A survey on the security of blockchain systems X Li, P Jiang, T Chen, X Luo, Q Wen Future generation computer systems 107, 841-853, 2020 | 1901 | 2020 |
Searchain: Blockchain-based private keyword search in decentralized storage P Jiang, F Guo, K Liang, J Lai, Q Wen Future Generation Computer Systems 107, 781-792, 2020 | 132 | 2020 |
An anonymous and efficient remote biometrics user authentication scheme in a multi server environment P Jiang, Q Wen, W Li, Z Jin, H Zhang Frontiers of Computer Science 9, 142-156, 2015 | 38 | 2015 |
EACSIP: Extendable access control system with integrity protection for enhancing collaboration in the cloud W Susilo, P Jiang, F Guo, G Yang, Y Yu, Y Mu IEEE Transactions on Information Forensics and Security 12 (12), 3110-3122, 2017 | 30 | 2017 |
Sanitizable access control system for secure cloud storage against malicious data publishers W Susilo, P Jiang, J Lai, F Guo, G Yang, RH Deng IEEE Transactions on Dependable and Secure Computing 19 (3), 2138-2148, 2021 | 27 | 2021 |
Blockchain-enabled data provenance in cloud datacenter reengineering H Li, K Gai, Z Fang, L Zhu, L Xu, P Jiang Proceedings of the 2019 ACM International Symposium on Blockchain and Secure …, 2019 | 23 | 2019 |
Public key encryption with authorized keyword search P Jiang, Y Mu, F Guo, Q Wen Information Security and Privacy: 21st Australasian Conference, ACISP 2016 …, 2016 | 23 | 2016 |
Efficient identity-based broadcast encryption with keyword search against insider attacks for database systems P Jiang, F Guo, Y Mu Theoretical Computer Science 767, 51-72, 2019 | 22 | 2019 |
Edge computing and lightning network empowered secure food supply management K Gai, Z Fang, R Wang, L Zhu, P Jiang, KKR Choo IEEE Internet of Things Journal 9 (16), 14247-14259, 2020 | 21 | 2020 |
Private keyword-search for database systems against insider attacks P Jiang, Y Mu, F Guo, QY Wen Journal of Computer Science and Technology 32, 599-617, 2017 | 21 | 2017 |
Online/offline ciphertext retrieval on resource constrained devices P Jiang, Y Mu, F Guo, X Wang, Q Wen The Computer Journal 59 (7), 955-969, 2016 | 20 | 2016 |
Blockchain meets covert communication: A survey Z Chen, L Zhu, P Jiang, C Zhang, F Gao, J He, D Xu, Y Zhang IEEE Communications Surveys & Tutorials 24 (4), 2163-2192, 2022 | 19 | 2022 |
Encryption switching service: Securely switch your encrypted data to another format P Jiang, J Ning, K Liang, C Dong, J Chen, Z Cao IEEE Transactions on Services Computing 14 (5), 1357-1369, 2018 | 16 | 2018 |
Identity-based broadcast encryption for inner products J Lai, Y Mu, F Guo, P Jiang, S Ma The Computer Journal 61 (8), 1240-1251, 2018 | 16 | 2018 |
Privacy-enhanced attribute-based private information retrieval J Lai, Y Mu, F Guo, P Jiang, W Susilo Information sciences 454, 275-291, 2018 | 16 | 2018 |
Data access control in cloud computing: Flexible and receiver extendable J Lai, F Guo, W Susilo, X Huang, P Jiang, F Zhang IEEE Transactions on Services Computing 15 (5), 2658-2670, 2021 | 14 | 2021 |
SearchBC: A blockchain-based PEKS framework for IoT services P Jiang, B Qiu, L Zhu, K Gai IEEE Internet of Things Journal 8 (6), 5031-5044, 2020 | 12 | 2020 |
Accelerating decentralized and partial-privacy data access for VANET via online/offline functional encryption C Yang, P Jiang, L Zhu IEEE Transactions on Vehicular Technology 71 (8), 8944-8954, 2022 | 11 | 2022 |
Reputation-based trustworthy supply chain management using smart contract H Li, K Gai, L Zhu, P Jiang, M Qiu Algorithms and Architectures for Parallel Processing: 20th International …, 2020 | 11 | 2020 |
An anonymous user authentication with key agreement scheme without pairings for multiserver architecture using SCPKs P Jiang, Q Wen, W Li, Z Jin, H Zhang The Scientific World Journal 2013, 2013 | 11 | 2013 |