default search action
Hui Ma 0002
Person information
- affiliation: Chinese Academy of Sciences (CAS), State Key Laboratory of Information Security, China
Other persons with the same name
- Hui Ma — disambiguation page
- Hui Ma 0001 — Victoria University of Wellington, School of Engineering and Computer Science, New Zealand (and 1 more)
- Hui Ma 0003 — Tsinghua University, Graduate School at Shenzhen, Laboratory of Optical Imaging and Sensing, China
- Hui Ma 0004 — The University of British Columbia, School of Engineering, Kelowna, BC, Canada
- Hui Ma 0005 — Xidian University, National Laboratory of Radar Signal Processing, Xi'an, China (and 2 more)
- Hui Ma 0006 — Cisco Systems Inc., Austin, TX, USA (and 1 more)
- Hui Ma 0007 — University of Queensland, School of Information Technology and Electrical Engineering, St. Lucia, QLD, Australia (and 1 more)
- Hui Ma 0008 — Harbin Engineering University, Harbin, China
- Hui Ma 0009 — Heilongjiang University, Harbin, China
- Hui Ma 0010 — Bohai University, Jinzhou, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Wenhan Xu, Hui Ma, Rui Zhang:
GAPS: GPU-accelerated processing service for SM9. Cybersecur. 7(1): 29 (2024) - [j21]Wenhan Xu, Hui Ma, Zishuai Song, Jianhao Li, Rui Zhang:
Gringotts: An Encrypted Version Control System With Less Trust on Servers. IEEE Trans. Dependable Secur. Comput. 21(2): 668-684 (2024) - 2023
- [j20]Ti Wang, Yongbin Zhou, Hui Ma, Rui Zhang:
Flexible and Controllable Access Policy Update for Encrypted Data Sharing in the Cloud. Comput. J. 66(6): 1507-1524 (2023) - [j19]Zishuai Song, Hui Ma, Shuzhou Sun, Yansen Xin, Rui Zhang:
Rainbow: reliable personally identifiable information retrieval across multi-cloud. Cybersecur. 6(1): 19 (2023) - [j18]Jianhao Li, Hui Ma, Jiabei Wang, Zishuai Song, Wenhan Xu, Rui Zhang:
Wolverine: A Scalable and Transaction-Consistent Redactable Permissionless Blockchain. IEEE Trans. Inf. Forensics Secur. 18: 1653-1666 (2023) - [j17]Zishuai Song, Hui Ma, Rui Zhang, Wenhan Xu, Jianhao Li:
Everything Under Control: Secure Data Sharing Mechanism for Cloud-Edge Computing. IEEE Trans. Inf. Forensics Secur. 18: 2234-2249 (2023) - 2022
- [j16]Shuzhou Sun, Hui Ma, Zishuai Song, Rui Zhang:
WebCloud: Web-Based Cloud Storage for Secure Data Sharing Across Platforms. IEEE Trans. Dependable Secur. Comput. 19(3): 1871-1884 (2022) - [j15]Jiabei Wang, Rui Zhang, Jianhao Li, Yuting Xiao, Hui Ma:
SeUpdate: Secure Encrypted Data Update for Multi-User Environments. IEEE Trans. Dependable Secur. Comput. 19(6): 3592-3606 (2022) - [j14]Hui Ma, Rui Zhang, Shuzhou Sun, Zishuai Song, Gaosheng Tan:
Server-Aided Fine-Grained Access Control Mechanism with Robust Revocation in Cloud Computing. IEEE Trans. Serv. Comput. 15(1): 164-173 (2022) - 2021
- [j13]Shuzhou Sun, Rui Zhang, Hui Ma:
Hashing multiple messages with SM3 on GPU platforms. Sci. China Inf. Sci. 64(9) (2021) - [j12]Ti Wang, Hui Ma, Yongbin Zhou, Rui Zhang, Zishuai Song:
Fully Accountable Data Sharing for Pay-as-You-Go Cloud Scenes. IEEE Trans. Dependable Secur. Comput. 18(4): 2005-2016 (2021) - [c8]Yuting Xiao, Rui Zhang, Hui Ma:
Modular Design of Role-Symmetric Authenticated Key Exchange Protocols. ASIACRYPT (4) 2021: 742-772 - 2020
