Hierarchical attribute-based encryption for fine-grained access control in cloud storage services G Wang, Q Liu, J Wu Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 927 | 2010 |
Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers G Wang, Q Liu, J Wu, M Guo computers & security 30 (5), 320-331, 2011 | 334 | 2011 |
Time-based proxy re-encryption scheme for secure data sharing in a cloud environment Q Liu, G Wang, J Wu Information sciences 258, 355-370, 2014 | 328 | 2014 |
Collaborative trajectory privacy preserving scheme in location-based services T Peng, Q Liu, D Meng, G Wang Information Sciences 387, 165-179, 2017 | 196 | 2017 |
Secure and privacy preserving keyword searching for cloud storage services Q Liu, G Wang, J Wu Journal of network and computer applications 35 (3), 927-933, 2012 | 195 | 2012 |
A dual privacy preserving scheme in continuous location-based services S Zhang, G Wang, MZA Bhuiyan, Q Liu IEEE Internet of Things Journal 5 (5), 4191-4200, 2018 | 171 | 2018 |
An efficient privacy preserving keyword search scheme in cloud computing Q Liu, G Wang, J Wu 2009 International Conference on Computational Science and Engineering 2 …, 2009 | 171 | 2009 |
Preserving privacy with probabilistic indistinguishability in weighted social networks Q Liu, G Wang, F Li, S Yang, J Wu IEEE Transactions on Parallel and Distributed Systems 28 (5), 1417-1429, 2016 | 162 | 2016 |
Enabling verifiable and dynamic ranked search over outsourced data Q Liu, Y Tian, J Wu, T Peng, G Wang IEEE Transactions on Services Computing 15 (1), 69-82, 2019 | 133 | 2019 |
A Trajectory Privacy-Preserving Scheme Based on Dual-K Mechanism for Continuous Location-Based Services S Zhang, G Wang, Q Liu, X Wen, J Liao 2017 IEEE International Symposium on Parallel and Distributed Processing …, 2017 | 119 | 2017 |
Enhanced location privacy preserving scheme in location-based services T Peng, Q Liu, G Wang IEEE Systems Journal 11 (1), 219-230, 2014 | 113 | 2014 |
Enhancing privacy through uniform grid and caching in location-based services S Zhang, KKR Choo, Q Liu, G Wang Future Generation Computer Systems 86, 881-892, 2018 | 110 | 2018 |
Intelligent route planning on large road networks with efficiency and privacy Q Liu, P Hou, G Wang, T Peng, S Zhang Journal of Parallel and Distributed Computing 133, 93-106, 2019 | 106 | 2019 |
Achieving reliable and secure services in cloud computing environments Q Liu, G Wang, X Liu, T Peng, J Wu Computers & Electrical Engineering 59, 153-164, 2017 | 88 | 2017 |
Hierarchical multi-authority and attribute-based encryption friend discovery scheme in mobile social networks E Luo, Q Liu, G Wang IEEE Communications Letters 20 (9), 1772-1775, 2016 | 87 | 2016 |
Efficient information retrieval for ranked queries in cost-effective cloud environments Q Liu, CC Tan, J Wu, G Wang 2012 Proceedings IEEE INFOCOM, 2581-2585, 2012 | 77 | 2012 |
Reliable re-encryption in unreliable clouds Q Liu, CC Tan, J Wu, G Wang 2011 IEEE Global Telecommunications Conference-GLOBECOM 2011, 1-5, 2011 | 69 | 2011 |
Secure multi-keyword fuzzy searches with enhanced service quality in cloud computing Q Liu, Y Peng, J Wu, T Wang, G Wang IEEE Transactions on Network and Service Management 18 (2), 2046-2062, 2020 | 67 | 2020 |
A secure self-destructing scheme for electronic data G Wang, F Yue, Q Liu Journal of Computer and System Sciences 79 (2), 279-290, 2013 | 66 | 2013 |
Achieving fine‐grained access control for secure data sharing on cloud servers G Wang, Q Liu, J Wu Concurrency and Computation: Practice and Experience 23 (12), 1443-1464, 2011 | 63 | 2011 |