Design of a secure medical data sharing scheme based on blockchain X Cheng, F Chen, D Xie, H Sun, C Huang Journal of medical systems 44 (2), 52, 2020 | 141 | 2020 |
An efficient certificateless aggregate signature scheme for blockchain-based medical cyber physical systems H Shu, P Qi, Y Huang, F Chen, D Xie, L Sun Sensors 20 (5), 1521, 2020 | 63 | 2020 |
Semi-tensor compressed sensing D Xie, H Peng, L Li, Y Yang Digital Signal Processing 58, 85-92, 2016 | 60 | 2016 |
Medical cyber–physical systems: A solution to smart health and the state of the art F Chen, Y Tang, C Wang, J Huang, C Huang, D Xie, T Wang, C Zhao IEEE Transactions on Computational Social Systems 9 (5), 1359-1386, 2021 | 40 | 2021 |
Robust and efficient biometrics based password authentication scheme for telecare medicine information systems using extended chaotic maps Y Lu, L Li, H Peng, D Xie, Y Yang Journal of medical systems 39, 1-10, 2015 | 30 | 2015 |
A secure and efficient scalable secret image sharing scheme with flexible shadow sizes D Xie, L Li, H Peng, Y Yang Plos one 12 (1), e0168674, 2017 | 28 | 2017 |
An efficient privacy-preserving scheme for secure network coding based on compressed sensing D Xie, H Peng, L Li, Y Yang AEU-International Journal of Electronics and Communications 79, 33-42, 2017 | 25 | 2017 |
Blockchain-based efficient device authentication protocol for medical cyber-physical systems F Chen, Y Tang, X Cheng, D Xie, T Wang, C Zhao Security and Communication Networks 2021, 1-13, 2021 | 21 | 2021 |
One-to-many image encryption with privacy-preserving homomorphic outsourced decryption based on compressed sensing D Xie, F Chen, Y Luo, L Li Digital Signal Processing 95, 102587, 2019 | 17 | 2019 |
A multi-party secure encryption-sharing hybrid scheme for image data base on compressed sensing B Wu, D Xie, F Chen, X Wang, Y Zeng Digital Signal Processing 123, 103391, 2022 | 15 | 2022 |
Data access control based on blockchain in medical cyber physical systems F Chen, J Huang, C Wang, Y Tang, C Huang, D Xie, T Wang, C Zhao Security and Communication Networks 2021, 1-14, 2021 | 15 | 2021 |
Blockchain-based secure authentication scheme for medical data sharing X Cheng, F Chen, D Xie, H Sun, C Huang, Z Qi International Conference of Pioneering Computer Scientists, Engineers and …, 2019 | 14 | 2019 |
Public key image encryption based on compressed sensing D Xie IEEE Access 7, 131672-131680, 2019 | 11 | 2019 |
An aggregate signature scheme based on a trapdoor hash function for the internet of things H Shu, F Chen, D Xie, L Sun, P Qi, Y Huang Sensors 19 (19), 4239, 2019 | 9 | 2019 |
Homomorphic signatures from chameleon hash functions D Xie, H Peng, L Li, Y Yang Information Technology and Control 46 (2), 274-286, 2017 | 9 | 2017 |
Efficient post-quantum secure network coding signatures in the standard model D Xie, HP Peng, L Li, Y Yang KSII Transactions on Internet and Information Systems (TIIS) 10 (5), 2427-2445, 2016 | 7 | 2016 |
Pairing-free for public key encryption with equality test scheme H Zhu, L Wang, H Ahmad, D Xie IEEE Access 9, 77239-77249, 2021 | 4 | 2021 |
An improved identity-based anonymous authentication scheme resistant to semi-trusted server attacks D Xie, J Yang, W Bian, F Chen, T Wang IEEE Internet of Things Journal 10 (1), 734-746, 2022 | 3 | 2022 |
PHISS: Progressive and hierarchical image segmentation-sharing scheme X Wang, D Xie, F Chen, H Zhu, T Wang Digital Signal Processing 129, 103640, 2022 | 3 | 2022 |
Progressive and multi-level secret image sharing scheme with hierarchical shadows X Wang, D Xie, F Chen, B Wu, Y Zen Multimedia Tools and Applications 81 (21), 31039-31059, 2022 | 3 | 2022 |