When private set intersection meets big data: an efficient and scalable protocol C Dong, L Chen, Z Wen Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 504 | 2013 |
Shared and searchable encrypted data for untrusted servers C Dong, G Russello, N Dulay Journal of Computer Security 19 (3), 367-397, 2011 | 323 | 2011 |
Betrayal, distrust, and rationality: Smart counter-collusion contracts for verifiable cloud computing C Dong, Y Wang, A Aldweesh, P McCorry, A Van Moorsel Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 215 | 2017 |
VeriFL: Communication-Efficient and Fast Verifiable Aggregation for Federated Learning X Guo, Z Liu, J Li, J Gao, B Hou, C Dong, T Baker IEEE Transactions on Information Forensics and Security 16, 1736-1751, 2020 | 202 | 2020 |
Searchable symmetric encryption with forward search privacy J Li, Y Huang, Y Wei, S Lv, Z Liu, C Dong, W Lou IEEE Transactions on Dependable and Secure Computing 18 (1), 460-474, 2019 | 196 | 2019 |
Forward private searchable symmetric encryption with optimized I/O efficiency X Song, C Dong, D Yuan, Q Xu, M Zhao IEEE Transactions on Dependable and Secure Computing 17 (5), 912-927, 2018 | 170 | 2018 |
Shared and searchable encrypted data for untrusted servers C Dong, G Russello, N Dulay IFIP Annual Conference on Data and Applications Security and Privacy, 127-143, 2008 | 164 | 2008 |
Toward a decentralized, trust-less marketplace for brokered IoT data trading using blockchain S Bajoudah, C Dong, P Missier 2019 IEEE international conference on blockchain (Blockchain), 339-346, 2019 | 92 | 2019 |
Authorisation and conflict resolution for hierarchical domains G Russello, C Dong, N Dulay Eighth IEEE International Workshop on Policies for Distributed Systems and …, 2007 | 90 | 2007 |
Efficient delegated private set intersection on outsourced private datasets A Abadi, S Terzis, R Metere, C Dong IEEE Transactions on Dependable and Secure Computing 16 (4), 608-624, 2017 | 86 | 2017 |
O-PSI: delegated private set intersection on outsourced datasets A Abadi, S Terzis, C Dong ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International …, 2015 | 79 | 2015 |
VD-PSI: verifiable delegated private set intersection on outsourced private datasets A Abadi, S Terzis, C Dong Financial Cryptography and Data Security: 20th International Conference, FC …, 2017 | 68 | 2017 |
Fair private set intersection with a semi-trusted arbiter C Dong, L Chen, J Camenisch, G Russello Data and Applications Security and Privacy XXVII: 27th Annual IFIP WG 11.3 …, 2013 | 61 | 2013 |
A fast single server private information retrieval protocol with low communication cost C Dong, L Chen Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014 | 58 | 2014 |
Differentially private byzantine-robust federated learning X Ma, X Sun, Y Wu, Z Liu, X Chen, C Dong IEEE Transactions on Parallel and Distributed Systems 33 (12), 3690-3701, 2022 | 51 | 2022 |
Approximating private set union/intersection cardinality with logarithmic complexity C Dong, G Loukides IEEE Transactions on Information Forensics and Security 12 (11), 2792-2806, 2017 | 49 | 2017 |
Consent-based workflows for healthcare management G Russello, C Dong, N Dulay Policies for Distributed Systems and Networks, 2008. POLICY 2008. IEEE …, 2008 | 49 | 2008 |
A workflow-based access control framework for e-health applications G Russello, C Dong, N Dulay Advanced Information Networking and Applications-Workshops, 2008. AINAW 2008 …, 2008 | 47 | 2008 |
A fast secure dot product protocol with application to privacy preserving association rule mining C Dong, L Chen Pacific-Asia Conference on Knowledge Discovery and Data Mining, 606-617, 2014 | 44 | 2014 |
Automated cryptographic analysis of the pedersen commitment scheme R Metere, C Dong Computer Network Security: 7th International Conference on Mathematical …, 2017 | 40 | 2017 |