Search filters

List of works by Hu Xiong

A Robust and Anonymous Two Factor Authentication and Key Agreement Protocol for Telecare Medicine Information Systems.

scientific article published on 15 September 2016

A Survey of Group Key Agreement Protocols with Constant Rounds

scientific article published in 2020

A Survey of Public-Key Encryption With Search Functionality for Cloud-Assisted IoT

scientific article published in 2022

Attribute-Hiding Predicate Encryption With Equality Test in Cloud Computing

scientific article published in 2018

Burn After Reading: Adaptively Secure Puncturable Identity-Based Proxy Re-Encryption Scheme for Securing Group Message

scientific article published in 2022

Certificate-Based Parallel Key-Insulated Aggregate Signature Against Fully Chosen Key Attacks for Industrial Internet of Things

scientific article published in 2021

Ciphertext-Policy Attribute-Based Encryption With Delegated Equality Test in Cloud Computing

scientific article published in 2018

Ciphertext-Policy Attribute-Based Signcryption With Verifiable Outsourced Designcryption for Sharing Personal Health Records

scientific article published in 2018

Comment on “Achieving Secure, Universal, and Fine-Grained Query Results Verification for Secure Search Scheme Over Encrypted Cloud Data”

scientific article published in 2021

Comments on “Circuit ciphertext-policy attribute-based hybrid encryption with verifiable delegation”

scientific article published in 2017

Conditional Privacy-Preserving Authentication Protocol With Dynamic Membership Updating for VANETs

scientific article published in 2022

Cryptographic Solutions for Cloud Storage: Challenges and Research Opportunities

scientific article published in 2022

Efficient and Privacy-Enhanced Asynchronous Federated Learning for Multimedia Data in Edge-based IoT

scientific article published on 16 August 2024

Efficient and Privacy-Preserving Authentication Protocol for Heterogeneous Systems in IIoT

scientific article published in 2020

Expressive Data Sharing and Self-Controlled Fine-Grained Data Deletion in Cloud-Assisted IoT

scientific article published in 2022

FABRIC: Fast and Secure Unbounded Cross-System Encrypted Data Sharing in Cloud Computing

scientific article published in 2023

Heterogeneous Signcryption With Equality Test for IIoT Environment

scientific article published in 2021

Lightweight and Privacy-Aware Fine-Grained Access Control for IoT-Oriented Smart Health

scientific article published in 2020

Mobile access and flexible search over encrypted cloud data in heterogeneous systems

scientific article published in 2020

Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing

scientific article published in 2019

Privacy-Preserving Data Aggregation Protocol for Fog Computing-Assisted Vehicle-to-Infrastructure Scenario

scientific article published in 2018

Scalable and Revocable Attribute-Based Data Sharing With Short Revocation List for IIoT

scientific article published in 2023

Secure and Authenticated Data Access and Sharing Model for Smart Wearable Systems

scientific article published in 2022

Server-Aided Attribute-Based Signature Supporting Expressive Access Structures for Industrial Internet of Things

scientific article published in 2020

Unbounded and Efficient Revocable Attribute-Based Encryption With Adaptive Security for Cloud-Assisted Internet of Things

scientific article published in 2022

When Federated Learning Meets Privacy-Preserving Computation

scientific article published on 22 July 2024