Secure deduplication with efficient and reliable convergent key management J Li, X Chen, M Li, J Li, PPC Lee, W Lou IEEE transactions on parallel and distributed systems 25 (6), 1615-1625, 2013 | 785 | 2013 |
Securely outsourcing attribute-based encryption with checkability J Li, X Huang, J Li, X Chen, Y Xiang IEEE Transactions on Parallel and Distributed Systems 25 (8), 2201-2210, 2013 | 488 | 2013 |
Identity-based encryption with outsourced revocation in cloud computing J Li, J Li, X Chen, C Jia, W Lou IEEE Transactions on computers 64 (2), 425-437, 2013 | 442 | 2013 |
Secure auditing and deduplicating data in cloud J Li, J Li, D Xie, Z Cai IEEE Transactions on Computers 65 (8), 2386-2396, 2015 | 204 | 2015 |
Fine-grained access control system based on outsourced attribute-based encryption J Li, X Chen, J Li, C Jia, J Ma, W Lou Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013 | 197 | 2013 |
Outsourcing encryption of attribute-based encryption with mapreduce J Li, C Jia, J Li, X Chen Information and Communications Security: 14th International Conference …, 2012 | 156 | 2012 |
Secure outsourced attribute-based signatures X Chen, J Li, X Huang, J Li, Y Xiang, DS Wong IEEE transactions on parallel and distributed systems 25 (12), 3285-3294, 2014 | 146 | 2014 |
CDStore: Toward Reliable, Secure, and Cost-Efficient Cloud Storage via Convergent Dispersal M Li, C Qin, J Li, PPC Lee IEEE Internet Computing 20 (3), 45-53, 2016 | 134 | 2016 |
Designing cloud-based electronic health record system with attribute-based encryption F Xhafa, J Li, G Zhao, J Li, X Chen, DS Wong Multimedia tools and applications 74, 3441-3458, 2015 | 91 | 2015 |
Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid Cloud J Li, J Li, X Chen, C Jia, Z Liu Network and System Security, 490-502, 2012 | 77 | 2012 |
Rekeying for encrypted deduplication storage J Li, C Qin, PPC Lee, J Li 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems …, 2016 | 70 | 2016 |
The design and implementation of a rekeying-aware encrypted deduplication storage system C Qin, J Li, PPC Lee ACM Transactions on Storage (TOS) 13 (1), 1-30, 2017 | 51 | 2017 |
Privacy-preserving data utilization in hybrid clouds J Li, J Li, X Chen, Z Liu, C Jia Future Generation Computer Systems 30, 98-106, 2014 | 48 | 2014 |
Towards privacy-preserving storage and retrieval in multiple clouds J Li, D Lin, AC Squicciarini, J Li, C Jia IEEE Transactions on Cloud Computing 5 (3), 499-509, 2015 | 47 | 2015 |
Survey on the searchable encryption J Li, CF Jia, Z Liu, J Li, M Li Journal of Software 26 (1), 109-128, 2015 | 42 | 2015 |
Format-preserving encryption for datetime Z Liu, C Jia, J Li, X Cheng 2010 IEEE International Conference on Intelligent Computing and Intelligent …, 2010 | 42 | 2010 |
Balancing storage efficiency and data confidentiality with tunable encrypted deduplication J Li, Z Yang, Y Ren, PPC Lee, X Zhang Proceedings of the Fifteenth European Conference on Computer Systems, 1-15, 2020 | 38 | 2020 |
可搜索加密技术研究综述 李经纬, 贾春福, 刘哲理, 李进, 李敏 软件学报 1, 2015 | 38 | 2015 |
Enabling efficient and secure data sharing in cloud computing J Li, J Li, Z Liu, C Jia Concurrency and computation: practice and experience 26 (5), 1052-1066, 2014 | 35 | 2014 |
Information leakage in encrypted deduplication via frequency analysis J Li, C Qin, PPC Lee, X Zhang 2017 47th Annual IEEE/IFIP international conference on dependable systems …, 2017 | 33 | 2017 |