Cooperative provable data possession for integrity verification in multicloud storage Y Zhu, H Hu, GJ Ahn, M Yu IEEE transactions on parallel and distributed systems 23 (12), 2231-2244, 2012 | 703 | 2012 |
Dynamic audit services for outsourced storages in clouds Y Zhu, GJ Ahn, H Hu, SS Yau, HG An, CJ Hu IEEE transactions on services computing 6 (2), 227-238, 2011 | 419 | 2011 |
Dynamic audit services for integrity verification of outsourced storages in clouds Y Zhu, H Wang, Z Hu, GJ Ahn, H Hu, SS Yau Proceedings of the 2011 ACM symposium on applied computing, 1550-1557, 2011 | 395 | 2011 |
An efficient authentication and access control scheme for perception layer of internet of things N Ye, Y Zhu, R Wang, R Malekian, Q Lin Natural Sciences Publishing Cor., 2014 | 292 | 2014 |
Efficient provable data possession for hybrid clouds Y Zhu, H Wang, Z Hu, GJ Ahn, H Hu, SS Yau Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 207 | 2010 |
A system view of financial blockchains WT Tsai, R Blower, Y Zhu, L Yu 2016 IEEE Symposium on Service-Oriented System Engineering (SOSE), 450-457, 2016 | 190 | 2016 |
Efficient audit service outsourcing for data integrity in clouds Y Zhu, H Hu, GJ Ahn, SS Yau Journal of Systems and Software 85 (5), 1083-1095, 2012 | 144 | 2012 |
Attribute-based access control for ICN naming scheme B Li, D Huang, Z Wang, Y Zhu IEEE Transactions on Dependable and Secure Computing 15 (2), 194-206, 2016 | 131 | 2016 |
Towards temporal access control in cloud computing Y Zhu, H Hu, GJ Ahn, D Huang, S Wang 2012 Proceedings IEEE Infocom, 2576-2580, 2012 | 129 | 2012 |
Location-aware and safer cards: enhancing RFID security and privacy via location sensing D Ma, AK Prasad, N Saxena, T Xiang Proceedings of the fifth ACM conference on Security and Privacy in Wireless …, 2012 | 101 | 2012 |
From RBAC to ABAC: constructing flexible data access control for cloud storage services Y Zhu, D Huang, CJ Hu, X Wang IEEE Transactions on Services Computing 8 (4), 601-616, 2014 | 96 | 2014 |
Digital asset management with distributed permission over blockchain and attribute-based access control Y Zhu, Y Qin, Z Zhou, X Song, G Liu, WCC Chu 2018 IEEE international conference on services computing (SCC), 193-200, 2018 | 93 | 2018 |
Collaborative integrity verification in hybrid clouds Y Zhu, H Hu, GJ Ahn, Y Han, S Chen 7th International Conference on Collaborative Computing: Networking …, 2011 | 86 | 2011 |
Efficient attribute-based comparable data access control Z Wang, D Huang, Y Zhu, B Li, CJ Chung IEEE Transactions on computers 64 (12), 3430-3443, 2015 | 82 | 2015 |
Spesc: A specification language for smart contracts X He, B Qin, Y Zhu, X Chen, Y Liu 2018 IEEE 42nd Annual computer software and applications conference (COMPSAC …, 2018 | 71 | 2018 |
TBAC: Transaction-based access control on blockchain for resource sharing with cryptographically decentralized authorization Y Zhu, Y Qin, G Gan, Y Shuai, WCC Chu 2018 IEEE 42nd annual computer software and applications conference (COMPSAC …, 2018 | 66 | 2018 |
A sequential approach to market state modeling and analysis in online p2p lending H Zhao, Q Liu, H Zhu, Y Ge, E Chen, Y Zhu, J Du IEEE Transactions on Systems, Man, and Cybernetics: Systems 48 (1), 21-33, 2017 | 64 | 2017 |
Zero-knowledge proofs of retrievability Y Zhu, HX Wang, ZX Hu, GJ Ahn, HX Hu Science China Information Sciences 54, 1608-1617, 2011 | 64 | 2011 |
Comparison-based encryption for fine-grained access control in clouds Y Zhu, H Hu, GJ Ahn, M Yu, H Zhao Proceedings of the second ACM conference on Data and Application Security …, 2012 | 59 | 2012 |
Interactive incontestable signature for transactions confirmation in bitcoin blockchain Y Zhu, R Guo, G Gan, WT Tsai 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC …, 2016 | 49 | 2016 |