Follow
Rongmao Chen (陈荣茂)
Rongmao Chen (陈荣茂)
Verified email at nudt.edu.cn - Homepage
Title
Cited by
Cited by
Year
Dual-server public-key encryption with keyword search for secure cloud storage
R Chen, Y Mu, G Yang, F Guo, X Wang
IEEE transactions on information forensics and security 11 (4), 789-798, 2015
2812015
BL-MLE: Block-level message-locked encryption for secure large file deduplication
R Chen, Y Mu, G Yang, F Guo
IEEE Transactions on Information Forensics and Security 10 (12), 2643-2652, 2015
1522015
Server-aided public key encryption with keyword search
R Chen, Y Mu, G Yang, F Guo, X Huang, X Wang, Y Wang
IEEE Transactions on Information Forensics and Security 11 (12), 2833-2842, 2016
1502016
A new general framework for secure public key encryption with keyword search
R Chen, Y Mu, G Yang, F Guo, X Wang
Information Security and Privacy: 20th Australasian Conference, ACISP 2015 …, 2015
1062015
Towards practical privacy-preserving decision tree training and evaluation in the cloud
L Liu, R Chen, X Liu, J Su, L Qiao
IEEE Transactions on Information Forensics and Security 15, 2914-2929, 2020
692020
Cryptographic reverse firewall via malleable smooth projective hash functions
R Chen, Y Mu, G Yang, W Susilo, F Guo, M Zhang
International Conference on the Theory and Application of Cryptology and …, 2016
632016
Toward highly secure yet efficient KNN classification scheme on outsourced cloud data
L Liu, J Su, X Liu, R Chen, K Huang, RH Deng, X Wang
IEEE Internet of Things Journal 6 (6), 9841-9852, 2019
612019
Strongly leakage-resilient authenticated key exchange
R Chen, Y Mu, G Yang, W Susilo, F Guo
Cryptographers’ Track at the RSA Conference, 19-36, 2016
502016
Anonymous identity-based broadcast encryption with revocation for file sharing
J Lai, Y Mu, F Guo, W Susilo, R Chen
Information Security and Privacy: 21st Australasian Conference, ACISP 2016 …, 2016
502016
Recipient revocable identity-based broadcast encryption: How to revoke some recipients in IBBE without knowledge of the plaintext
W Susilo, R Chen, F Guo, G Yang, Y Mu, YW Chow
Proceedings of the 11th ACM on Asia conference on computer and …, 2016
462016
An efficient privacy‐preserving aggregation and billing protocol for smart grid
XF Wang, Y Mu, RM Chen
Security and Communication Networks 9 (17), 4536-4547, 2016
392016
Secure channel free id-based searchable encryption for peer-to-peer group
XF Wang, Y Mu, R Chen, XS Zhang
Journal of Computer Science and Technology 31, 1012-1027, 2016
382016
Strong authenticated key exchange with auxiliary inputs
R Chen, Y Mu, G Yang, W Susilo, F Guo
Designs, Codes and Cryptography 85, 145-173, 2017
332017
Fully privacy-preserving and revocable ID-based broadcast encryption for data access control in smart city
J Lai, Y Mu, F Guo, W Susilo, R Chen
Personal and Ubiquitous computing 21, 855-868, 2017
322017
Subvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryption
R Chen, X Huang, M Yung
Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020
282020
A practical authentication framework for VANETs
B Wang, Y Wang, R Chen
Security and communication networks 2019 (1), 4752612, 2019
272019
Privacy-preserving mining of association rule on outsourced cloud data from multiple parties
L Liu, J Su, R Chen, X Liu, X Wang, S Chen, H Leung
Information Security and Privacy: 23rd Australasian Conference, ACISP 2018 …, 2018
252018
Optimal security reductions for unique signatures: bypassing impossibilities with a counterexample
F Guo, R Chen, W Susilo, J Lai, G Yang, Y Mu
Annual International Cryptology Conference, 517-547, 2017
252017
ME-TLS: middlebox-enhanced TLS for internet-of-things devices
J Li, R Chen, J Su, X Huang, X Wang
IEEE Internet of Things Journal 7 (2), 1216-1229, 2019
242019
One-round privacy-preserving meeting location determination for smartphone applications
X Wang, Y Mu, R Chen
IEEE Transactions on Information Forensics and Security 11 (8), 1712-1721, 2016
212016
The system can't perform the operation now. Try again later.
Articles 1–20