Flexible data access control based on trust and reputation in cloud computing Z Yan, X Li, M Wang, AV Vasilakos IEEE transactions on cloud Computing 5 (3), 485-498, 2015 | 172 | 2015 |
A survey on security in D2D communications M Wang, Z Yan Mobile Networks and Applications 22, 195-208, 2017 | 130 | 2017 |
Encrypted data management with deduplication in cloud computing Z Yan, M Wang, Y Li, AV Vasilakos IEEE Cloud Computing 3 (2), 28-35, 2016 | 115 | 2016 |
Privacy-preserving authentication and key agreement protocols for D2D group communications M Wang, Z Yan IEEE Transactions on Industrial Informatics 14 (8), 3637-3647, 2017 | 83 | 2017 |
Security in D2D communications: A review M Wang, Z Yan 2015 IEEE Trustcom/BigDataSE/ISPA 1, 1199-1204, 2015 | 82 | 2015 |
UAKA-D2D: Universal authentication and key agreement protocol in D2D communications M Wang, Z Yan, V Niemi Mobile networks and Applications 22, 510-525, 2017 | 63 | 2017 |
Protect pervasive social networking based on two-dimensional trust levels Z Yan, M Wang IEEE Systems Journal 11 (1), 207-218, 2014 | 48 | 2014 |
Is 5G handover secure and private? A survey D Zhao, Z Yan, M Wang, P Zhang, B Song IEEE Internet of Things Journal 8 (16), 12855-12879, 2021 | 33 | 2021 |
Authentication and key agreement in communication network M Wang, Z Yan WO Patent WO2017107143A1, 2017 | 26 | 2017 |
Secure pervasive social networking based on multi-dimensional trust levels Z Yan, M Wang, V Niemi, R Kantola 2013 IEEE Conference on Communications and Network Security (CNS), 100-108, 2013 | 22 | 2013 |
Secure pervasive social communications based on trust in a distributed way C Huang, Z Yan, N Li, M Wang IEEE Access 4, 9225-9238, 2016 | 15 | 2016 |
Is Today's End-to-End Communication Security Enough for 5G and Its Beyond? J Zhang, Z Yan, S Fei, M Wang, T Li, H Wang IEEE Network 36 (1), 105-112, 2021 | 10 | 2021 |
XAuth: Secure and privacy-preserving cross-domain handover authentication for 5G HetNets M Wang, D Zhao, Z Yan, H Wang, T Li IEEE Internet of Things Journal 10 (7), 5962-5976, 2022 | 8 | 2022 |
Secure and reliable computation offloading in blockchain-assisted cyber-physical IoT systems D Wang, B Song, Y Liu, M Wang Digital Communications and Networks 8 (5), 625-635, 2022 | 7 | 2022 |
AAKA-D2D: Anonymous Authentication and Key Agreement Protocol in D2D Communications M Wang, Z Yan, B Song, M Atiquzzaman 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced …, 2019 | 7 | 2019 |
A scheme to secure instant community data access based on trust and contexts Z Yan, M Wang, P Zhang 2014 IEEE International Conference on Computer and Information Technology …, 2014 | 6 | 2014 |
Encrypted big data deduplication in cloud storage Z Yan, X Liang, W Ding, X Yu, M Wang, RH Deng Smart Data, 63-92, 2019 | 5 | 2019 |
Securing communication data in pervasive social networking based on trust with KP-ABE N Li, Z Yan, M Wang, LT Yang ACM Transactions on Cyber-Physical Systems 3 (1), 1-23, 2018 | 5 | 2018 |
Security Design for D2D M Wang, Z Yan Wiley 5G Ref: The Essential 5G Reference Online, 1-20, 2019 | 3 | 2019 |
Privacy preserving authentication and key agreement protocol for apparatus-to-apparatus communication M Wang, Z Yan WO Patent WO2018023733A1, 2018 | 2 | 2018 |