- [j11]Shuzhou Sun, Hui Ma, Rui Zhang, Wenhan Xu:
Server-aided immediate and robust user revocation mechanism for SM9. Cybersecur. 3(1): 12 (2020) - [j10]Hui Ma, Rui Zhang, Guomin Yang, Zishuai Song, Kai He, Yuting Xiao:
Efficient Fine-Grained Data Sharing Mechanism for Electronic Medical Record Systems with Mobile Devices. IEEE Trans. Dependable Secur. Comput. 17(5): 1026-1038 (2020) - [j9]Shuzhou Sun, Rui Zhang, Hui Ma:
Efficient Parallelism of Post-Quantum Signature Scheme SPHINCS. IEEE Trans. Parallel Distributed Syst. 31(11): 2542-2555 (2020) - [c7]Ti Wang, Yongbin Zhou, Hui Ma, Yuejun Liu, Rui Zhang:
Fully Secure ABE with Outsourced Decryption against Chosen Ciphertext Attack. Inscrypt 2020: 83-103 - [c6]Gaosheng Tan, Rui Zhang, Hui Ma, Yang Tao:
An Efficient CCA-Secure Access Control Encryption for Any Policy. Inscrypt 2020: 104-112 - [c5]Yuting Xiao, Rui Zhang, Hui Ma:
Tightly Secure Two-Pass Authenticated Key Exchange Protocol in the CK Model. CT-RSA 2020: 171-198
2010 – 2019
- 2019
- [j8]Jinyong Chang, Hui Ma, Anling Zhang, Maozhi Xu, Rui Xue:
RKA Security of Identity-Based Homomorphic Signature Scheme. IEEE Access 7: 50858-50868 (2019) - [j7]Rui Zhang, Yuting Xiao, Shuzhou Sun, Hui Ma:
Efficient Multi-Factor Authenticated Key Exchange Scheme for Mobile Communications. IEEE Trans. Dependable Secur. Comput. 16(4): 625-634 (2019) - 2018
- [j6]Jianting Ning, Zhenfu Cao, Xiaolei Dong, Kaitai Liang, Hui Ma, Lifei Wei:
Auditable σ-Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing. IEEE Trans. Inf. Forensics Secur. 13(1): 94-105 (2018) - [c4]Hui Ma, Rui Zhang, Guomin Yang, Zishuai Song, Shuzhou Sun, Yuting Xiao:
Concessive Online/Offline Attribute Based Encryption with Cryptographic Reverse Firewalls - Secure and Efficient Fine-Grained Access Control on Corrupted Machines. ESORICS (2) 2018: 507-526 - [c3]Yao Lu, Noboru Kunihiro, Rui Zhang, Liqiang Peng, Hui Ma:
Certifying Variant of RSA with Generalized Moduli. ICICS 2018: 598-608 - 2017
- [j5]Rui Zhang, Hui Ma, Yao Lu, Yang Li:
Provably secure cloud storage for mobile networks with less computation and smaller overhead. Sci. China Inf. Sci. 60(12): 122104:1-122104:13 (2017) - [j4]Rui Zhang, Hui Ma, Yao Lu:
Fine-grained access control system based on fully outsourced attribute-based encryption. J. Syst. Softw. 125: 344-353 (2017) - [j3]Hui Ma, Rui Zhang, Zhiguo Wan, Yao Lu, Suqing Lin:
Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing. IEEE Trans. Dependable Secur. Comput. 14(6): 679-692 (2017) - [c2]Gaosheng Tan, Rui Zhang, Hui Ma, Yang Tao:
Access Control Encryption Based on LWE. APKC@AsiaCCS 2017: 43-50 - 2016
- [j2]Hui Ma, Rui Zhang, Wei Yuan:
Comments on "Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption". IEEE Trans. Inf. Forensics Secur. 11(4): 866-867 (2016) - 2015
- [j1]Suqing Lin, Rui Zhang, Hui Ma, Suqing Wang:
Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption. IEEE Trans. Inf. Forensics Secur. 10(10): 2119-2130 (2015) - [c1]Hui Ma, Rui Zhang:
Secure Cloud Storage for Dynamic Group: How to Achieve Identity Privacy-Preserving and Privilege Control. NSS 2015: 254-267
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-29 02:25 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint