Cited By
View all- Hu XChang JAhmad TZhang FZhang Y(2025)Identity-Based Integrity Auditing Scheme With Sensitive Information Hiding for Proxy-Server-Assisted Cloud Storage ApplicationsIEEE Internet of Things Journal10.1109/JIOT.2024.349131512:6(6673-6684)Online publication date: 15-Mar-2025
- Chen BRother CDafoe JLuo BLiao XXu JKirda ELie D(2024)Poster: A Full-stack Secure Deletion Framework for Modern Computing DevicesProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3691369(4967-4969)Online publication date: 2-Dec-2024
- Gao BJia SYin PZhang X(2023)Protection of Access PatternProceedings of the 2023 7th International Conference on Computer Science and Artificial Intelligence10.1145/3638584.3638585(99-105)Online publication date: 8-Dec-2023
- Show More Cited By