| A practical privacy-preserving data aggregation (3PDA) scheme for smart grid Y Liu, W Guo, CI Fan, L Chang, C Cheng IEEE Transactions on Industrial Informatics 15 (3), 1767-1774, 2018 | 316 | 2018 |
| Privacy-enhanced data aggregation scheme against internal attackers in smart grid CI Fan, SY Huang, YL Lai IEEE Transactions on Industrial informatics 10 (1), 666-675, 2013 | 278 | 2013 |
| Robust remote authentication scheme with smart cards CI Fan, YC Chan, ZK Zhang Computers & Security 24 (8), 619-628, 2005 | 222 | 2005 |
| Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics CI Fan, YH Lin IEEE Transactions on Information Forensics and Security 4 (4), 933-945, 2009 | 210 | 2009 |
| Anonymous multireceiver identity-based encryption CI Fan, LY Huang, PH Ho IEEE Transactions on Computers 59 (9), 1239-1249, 2010 | 164 | 2010 |
| Malware detection systems based on API log data mining CI Fan, HW Hsiao, CH Chou, YF Tseng 2015 IEEE 39th annual computer software and applications conference 3, 255-260, 2015 | 116 | 2015 |
| A privacy-preserving federated learning system for android malware detection based on edge computing RH Hsu, YC Wang, CI Fan, B Sun, T Ban, T Takahashi, TW Wu, SW Kao 2020 15th Asia Joint Conference on Information Security (AsiaJCIS), 128-136, 2020 | 99 | 2020 |
| Low-computation partially blind signatures for electronic cash CI Fan, CL Lei IEICE Transactions on Fundamentals of Electronics, Communications and …, 1998 | 93 | 1998 |
| Arbitrary-state attribute-based encryption with dynamic membership CI Fan, VSM Huang, HM Ruan IEEE Transactions on Computers 63 (8), 1951-1961, 2013 | 83 | 2013 |
| Randomization enhanced Chaum's blind signature scheme CI Fan, WK Chen, YS Yeh Computer Communications 23 (17), 1677-1680, 2000 | 81 | 2000 |
| Provably secure and generalized signcryption with public verifiability for secure data transmission between resource-constrained IoT devices A Karati, CI Fan, RH Hsu IEEE Internet of Things Journal 6 (6), 10431-10440, 2019 | 72 | 2019 |
| Efficient blind signature scheme based on quadratic residues CI Fan, CL Lei Electronics Letters 32 (9), 811-813, 1996 | 66 | 1996 |
| Provably secure randomized blind signature scheme based on bilinear pairing CI Fan, WZ Sun, VSM Huang Computers & Mathematics with Applications 60 (2), 285-293, 2010 | 64 | 2010 |
| Controllable privacy preserving search based on symmetric predicate encryption in cloud storage CI Fan, SY Huang Future Generation Computer Systems 29 (7), 1716-1724, 2013 | 62 | 2013 |
| Cross-Network-Slice Authentication Scheme for the 5th Generation Mobile Communication System CI Fan, YT Shih, JJ Huang, WR Chiu IEEE Transactions on Network and Service Management 18 (1), 701-712, 2021 | 58 | 2021 |
| An extended multi-server-based user authentication and key agreement scheme with user anonymity CT Li, CC Lee, CY Weng, CI Fan KSII Transactions on Internet and Information Systems (TIIS) 7 (1), 119-131, 2013 | 55 | 2013 |
| User efficient blind signatures CI Fan, CL Lei Electronics letters 34 (6), 544-546, 1998 | 51 | 1998 |
| Encrypted data deduplication in cloud storage CI Fan, SY Huang, WC Hsu 2015 10th Asia joint conference on information security, 18-25, 2015 | 46 | 2015 |
| Secure hierarchical bitcoin wallet scheme against privilege escalation attacks CI Fan, YF Tseng, HP Su, RH Hsu, H Kikuchi International Journal of Information Security 19 (3), 245-255, 2020 | 43 | 2020 |
| Truly Non-Repudiation Certificateless Short Signature Scheme from Bilinear Pairings. CI Fan, RH Hsu, PH Ho J. Inf. Sci. Eng. 27 (3), 969-982, 2011 | 43 | 2011 |