An efficient certificateless aggregate signature with constant pairing computations H Xiong, Z Guan, Z Chen, F Li Information Sciences 219, 225-235, 2013 | 209 | 2013 |
Security and privacy in IoT-cloud-based e-health systems—A comprehensive review C Butpheng, KH Yeh, H Xiong Symmetry 12 (7), 1191, 2020 | 203 | 2020 |
Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks H Xiong, Z Qin IEEE transactions on information forensics and security 10 (7), 1442-1455, 2015 | 196 | 2015 |
On the design of blockchain-based ECDSA with fault-tolerant batch verification protocol for blockchain-enabled IoMT H Xiong, C Jin, M Alazab, KH Yeh, H Wang, TR Gadekallu, W Wang, C Su IEEE journal of biomedical and health informatics 26 (5), 1977-1986, 2021 | 161 | 2021 |
Efficient certificateless aggregate signature with conditional privacy preservation in IoV Q Mei, H Xiong, J Chen, M Yang, S Kumari, MK Khan IEEE Systems Journal 15 (1), 245-256, 2020 | 152 | 2020 |
Cost-Effective Scalable and Anonymous Certificateless Remote Authentication Protocol H Xiong IEEE Transactions on Information Forensics and Security 9 (12), 2327-2339, 2014 | 151 | 2014 |
Attribute-based privacy-preserving data sharing for dynamic groups in cloud computing H Xiong, H Zhang, J Sun IEEE Systems Journal 13 (3), 2739-2750, 2018 | 137 | 2018 |
Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing H Xiong, Y Zhao, L Peng, H Zhang, KH Yeh Future Generation Computer Systems 97, 453-461, 2019 | 133 | 2019 |
A survey of proxy re-encryption for secure data sharing in cloud computing Z Qin, H Xiong, S Wu, J Batamuliza IEEE Transactions on Services Computing, 2016 | 106 | 2016 |
Chaintegrity: blockchain-enabled large-scale e-voting system with robustness and universal verifiability S Zhang, L Wang, H Xiong International Journal of Information Security 19, 323-341, 2020 | 93 | 2020 |
Efficient and provably secure certificateless parallel key-insulated signature without pairing for IIoT environments H Xiong, Q Mei, Y Zhao IEEE Systems Journal 14 (1), 310-320, 2019 | 92 | 2019 |
Lightweight and privacy-aware fine-grained access control for IoT-oriented smart health J Sun, H Xiong, X Liu, Y Zhang, X Nie, RH Deng IEEE Internet of Things Journal 7 (7), 6566-6575, 2020 | 86 | 2020 |
Ciphertext-policy attribute-based encryption with delegated equality test in cloud computing Q Wang, L Peng, H Xiong, J Sun, Z Qin IEEE Access 6, 760-771, 2017 | 84 | 2017 |
A secure and privacy-preserving mobile wallet with outsourced verification in cloud computing Z Qin, J Sun, A Wahaballa, W Zheng, H Xiong, Z Qin Computer Standards & Interfaces 54, 55-60, 2017 | 83 | 2017 |
Efficient and spontaneous privacy-preserving protocol for secure vehicular communication H Xiong, K Beznosov, Z Qin, M Ripeanu 2010 IEEE International Conference on Communications, 1-6, 2010 | 82 | 2010 |
An improved certificateless signature scheme secure in the standard model H Xiong, Z Qin, F Li Fundamenta Informaticae 88 (1-2), 193-206, 2008 | 80 | 2008 |
Heterogeneous signcryption with equality test for IIoT environment H Xiong, Y Zhao, Y Hou, X Huang, C Jin, L Wang, S Kumari IEEE Internet of Things Journal 8 (21), 16142-16152, 2020 | 79 | 2020 |
Efficient and privacy-preserving authentication protocol for heterogeneous systems in IIoT H Xiong, Y Wu, C Jin, S Kumari IEEE Internet of Things Journal 7 (12), 11713-11724, 2020 | 71 | 2020 |
Conditional privacy-preserving authentication protocol with dynamic membership updating for VANETs H Xiong, J Chen, Q Mei, Y Zhao IEEE Transactions on Dependable and Secure Computing 19 (3), 2089-2104, 2020 | 69 | 2020 |
Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme H Wang, Y Zhang, H Xiong, B Qin IET Information Security 6 (1), 20-27, 2012 | 67 | 2012 |