A practical privacy-preserving data aggregation (3PDA) scheme for smart grid Y Liu, W Guo, CI Fan, L Chang, C Cheng IEEE Transactions on Industrial Informatics 15 (3), 1767-1774, 2018 | 267 | 2018 |
Privacy-enhanced data aggregation scheme against internal attackers in smart grid CI Fan, SY Huang, YL Lai IEEE Transactions on Industrial informatics 10 (1), 666-675, 2013 | 264 | 2013 |
Robust remote authentication scheme with smart cards CI Fan, YC Chan, ZK Zhang Computers & Security 24 (8), 619-628, 2005 | 219 | 2005 |
Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics CI Fan, YH Lin IEEE Transactions on Information Forensics and Security 4 (4), 933-945, 2009 | 208 | 2009 |
Anonymous multireceiver identity-based encryption CI Fan, LY Huang, PH Ho IEEE Transactions on Computers 59 (9), 1239-1249, 2010 | 158 | 2010 |
Malware detection systems based on API log data mining CI Fan, HW Hsiao, CH Chou, YF Tseng 2015 IEEE 39th annual computer software and applications conference 3, 255-260, 2015 | 109 | 2015 |
Low-computation partially blind signatures for electronic cash CI Fan, CL Lei IEICE Transactions on Fundamentals of Electronics, Communications and …, 1998 | 94 | 1998 |
Randomization enhanced Chaum's blind signature scheme CI Fan, WK Chen, YS Yeh Computer Communications 23 (17), 1677-1680, 2000 | 81 | 2000 |
Arbitrary-state attribute-based encryption with dynamic membership CI Fan, VSM Huang, HM Ruan IEEE Transactions on Computers 63 (8), 1951-1961, 2013 | 77 | 2013 |
A privacy-preserving federated learning system for android malware detection based on edge computing RH Hsu, YC Wang, CI Fan, B Sun, T Ban, T Takahashi, TW Wu, SW Kao 2020 15th Asia Joint Conference on Information Security (AsiaJCIS), 128-136, 2020 | 70 | 2020 |
Efficient blind signature scheme based on quadratic residues CI Fan, CL Lei Electronics Letters 32 (9), 811-813, 1996 | 65 | 1996 |
Provably secure randomized blind signature scheme based on bilinear pairing CI Fan, WZ Sun, VSM Huang Computers & Mathematics with Applications 60 (2), 285-293, 2010 | 64 | 2010 |
Provably secure and generalized signcryption with public verifiability for secure data transmission between resource-constrained IoT devices A Karati, CI Fan, RH Hsu IEEE Internet of Things Journal 6 (6), 10431-10440, 2019 | 59 | 2019 |
Controllable privacy preserving search based on symmetric predicate encryption in cloud storage CI Fan, SY Huang Future Generation Computer Systems 29 (7), 1716-1724, 2013 | 58 | 2013 |
An extended multi-server-based user authentication and key agreement scheme with user anonymity CT Li, CC Lee, CY Weng, CI Fan KSII Transactions on Internet and Information Systems (TIIS) 7 (1), 119-131, 2013 | 54 | 2013 |
User efficient blind signatures CI Fan, CL Lei Electronics letters 34 (6), 544-546, 1998 | 53 | 1998 |
Hybrid data deduplication in cloud environment CI Fan, SY Huang, WC Hsu 2012 International Conference on Information Security and Intelligent …, 2012 | 41 | 2012 |
Truly Non-Repudiation Certificateless Short Signature Scheme from Bilinear Pairings. CI Fan, RH Hsu, PH Ho J. Inf. Sci. Eng. 27 (3), 969-982, 2011 | 41 | 2011 |
Cross-Network-Slice Authentication Scheme for the 5th Generation Mobile Communication System CI Fan, YT Shih, JJ Huang, WR Chiu IEEE Transactions on Network and Service Management 18 (1), 701-712, 2021 | 40 | 2021 |
Encrypted data deduplication in cloud storage CI Fan, SY Huang, WC Hsu 2015 10th Asia Joint Conference on Information Security, 18-25, 2015 | 40 | 2015 |