20132018
If you made any changes in Pure these will be visible here soon.

Research Output 2013 2018

Filter
Article
2017

Public key encryption resilient to leakage and tampering attacks

Sun, S-F., Gu, D., Parampalli, U., Yu, Y. & Qin, B., 1 Nov 2017, In : Journal of Computer and System Sciences. 89, p. 142-156 15 p.

Research output: Contribution to journalArticleResearchpeer-review

Related-key secure key encapsulation from extended computational bilinear Diffie–Hellman

Qin, B., Liu, S., Sun, S., Deng, R. H. & Gu, D., 1 Sep 2017, In : Information Sciences. 406-407, p. 1-11 11 p.

Research output: Contribution to journalArticleResearchpeer-review

2016

Efficient chosen ciphertext secure identity-based encryption against key leakage attacks

Sun, S-F., Gu, D. & Liu, S., 25 Jul 2016, In : Security and Communication Networks. 9, 11, p. 1417-1434 18 p.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File

Privacy-preserving data sharing scheme over cloud for social applications

Lyu, C., Sun, S-F., Zhang, Y., Pande, A., Lu, H. & Gu, D., 1 Oct 2016, In : Journal of Network and Computer Applications. 74, p. 44-55 12 p.

Research output: Contribution to journalArticleResearchpeer-review

Public key cryptosystems secure against memory leakage attacks

Sun, S-F., Han, S., Gu, D. & Liu, S., 1 Nov 2016, In : IET Information Security. 10, 6, p. 403-412 10 p.

Research output: Contribution to journalArticleResearchpeer-review

RKA-secure public key encryptions against efficiently invertible functions

Sun, S-F., Liu, J. K., Yu, Y., Qin, B. & Gu, D., 2016, In : Computer Journal. 59, 11, p. 1637-1658 22 p.

Research output: Contribution to journalArticleResearchpeer-review

2015

Fully secure wicked identity-based encryption against key leakage attacks

Sun, S-F., Gu, D. & Huang, Z., Oct 2015, In : Computer Journal. 58, 10, p. 2520-2536 17 p.

Research output: Contribution to journalArticleResearchpeer-review

SGOR: secure and scalable geographic opportunistic routing with received signal strength in WSNs

Lyu, C., Gu, D., Zhang, X., Sun, S., Zhang, Y. & Pande, A., 15 Mar 2015, In : Computer Communications. 59, p. 37-51 15 p.

Research output: Contribution to journalArticleResearchpeer-review

Towards efficient, secure, and fine-grained access control system in MSNs with flexible revocations

Sun, S-F., Lyu, C., Gu, D., Zhang, Y. & Ren, Y., 2015, In : International Journal of Distributed Sensor Networks. 2015, 15 p., 857405.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File