |
Secure keyword search and data sharing mechanism for cloud computing C Ge, W Susilo, Z Liu, J Xia, P Szalachowski, L Fang IEEE Transactions on Dependable and Secure Computing 18 (6), 2787-2800, 2020 | 86 | 2020 |
Revocable attribute-based encryption with data integrity in clouds C Ge, W Susilo, J Baek, Z Liu, J Xia, L Fang IEEE Transactions on Dependable and Secure Computing 19 (5), 2864-2872, 2021 | 71 | 2021 |
A verifiable and fair attribute-based proxy re-encryption scheme for data sharing in clouds C Ge, W Susilo, J Baek, Z Liu, J Xia, L Fang IEEE Transactions on Dependable and Secure Computing 19 (5), 2907-2919, 2021 | 49 | 2021 |
A CCA-secure multi-conditional proxy broadcast re-encryption scheme for cloud storage system Y Liu, Y Ren, C Ge, J Xia, Q Wang Journal of Information Security and Applications 47, 125-131, 2019 | 25 | 2019 |
Quantum communication networks and trust management: a survey S Zhang, Y Chang, L Yan, Z Sheng, F Yang, G Han, Y Huang, J Xia Comput. Mater. Continua 61 (3), 1145-1174, 2019 | 22 | 2019 |
A physiological and behavioral feature authentication scheme for medical cloud based on fuzzy-rough core vector machine L Fang, C Yin, L Zhou, Y Li, C Su, J Xia Information Sciences 507, 143-160, 2020 | 21 | 2020 |
Task-attribute-based access control scheme for iot via blockchain H Chen, W Wan, J Xia, S Zhang, J Zhang, X Peng, X Fan CMC-COMPUTERS MATERIALS & CONTINUA 65 (3), 2441-2453, 2020 | 16 | 2020 |
Chosen ciphertext secure fuzzy identity based encryption without ROM L Fang, J Wang, Y Ren, J Xia, S Bian Journal of Shanghai Jiaotong University (Science) 13, 646-650, 2008 | 14* | 2008 |
A cluster correlation power analysis against double blinding exponentiation W Wan, J Chen, S Zhang, J Xia Journal of Information Security and Applications 48, 102357, 2019 | 12 | 2019 |
Blockchain Queuing Model with Non-Preemptive Limited-Priority. T Li, Y Ren, J Xia Intelligent Automation & Soft Computing 26 (5), 2020 | 11 | 2020 |
Instructor perspectives on comparative Heatmap visualizations of student engagement with lecture video J Xia, DC Wilson Proceedings of the 49th ACM Technical Symposium on Computer Science …, 2018 | 11 | 2018 |
Full security: Fuzzy identity based encryption L Fang, J Xia Cryptology ePrint Archive, 2008 | 11 | 2008 |
Long-term preservation of electronic record based on digital continuity in smart cities Y Ren, K Zhu, Y Gao, J Xia, S Zhou, R Hu, X Feng CMC-COMPUTERS MATERIALS & CONTINUA 66 (3), 3271-3287, 2021 | 9 | 2021 |
A new user behavior evaluation method in online social network M Yang, S Zhang, H Zhang, J Xia Journal of Information Security and Applications 47, 217-222, 2019 | 9 | 2019 |
Formal proof of relative strength of security among ECK2007 model and other proof models for key agreement protocols JY Xia, JD Wang, LM Fang, YJ Ren, SZ Bian Transactions of Nanjing University of Aeronautics & Astronautics 25 (4), 282-288, 2008 | 9* | 2008 |
A secure signcryption scheme for electronic health records sharing in blockchain X Peng, J Zhang, S Zhang, W Wan, H Chen, J Xia Computer Systems Science and Engineering 37 (2), 265-281, 2021 | 7 | 2021 |
A face recognition algorithm based on LBP-EHMM T Li, L Wang, Y Chen, Y Ren, L Wang, J Xia Journal of Artificial Intelligence 1 (2), 59, 2019 | 7 | 2019 |
A source hiding identity-based proxy reencryption scheme for wireless sensor network C Ge, J Xia, A Wu, H Li, Y Wang Security and Communication Networks 2018, 2018 | 6 | 2018 |