Name
Affiliation
Papers
YINGHUI ZHANG
State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi'an, P.R. China
62
Collaborators
Citations 
PageRank 
105
468
28.80
Referers 
Referees 
References 
1028
1011
840
Search Limit
1001000
Title
Citations
PageRank
Year
A Novel PUF-Based Group Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks00.342022
Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing40.372022
Secure Similarity Search Over Encrypted Non-Uniform Datasets00.342022
Dual Access Control for Cloud-Based Data Storage and Sharing20.362022
Efficient Attribute-Based Encryption With Repeated Attributes Optimization00.342021
Robust and Universal Seamless Handover Authentication in 5G HetNets20.352021
O-R-CP-ABE: An Efficient and Revocable Attribute-Based Encryption Scheme in the Cloud-Assisted IoMT System20.362021
Secure Collaborative Deep Learning Against GAN Attacks in the Internet of Things20.352021
CPPHA: Capability-Based Privacy-Protection Handover Authentication Mechanism for SDN-Based 5G HetNets00.342021
Flexible And Anonymous Network Slicing Selection For C-Ran Enabled 5g Service Authentication00.342021
On the Security of Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-Owner Setting00.342021
Outsourcing Service Fair Payment Based on Blockchain and Its Applications in Cloud Computing30.402021
Efficient Privacy-Preserving Authentication For V2g Networks00.342021
Secure and verifiable outsourced data dimension reduction on dynamic data00.342021
Lightweight and Privacy-Aware Fine-Grained Access Control for IoT-oriented Smart Health60.422020
An attribute-based encryption scheme with multiple authorities on hierarchical personal health record in cloud20.382020
Attribute-based Encryption for Cloud Computing Access Control: A Survey30.362020
Revocable and certificateless public auditing for cloud storage00.342020
Catch You If You Deceive Me: Verifiable and Privacy-Aware Truth Discovery in Crowdsensing Systems20.362020
LSAA: A Lightweight and Secure Access Authentication Scheme for both UEs and mMTC Devices in 5G Networks20.372020
An Efficient Mobile Location-based Service Framework for Resource-constrained Devices.00.342020
Efficient ciphertext-policy attribute-based encryption with blackbox traceability10.352020
Comments on “A Large-Scale Concurrent Data Anonymous Batch Verification Scheme for Mobile Healthcare Crowd Sensing”00.342019
DABKE: Secure deniable attribute-based key exchange framework.00.342019
Certificateless Multi-Party Authenticated Encryption For Nb-Iot Terminals In 5g Networks10.362019
Sybsub: Privacy-Preserving Expressive Task Subscription With Sybil Detection In Crowdsourcing00.342019
Generic Construction Of Elgamal-Type Attribute-Based Encryption Schemes With Revocability And Dual-Policy00.342019
PPSHA: Privacy preserving secure handover authentication scheme for all application scenarios in LTE-A networks.00.342019
Efficient and Robust Certificateless Signature for Data Crowdsensing in Cloud-assisted Industrial IoT30.392019
Secure attribute-based data sharing for resource-limited users in cloud computing.1122.062018
A Secure and Privacy-Aware Smart Health System with Secret Key Leakage Resilience.30.362018
Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control.451.002018
TKSE: Trustworthy Keyword Search Over Encrypted Data With Two-Side Verifiability via Blockchain.90.442018
Efficient and robust attribute-based encryption supporting access policy hiding in Internet of Things.30.372018
Efficient and secure big data storage system with leakage resilience in cloud computing.70.412018
Blockchain based efficient and robust fair payment for outsourcing services in cloud computing.190.882018
Privacy-preserving communication and power injection over vehicle networks and 5G smart grid slice.70.412018
SybMatch: Sybil Detection for Privacy-Preserving Task Matching in Crowdsourcing00.342018
Privacy-Preserving Data Aggregation against False Data Injection Attacks in Fog Computing.00.342018
Dual-side privacy-preserving task matching for spatial crowdsourcing.00.342018
Smart Grid Power Trading Based on Consortium Blockchain in Internet of Things.00.342018
Privacy-Aware Data Collection and Aggregation in IoT Enabled Fog Computing.10.342018
Secure and fine-grained access control on e-healthcare records in mobile cloud computing.170.652018
Secure smart health with privacy-aware aggregate authentication and access control in Internet of Things.20.382018
Secure Deduplication Based on Rabin Fingerprinting over Wireless Sensing Data in Cloud Computing.10.352018
Efficient and Privacy-Aware Power Injection over AMI and Smart Grid Slice in Future 5G Networks.70.462017
Towards privacy protection and malicious behavior traceability in smart health.40.382017
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing.741.652017
Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures.20.362016
Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing.100.462016
  • 1
  • 2