20132019
If you made any changes in Pure these will be visible here soon.

Research Output 2013 2019

Filter
Article
2019

Enabling authorized encrypted search for multi-authority medical databases

Xu, L., Sun, S., Yuan, X., Liu, J. K., Zuo, C. & Chungen, X., 18 Mar 2019, (Accepted/In press) In : IEEE Transactions on Emerging Topics in Computing. 12 p.

Research output: Contribution to journalArticleResearchpeer-review

2017

Public key encryption resilient to leakage and tampering attacks

Sun, S-F., Gu, D., Parampalli, U., Yu, Y. & Qin, B., 1 Nov 2017, In : Journal of Computer and System Sciences. 89, p. 142-156 15 p.

Research output: Contribution to journalArticleResearchpeer-review

Related-key secure key encapsulation from extended computational bilinear Diffie–Hellman

Qin, B., Liu, S., Sun, S., Deng, R. H. & Gu, D., 1 Sep 2017, In : Information Sciences. 406-407, p. 1-11 11 p.

Research output: Contribution to journalArticleResearchpeer-review

2016

Efficient chosen ciphertext secure identity-based encryption against key leakage attacks

Sun, S-F., Gu, D. & Liu, S., 25 Jul 2016, In : Security and Communication Networks. 9, 11, p. 1417-1434 18 p.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File

Privacy-preserving data sharing scheme over cloud for social applications

Lyu, C., Sun, S-F., Zhang, Y., Pande, A., Lu, H. & Gu, D., 1 Oct 2016, In : Journal of Network and Computer Applications. 74, p. 44-55 12 p.

Research output: Contribution to journalArticleResearchpeer-review

Public key cryptosystems secure against memory leakage attacks

Sun, S-F., Han, S., Gu, D. & Liu, S., 1 Nov 2016, In : IET Information Security. 10, 6, p. 403-412 10 p.

Research output: Contribution to journalArticleResearchpeer-review

RKA-secure public key encryptions against efficiently invertible functions

Sun, S-F., Liu, J. K., Yu, Y., Qin, B. & Gu, D., 2016, In : Computer Journal. 59, 11, p. 1637-1658 22 p.

Research output: Contribution to journalArticleResearchpeer-review

2015

Fully secure wicked identity-based encryption against key leakage attacks

Sun, S-F., Gu, D. & Huang, Z., Oct 2015, In : Computer Journal. 58, 10, p. 2520-2536 17 p.

Research output: Contribution to journalArticleResearchpeer-review

SGOR: secure and scalable geographic opportunistic routing with received signal strength in WSNs

Lyu, C., Gu, D., Zhang, X., Sun, S., Zhang, Y. & Pande, A., 15 Mar 2015, In : Computer Communications. 59, p. 37-51 15 p.

Research output: Contribution to journalArticleResearchpeer-review

Towards efficient, secure, and fine-grained access control system in MSNs with flexible revocations

Sun, S-F., Lyu, C., Gu, D., Zhang, Y. & Ren, Y., 2015, In : International Journal of Distributed Sensor Networks. 2015, 15 p., 857405.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File