VABKS: Verifiable attribute-based keyword search over outsourced encrypted data Q Zheng, S Xu, G Ateniese IEEE INFOCOM 2014-IEEE conference on computer communications, 522-530, 2014 | 584 | 2014 |
Fair and dynamic proofs of retrievability Q Zheng, S Xu Proceedings of the first ACM conference on Data and application security and …, 2011 | 222 | 2011 |
Secure and efficient proof of storage with deduplication Q Zheng, S Xu Proceedings of the second ACM conference on Data and Application Security …, 2012 | 199 | 2012 |
LIVE: Lightweight integrity verification and content access control for named data networking Q Li, X Zhang, Q Zheng, R Sandhu, X Fu IEEE Transactions on Information Forensics and Security 10 (2), 308-320, 2014 | 103 | 2014 |
Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation Y Shi, Q Zheng, J Liu, Z Han Information Sciences 295, 221-231, 2015 | 100 | 2015 |
Method and system for secure multiparty cloud computation X Zhang, Q Zheng, A Kalker, G Wang US Patent 9,252,942, 2016 | 65 | 2016 |
Verifiable Delegated Set Intersection Operations on Outsourced Encrypted Data. Q Zheng, S Xu 2015 IEEE International Conference on Cloud Engineering 2015, 175-184, 2015 | 63 | 2015 |
Efficient query integrity for outsourced dynamic databases Q Zheng, S Xu, G Ateniese Proceedings of the 2012 ACM Workshop on Cloud computing security workshop, 71-82, 2012 | 59 | 2012 |
RSPP: A reliable, searchable and privacy-preserving e-healthcare system for cloud-assisted body area networks L Yang, Q Zheng, X Fan IEEE INFOCOM 2017-IEEE conference on computer communications, 1-9, 2017 | 48 | 2017 |
CLKS: Certificateless keyword search on encrypted data Q Zheng, X Li, A Azgin Network and System Security: 9th International Conference, NSS 2015, New …, 2015 | 42 | 2015 |
Attribute-based proxy re-encryption with keyword search Y Shi, J Liu, Z Han, Q Zheng, R Zhang, S Qiu PloS one 9 (12), e116325, 2014 | 41 | 2014 |
Achieving secure and scalable data access control in information-centric networking Q Zheng, G Wang, R Ravindran, A Azgin 2015 IEEE International Conference on Communications (ICC), 5367-5373, 2015 | 30 | 2015 |
IoT middleware architecture over information-centric network S Li, Y Zhang, D Raychaudhuri, R Ravindran, Q Zheng, L Dong, G Wang 2015 IEEE Globecom Workshops (GC Wkshps), 1-7, 2015 | 27 | 2015 |
Method for faster secure multiparty inner product computation with SPDZ FAN Xinxin, Q Zheng, JG Merchan US Patent 11,323,444, 2022 | 21 | 2022 |
Federated cloud security architecture for secure and agile clouds W Luo, L Xu, Z Zhan, Q Zheng, S Xu High performance cloud auditing and applications, 169-188, 2014 | 17 | 2014 |
Method for faster secure multiparty inner product with SPDZ FAN Xinxin, Q Zheng, JG Merchan US Patent 11,606,203, 2023 | 16 | 2023 |
Multi-processor architectural support for protecting virtual machine privacy in untrusted cloud environment Y Wen, JH Lee, Z Liu, Q Zheng, W Shi, S Xu, T Suh Proceedings of the ACM International Conference on Computing Frontiers, 1-10, 2013 | 16 | 2013 |
Architectural protection of application privacy against software and physical attacks in untrusted cloud environment L Xu, JH Lee, SH Kim, Q Zheng, S Xu, T Suh, WW Ro, W Shi IEEE Transactions on Cloud Computing 6 (2), 478-491, 2015 | 14 | 2015 |
Improved anonymous proxy re-encryption with CCA security Q Zheng, W Zhu, J Zhu, X Zhang Proceedings of the 9th ACM symposium on Information, computer and …, 2014 | 11 | 2014 |
Cloudsafe: Securing data processing within vulnerable virtualization environments in the cloud H Xiong, Q Zheng, X Zhang, D Yao 2013 IEEE Conference on Communications and Network Security (CNS), 172-180, 2013 | 10 | 2013 |