Follow
Rongmao Chen (陈荣茂)
Rongmao Chen (陈荣茂)
Verified email at nudt.edu.cn - Homepage
Title
Cited by
Cited by
Year
Dual-server public-key encryption with keyword search for secure cloud storage
R Chen, Y Mu, G Yang, F Guo, X Wang
IEEE transactions on information forensics and security 11 (4), 789-798, 2015
2662015
BL-MLE: Block-level message-locked encryption for secure large file deduplication
R Chen, Y Mu, G Yang, F Guo
IEEE Transactions on Information Forensics and Security 10 (12), 2643-2652, 2015
1432015
Server-aided public key encryption with keyword search
R Chen, Y Mu, G Yang, F Guo, X Huang, X Wang, Y Wang
IEEE Transactions on Information Forensics and Security 11 (12), 2833-2842, 2016
1342016
A new general framework for secure public key encryption with keyword search
R Chen, Y Mu, G Yang, F Guo, X Wang
Information Security and Privacy: 20th Australasian Conference, ACISP 2015 …, 2015
1002015
Toward highly secure yet efficient KNN classification scheme on outsourced cloud data
L Liu, J Su, X Liu, R Chen, K Huang, RH Deng, X Wang
IEEE Internet of Things Journal 6 (6), 9841-9852, 2019
552019
Cryptographic reverse firewall via malleable smooth projective hash functions
R Chen, Y Mu, G Yang, W Susilo, F Guo, M Zhang
International Conference on the Theory and Application of Cryptology and …, 2016
532016
Towards practical privacy-preserving decision tree training and evaluation in the cloud
L Liu, R Chen, X Liu, J Su, L Qiao
IEEE Transactions on Information Forensics and Security 15, 2914-2929, 2020
512020
Strongly leakage-resilient authenticated key exchange
R Chen, Y Mu, G Yang, W Susilo, F Guo
Cryptographers’ Track at the RSA Conference, 19-36, 2016
482016
Anonymous identity-based broadcast encryption with revocation for file sharing
J Lai, Y Mu, F Guo, W Susilo, R Chen
Information Security and Privacy: 21st Australasian Conference, ACISP 2016 …, 2016
462016
Recipient revocable identity-based broadcast encryption: How to revoke some recipients in IBBE without knowledge of the plaintext
W Susilo, R Chen, F Guo, G Yang, Y Mu, YW Chow
Proceedings of the 11th ACM on Asia conference on computer and …, 2016
422016
An efficient privacy‐preserving aggregation and billing protocol for smart grid
XF Wang, Y Mu, RM Chen
Security and Communication Networks 9 (17), 4536-4547, 2016
382016
Secure channel free id-based searchable encryption for peer-to-peer group
XF Wang, Y Mu, R Chen, XS Zhang
Journal of Computer Science and Technology 31, 1012-1027, 2016
352016
Strong authenticated key exchange with auxiliary inputs
R Chen, Y Mu, G Yang, W Susilo, F Guo
Designs, Codes and Cryptography 85, 145-173, 2017
342017
Fully privacy-preserving and revocable ID-based broadcast encryption for data access control in smart city
J Lai, Y Mu, F Guo, W Susilo, R Chen
Personal and Ubiquitous computing 21, 855-868, 2017
292017
A practical authentication framework for VANETs
B Wang, Y Wang, R Chen
Security and communication networks 2019, 2019
232019
Subvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryption
R Chen, X Huang, M Yung
Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020
222020
Privacy-preserving mining of association rule on outsourced cloud data from multiple parties
L Liu, J Su, R Chen, X Liu, X Wang, S Chen, H Leung
Information Security and Privacy: 23rd Australasian Conference, ACISP 2018 …, 2018
222018
Optimal security reductions for unique signatures: bypassing impossibilities with a counterexample
F Guo, R Chen, W Susilo, J Lai, G Yang, Y Mu
Annual International Cryptology Conference, 517-547, 2017
212017
ME-TLS: Middlebox-enhanced TLS for Internet-of-Things devices
J Li, R Chen, J Su, X Huang, X Wang
IEEE Internet of Things Journal 7 (2), 1216-1229, 2019
202019
One-round privacy-preserving meeting location determination for smartphone applications
X Wang, Y Mu, R Chen
IEEE Transactions on Information Forensics and Security 11 (8), 1712-1721, 2016
202016
The system can't perform the operation now. Try again later.
Articles 1–20