Changyu Dong
Titel
Geciteerd door
Geciteerd door
Jaar
Shared and searchable encrypted data for untrusted servers
C Dong, G Russello, N Dulay
Journal of Computer Security 19 (3), 367-397, 2011
2702011
When private set intersection meets big data: an efficient and scalable protocol
C Dong, L Chen, Z Wen
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
2632013
Shared and searchable encrypted data for untrusted servers
C Dong, G Russello, N Dulay
IFIP Annual Conference on Data and Applications Security and Privacy, 127-143, 2008
1472008
Authorisation and conflict resolution for hierarchical domains
G Russello, C Dong, N Dulay
Eighth IEEE International Workshop on Policies for Distributed Systems and …, 2007
892007
Betrayal, distrust, and rationality: Smart counter-collusion contracts for verifiable cloud computing
C Dong, Y Wang, A Aldweesh, P McCorry, A van Moorsel
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
832017
Searchable symmetric encryption with forward search privacy
J Li, Y Huang, Y Wei, S Lv, Z Liu, C Dong, W Lou
IEEE Transactions on Dependable and Secure Computing, 2019
462019
Forward private searchable symmetric encryption with optimized I/O efficiency
X Song, C Dong, D Yuan, Q Xu, M Zhao
IEEE Transactions on Dependable and Secure Computing 17 (5), 912-927, 2018
462018
A workflow-based access control framework for e-health applications
G Russello, C Dong, N Dulay
Advanced Information Networking and Applications-Workshops, 2008. AINAW 2008 …, 2008
442008
Fair private set intersection with a semi-trusted arbiter
C Dong, L Chen, J Camenisch, G Russello
IFIP Annual Conference on Data and Applications Security and Privacy, 128-144, 2013
422013
O-PSI: delegated private set intersection on outsourced datasets
A Abadi, S Terzis, C Dong
IFIP International Information Security and Privacy Conference, 3-17, 2015
412015
Consent-based workflows for healthcare management
G Russello, C Dong, N Dulay
Policies for Distributed Systems and Networks, 2008. POLICY 2008. IEEE …, 2008
382008
A fast single server private information retrieval protocol with low communication cost
C Dong, L Chen
European Symposium on Research in Computer Security, 380-399, 2014
332014
VD-PSI: verifiable delegated private set intersection on outsourced private datasets
A Abadi, S Terzis, C Dong
International Conference on Financial Cryptography and Data Security, 149-168, 2016
282016
A fast secure dot product protocol with application to privacy preserving association rule mining
C Dong, L Chen
Pacific-Asia Conference on Knowledge Discovery and Data Mining, 606-617, 2014
282014
Longitude: A privacy-preserving location sharing protocol for mobile applications
C Dong, N Dulay
IFIP International Conference on Trust Management, 133-148, 2011
262011
Trust transfer in distributed systems
C Dong, G Russello, N Dulay
IFIP International Conference on Trust Management, 17-29, 2007
242007
Privacy preserving trust negotiation for pervasive healthcare
C Dong, N Dulay
2006 Pervasive Health Conference and Workshops, 1-9, 2006
232006
Efficient delegated private set intersection on outsourced private datasets
A Abadi, S Terzis, R Metere, C Dong
IEEE Transactions on Dependable and Secure Computing 16 (4), 608-624, 2017
192017
Approximating private set union/intersection cardinality with logarithmic complexity
C Dong, G Loukides
IEEE Transactions on Information Forensics and Security 12 (11), 2792-2806, 2017
182017
Efficient protocols for private record linkage
Z Wen, C Dong
Proceedings of the 29th Annual ACM Symposium on Applied Computing, 1688-1694, 2014
182014
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20