Follow
Kun He
Kun He
Verified email at whu.edu.cn
Title
Cited by
Cited by
Year
Certchain: Public and efficient certificate audit based on blockchain for tls connections
J Chen, S Yao, Q Yuan, K He, S Ji, R Du
IEEE INFOCOM 2018-IEEE conference on computer communications, 2060-2068, 2018
1622018
DeyPoS: Deduplicatable dynamic proof of storage for multi-user environments
K He, J Chen, R Du, Q Wu, G Xue, X Zhang
IEEE Transactions on Computers 65 (12), 3631-3645, 2016
1012016
Blind filtering at third parties: An efficient privacy-preserving framework for location-based services
J Chen, K He, Q Yuan, M Chen, R Du, Y Xiang
IEEE Transactions on Mobile Computing 17 (11), 2524-2535, 2018
742018
Dominating set and network coding-based routing in wireless mesh networks
J Chen, K He, R Du, M Zheng, Y Xiang, Q Yuan
IEEE Transactions on Parallel and Distributed Systems 26 (2), 423-433, 2013
722013
Secure dynamic searchable symmetric encryption with constant client storage cost
K He, J Chen, Q Zhou, R Du, Y Xiang
IEEE Transactions on Information Forensics and Security 16, 1538-1549, 2020
642020
Dynamic group-oriented provable data possession in the cloud
K He, J Chen, Q Yuan, S Ji, D He, R Du
IEEE Transactions on Dependable and Secure Computing 18 (3), 1394-1408, 2019
572019
Batch identification game model for invalid signatures in wireless mobile networks
J Chen, K He, Q Yuan, G Xue, R Du, L Wang
IEEE Transactions on Mobile Computing 16 (6), 1530-1543, 2016
502016
Liveness is not enough: Enhancing fingerprint authentication with behavioral biometrics to defeat puppet attacks
C Wu, K He, J Chen, Z Zhao, R Du
29th USENIX Security Symposium (USENIX Security 20), 2219-2236, 2020
392020
PBCert: Privacy-preserving blockchain-based certificate status validation toward mass storage management
S Yao, J Chen, K He, R Du, T Zhu, X Chen
IEEE Access 7, 6117-6128, 2018
392018
XAuth: Efficient privacy-preserving cross-domain authentication
J Chen, Z Zhan, K He, R Du, D Wang, F Liu
IEEE Transactions on Dependable and Secure Computing 19 (5), 3301-3311, 2021
372021
EliMFS: achieving efficient, leakage-resilient, and multi-keyword fuzzy search on encrypted cloud data
J Chen, K He, L Deng, Q Yuan, R Du, Y Xiang, J Wu
IEEE Transactions on Services Computing 13 (6), 1072-1085, 2017
352017
Redactable blockchain from decentralized chameleon hash functions
M Jia, J Chen, K He, R Du, L Zheng, M Lai, D Wang, F Liu
IEEE Transactions on Information Forensics and Security 17, 2771-2783, 2022
272022
Proofs of ownership and retrievability in cloud storage
R Du, L Deng, J Chen, K He, M Zheng
2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014
252014
Message‐locked proof of ownership and retrievability with remote repairing in cloud
J Chen, L Zhang, K He, M Chen, R Du, L Wang
Security and Communication Networks 9 (16), 3452-3466, 2016
172016
Biometrics-authenticated key exchange for secure messaging
M Wang, K He, J Chen, Z Li, W Zhao, R Du
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
152021
Distributed greedy coding-aware deterministic routing for multi-flow in wireless networks
J Chen, K He, Q Yuan, R Du, L Wang, J Wu
Computer Networks 105, 194-206, 2016
142016
PROCESS: Privacy-preserving on-chain certificate status service
M Jia, K He, J Chen, R Du, W Chen, Z Tian, S Ji
IEEE INFOCOM 2021-IEEE Conference on Computer Communications, 1-10, 2021
132021
Semantics-aware privacy risk assessment using self-learning weight assignment for mobile apps
J Chen, C Wang, K He, Z Zhao, M Chen, R Du, GJ Ahn
IEEE Transactions on Dependable and Secure Computing 18 (1), 15-29, 2018
132018
DELIA: Distributed efficient log integrity audit based on hierarchal multi-party state channel
J Chen, X Chen, K He, R Du, W Chen, Y Xiang
IEEE Transactions on Dependable and Secure Computing 19 (5), 3286-3300, 2021
112021
PANDA: Lightweight non-interactive privacy-preserving data aggregation for constrained devices
M Wang, K He, J Chen, R Du, B Zhang, Z Li
Future Generation Computer Systems 131, 28-42, 2022
102022
The system can't perform the operation now. Try again later.
Articles 1–20