| Round-efficient oblivious database manipulation S Laur, J Willemson, B Zhang International Conference on Information Security, 262-277, 2011 | 153 | 2011 |
| SBVLC: Secure barcode-based visible light communication for smartphones B Zhang, K Ren, G Xing, X Fu, C Wang IEEE Transactions on Mobile Computing 15 (2), 432-446, 2016 | 144 | 2016 |
| Privacy-assured outsourcing of image reconstruction service in cloud C Wang, B Zhang, K Ren, JM Roveda IEEE Transactions on Emerging Topics in Computing 1 (1), 166-177, 2013 | 144 | 2013 |
| End-to-end verifiable elections in the standard model A Kiayias, T Zacharias, B Zhang Advances in Cryptology-EUROCRYPT 2015: 34th Annual International Conference …, 2015 | 137 | 2015 |
| Linear (hull) and algebraic cryptanalysis of the block cipher PRESENT J Nakahara Jr, P Sepehrdad, B Zhang, M Wang International Conference on Cryptology and Network Security, 58-75, 2009 | 107 | 2009 |
| ${\ssr {PriWhisper}} $: Enabling Keyless Secure Acoustic Communication for Smartphones B Zhang, Q Zhan, S Chen, M Li, K Ren, C Wang, D Ma IEEE internet of things journal 1 (1), 33-45, 2014 | 99 | 2014 |
| Algebraic, AIDA/cube and side channel analysis of KATAN family of block ciphers GV Bard, NT Courtois, J Nakahara, P Sepehrdad, B Zhang Progress in Cryptology-INDOCRYPT 2010: 11th International Conference on …, 2010 | 73 | 2010 |
| A privacy-aware cloud-assisted healthcare monitoring system via compressive sensing C Wang, B Zhang, K Ren, JM Roveda, CW Chen, Z Xu IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 2130-2138, 2014 | 70 | 2014 |
| Bool Network: An Open, Distributed, Secure Cross-Chain Notary Platform Z Yin, B Zhang, J Xu, K Lu, K Ren IEEE Transactions on Information Forensics and Security 17, 3465-3478, 2022 | 64 | 2022 |
| D-DEMOS: A distributed, end-to-end verifiable, internet voting system N Chondros, B Zhang, T Zacharias, P Diamantopoulos, S Maneas, ... 2016 IEEE 36th International Conference on Distributed Computing Systems …, 2016 | 64 | 2016 |
| A non-interactive range proof with constant communication R Chaabouni, H Lipmaa, B Zhang International conference on financial cryptography and data security, 179-199, 2012 | 60 | 2012 |
| SoK: A Systematic Study of Anonymity in Cryptocurrencies N Alsalami, B Zhang 2019 IEEE Conference on Dependable and Secure Computing (DSC), 1-9, 2019 | 57 | 2019 |
| DEMOS-2: scalable E2E verifiable elections without random oracles A Kiayias, T Zacharias, B Zhang Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 51 | 2015 |
| A treasury system for cryptocurrencies: Enabling better collaborative intelligence B Zhang, R Oliynykov, H Balogun The Network and Distributed System Security Symposium 2019, 2019 | 48 | 2019 |
| Towards everlasting privacy and efficient coercion resistance in remote electronic voting P Grontas, A Pagourtzis, A Zacharakis, B Zhang International Conference on Financial Cryptography and Data Security, 210-231, 2018 | 46 | 2018 |
| A more efficient computationally sound non-interactive zero-knowledge shuffle argument H Lipmaa, B Zhang Journal of Computer Security 21 (5), 685-719, 2013 | 41 | 2013 |
| An efficient E2E verifiable e-voting system without setup assumptions A Kiayias, T Zacharias, B Zhang IEEE Security & Privacy, 2017 | 40 | 2017 |
| Generic constant-round oblivious sorting algorithm for MPC B Zhang Provable Security: 5th International Conference, ProvSec 2011, Xi’an, China …, 2011 | 38 | 2011 |
| Proof-carrying cloud computation: The case of convex optimization Z Xu, C Wang, K Ren, L Wang, B Zhang IEEE Transactions on Information Forensics and Security 9 (11), 1790-1803, 2014 | 34 | 2014 |
| Uncontrolled randomness in blockchains: Covert bulletin board for illicit activity N Alsalami, B Zhang 2020 IEEE/ACM 28th International Symposium on Quality of Service (IWQoS), 1-10, 2020 | 31 | 2020 |