Secure deduplication with efficient and reliable convergent key management J Li, X Chen, M Li, J Li, PPC Lee, W Lou IEEE transactions on parallel and distributed systems 25 (6), 1615-1625, 2013 | 829 | 2013 |
Securely outsourcing attribute-based encryption with checkability J Li, X Huang, J Li, X Chen, Y Xiang IEEE Transactions on Parallel and Distributed Systems 25 (8), 2201-2210, 2013 | 509 | 2013 |
Identity-based encryption with outsourced revocation in cloud computing J Li, J Li, X Chen, C Jia, W Lou IEEE Transactions on computers 64 (2), 425-437, 2013 | 458 | 2013 |
Secure auditing and deduplicating data in cloud J Li, J Li, D Xie, Z Cai IEEE Transactions on Computers 65 (8), 2386-2396, 2015 | 216 | 2015 |
Fine-grained access control system based on outsourced attribute-based encryption J Li, X Chen, J Li, C Jia, J Ma, W Lou Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013 | 214 | 2013 |
Outsourcing encryption of attribute-based encryption with mapreduce J Li, C Jia, J Li, X Chen Information and Communications Security: 14th International Conference …, 2012 | 156 | 2012 |
Secure outsourced attribute-based signatures X Chen, J Li, X Huang, J Li, Y Xiang, DS Wong IEEE transactions on parallel and distributed systems 25 (12), 3285-3294, 2014 | 155 | 2014 |
CDStore: Toward Reliable, Secure, and Cost-Efficient Cloud Storage via Convergent Dispersal M Li, C Qin, J Li, PPC Lee IEEE Internet Computing 20 (3), 45-53, 2016 | 149 | 2016 |
Designing cloud-based electronic health record system with attribute-based encryption F Xhafa, J Li, G Zhao, J Li, X Chen, DS Wong Multimedia tools and applications 74, 3441-3458, 2015 | 98 | 2015 |
Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid Cloud J Li, J Li, X Chen, C Jia, Z Liu Network and System Security, 490-502, 2012 | 83 | 2012 |
Rekeying for encrypted deduplication storage J Li, C Qin, PPC Lee, J Li 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems …, 2016 | 74 | 2016 |
The design and implementation of a rekeying-aware encrypted deduplication storage system C Qin, J Li, PPC Lee ACM Transactions on Storage (TOS) 13 (1), 1-30, 2017 | 62 | 2017 |
Towards privacy-preserving storage and retrieval in multiple clouds J Li, D Lin, AC Squicciarini, J Li, C Jia IEEE Transactions on Cloud Computing 5 (3), 499-509, 2015 | 52 | 2015 |
Balancing storage efficiency and data confidentiality with tunable encrypted deduplication J Li, Z Yang, Y Ren, PPC Lee, X Zhang Proceedings of the Fifteenth European Conference on Computer Systems, 1-15, 2020 | 51 | 2020 |
Privacy-preserving data utilization in hybrid clouds J Li, J Li, X Chen, Z Liu, C Jia Future Generation Computer Systems 30, 98-106, 2014 | 49 | 2014 |
Format-preserving encryption for datetime Z Liu, C Jia, J Li, X Cheng 2010 IEEE International Conference on Intelligent Computing and Intelligent …, 2010 | 41 | 2010 |
Information leakage in encrypted deduplication via frequency analysis J Li, C Qin, PPC Lee, X Zhang 2017 47th Annual IEEE/IFIP international conference on dependable systems …, 2017 | 40 | 2017 |
Survey on the searchable encryption 李经纬, 贾春福, 刘哲理, 李进, 李敏 Journal of Software 26 (1), 109-128, 2014 | 40 | 2014 |
Accelerating encrypted deduplication via {SGX} Y Ren, J Li, Z Yang, PPC Lee, X Zhang 2021 USENIX Annual Technical Conference (USENIX ATC 21), 957-971, 2021 | 38 | 2021 |
Enabling efficient and secure data sharing in cloud computing J Li, J Li, Z Liu, C Jia Concurrency and computation: practice and experience 26 (5), 1052-1066, 2014 | 38 | 2014 |