Publications

(2024). Practical Revocable Keyword Search Over Mobile Cloud-Assisted Internet of Things. IEEE Internet of Things Journal (IoTJ, SCI 1).

PDF DOI

(2023). Verifiable Outsourced Attribute-Based Encryption Scheme for Cloud-Assisted Mobile E-health System. IEEE Transactions on Dependable and Secure Computing (TDSC, CCF A, SCI 2).

PDF DOI

(2023). Time-Controllable Keyword Search Scheme with Efficient Revocation in Mobile E-health Cloud. IEEE Transactions on Mobile Computing (TMC, CCF A, SCI 2).

PDF DOI

(2023). REKS: Role-Based Encrypted Keyword Search With Enhanced Access Control for Outsourced Cloud Data. IEEE Transactions on Dependable and Secure Computing (TDSC, CCF A, SCI 2).

PDF DOI

(2023). Beyond Volume Pattern: Storage-Efficient Boolean Searchable Symmetric Encryption with Suppressed Leakage. In 28th European Symposium on Research in Computer Security (ESORICS, CCF B).

PDF

(2023). A Survey on Symmetric Searchable Encryption. ACM Computing Surveys (CUSR, SCI 1).

PDF DOI

(2021). Enabling Efficient Spatial Keyword Queries on Encrypted Data with Strong Security Guarantees. IEEE Transactions on Information Forensics and Security (TIFS, CCF A, SCI 1).

PDF DOI

(2021). Verifiable and Dynamic Multi-keyword Search over Encrypted Cloud Data Using Bitmap. IEEE Transactions on Cloud Computing (TCC, CCF C, SCI 2).

PDF DOI

(2021). Towards Efficient Verifiable Boolean Search over Encrypted Cloud Data. IEEE Transactions on Cloud Computing (TCC, CCF C, SCI 2).

PDF DOI

(2020). IMSHELL-DEC: Pay More Attention to External Links in POWERSHELL. In 35th IFIP International Information Security Conference (SEC, CCF C).

PDF