Efficient compressed ciphertext length scheme using multi-authority CP-ABE for hierarchical attributes Z Zhang, C Li, BB Gupta, D Niu IEEE Access 6, 38273-38284, 2018 | 29 | 2018 |
A novel authorization scheme for multimedia social networks under cloud storage method by using MA-CP-ABE C Li, Z Zhang, L Zhang International Journal of Cloud Applications and Computing (IJCAC) 8 (3), 32-47, 2018 | 27 | 2018 |
Achieving privacy-preserving sensitive attributes for large universe based on private set intersection L Yang, C Li, Y Cheng, S Yu, J Ma Information Sciences 582, 529-546, 2022 | 7 | 2022 |
A novel attribute-based access control model for multimedia social networks. Z Zhang, L Han, C Li, J Wang Neural Network World, 2016 | 7 | 2016 |
SEMMI: Multi-party security decision-making scheme for linear functions in the internet of medical things C Li, L Yang, S Yu, W Qin, J Ma Information Sciences 612, 151-167, 2022 | 5 | 2022 |
Vacuum: Efficient and Assured Deletion Scheme for User Sensitive Data on Mobile Devices L Yang, C Li, T Wei, F Zhang, J Ma, N Xiong IEEE Internet of Things Journal 9 (12), 10093-10107, 2021 | 4 | 2021 |
A secure and verifiable outsourcing scheme for assisting mobile device training machine learning model C Li, L Yang, J Ma Wireless Communications and Mobile Computing 2020, 1-16, 2020 | 2 | 2020 |
SEMMI: Multi-party Security Decision-making Scheme Under the Internet of Medical Things C Li, L Yang, S Yu, W Qin, J Ma ICC 2022-IEEE International Conference on Communications, 2792-2797, 2022 | 1 | 2022 |
A Secure and Verifiable Outsourcing Scheme for Machine Learning Data C Li, L Yang, J Ma International Conference on Security and Privacy in New Computing …, 2020 | 1 | 2020 |
Multimedia Social Network Authorization Scheme of Comparison-based Encryption. C Li, Z Zhang, G Chang Int. J. Netw. Secur. 21 (1), 137-144, 2019 | | 2019 |