Block design-based key agreement for group data sharing in cloud computing J Shen, T Zhou, D He, Y Zhang, X Sun, Y Xiang IEEE Transactions on Dependable and Secure Computing 16 (6), 996-1010, 2017 | 300 | 2017 |
Anonymous and traceable group data sharing in cloud computing J Shen, T Zhou, X Chen, J Li, W Susilo IEEE Transactions on Information Forensics and Security 13 (4), 912-925, 2017 | 275 | 2017 |
Privacy-preserving and lightweight key agreement protocol for V2G in the social Internet of Things J Shen, T Zhou, F Wei, X Sun, Y Xiang IEEE Internet of things Journal 5 (4), 2526-2536, 2017 | 124 | 2017 |
Quantum cryptography for the future internet and the security analysis T Zhou, J Shen, X Li, C Wang, J Shen Security and Communication Networks 2018, 1-7, 2018 | 84 | 2018 |
Collaborative filtering-based recommendation system for big data J Shen, T Zhou, L Chen International Journal of Computational Science and Engineering 21 (2), 219-225, 2020 | 57 | 2020 |
Movie recommendation system employing the user-based cf in cloud computing T Zhou, L Chen, J Shen 2017 IEEE International Conference on Computational Science and Engineering …, 2017 | 42 | 2017 |
An efficient and certificateless conditional privacy-preserving authentication scheme for wireless body area networks big data services S Ji, Z Gui, T Zhou, H Yan, J Shen IEEE Access 6, 69603-69611, 2018 | 41 | 2018 |
Logarithmic encryption scheme for cyber–physical systems employing Fibonacci Q-matrix T Zhou, J Shen, X Li, C Wang, H Tan Future Generation Computer Systems 108, 1307-1313, 2020 | 40 | 2020 |
Human-in-the-loop-aided privacy-preserving scheme for smart healthcare T Zhou, J Shen, D He, P Vijayakumar, N Kumar IEEE transactions on emerging topics in computational intelligence 6 (1), 6-15, 2020 | 33 | 2020 |
A novel latin-square-based secret sharing for M2M communications J Shen, T Zhou, X Liu, YC Chang IEEE Transactions on Industrial Informatics 14 (8), 3659-3668, 2018 | 29 | 2018 |
Lightweight authentication and matrix-based key agreement scheme for healthcare in fog computing J Shen, H Yang, A Wang, T Zhou, C Wang Peer-to-Peer Networking and Applications 12, 924-933, 2019 | 26 | 2019 |
Searchable and secure edge pre-cache scheme for intelligent 6G wireless systems C Wang, T Zhou, J Shen, W Wang, X Zhou Future Generation Computer Systems 140, 129-137, 2023 | 22 | 2023 |
Efficient data integrity auditing with corrupted data recovery for edge computing in enterprise multimedia security D Liu, J Shen, P Vijayakumar, A Wang, T Zhou Multimedia Tools and Applications 79, 10851-10870, 2020 | 22 | 2020 |
Secure and efficient data sharing in dynamic vehicular networks J Shen, T Zhou, J Lai, P Li, S Moh IEEE Internet of Things Journal 7 (9), 8208-8217, 2020 | 18 | 2020 |
Secure emergent data protection scheme for a space-terrestrial integrated network J Shen, C Wang, S Ji, T Zhou, H Yang IEEE Network 33 (1), 44-50, 2019 | 17 | 2019 |
Hierarchical trust level evaluation for pervasive social networking J Shen, T Zhou, CF Lai, J Li, X Li IEEE Access 5, 1178-1187, 2017 | 17 | 2017 |
A flexible and privacy-preserving collaborative filtering scheme in cloud computing for VANETs H Yang, J Shen, T Zhou, S Ji, P Vijayakumar ACM Transactions on Internet Technology (TOIT) 22 (2), 1-19, 2021 | 13 | 2021 |
A privacy-preserving data transmission scheme based on oblivious transfer and blockchain technology in the smart healthcare H Yang, J Shen, J Lu, T Zhou, X Xia, S Ji Security and Communication Networks 2021, 1-12, 2021 | 13 | 2021 |
Threshold Key Management Scheme for Blockchain-Based Intelligent Transportation Systems T Zhou, J Shen, Y Ren, S Ji Security and Communication Networks 2021, 2021 | 12 | 2021 |
Privacy-preserving data outsourcing with integrity auditing for lightweight devices in cloud computing D Liu, J Shen, Y Chen, C Wang, T Zhou, A Wang Information Security and Cryptology: 14th International Conference, Inscrypt …, 2019 | 9 | 2019 |