<?xml version="1.0"?>
<dblpperson name="XiaoXu Zhang" pid="347/3987" n="2">
<person key="homepages/347/3987" mdate="2023-05-18">
<author pid="347/3987">XiaoXu Zhang</author>
</person>
<r><article key="journals/cn/ZhangSGWK23" mdate="2023-07-21">
<author pid="347/3987">XiaoXu Zhang</author>
<author orcid="0000-0003-4513-1306" pid="20/2948">Runhua Shi</author>
<author pid="347/3774">WanPeng Guo</author>
<author pid="00/8993">Pengbo Wang</author>
<author pid="347/3814">WeiYang Ke</author>
<title>A dual auditing protocol for fine-grained access control in the edge-cloud-based smart home.</title>
<pages>109735</pages>
<year>2023</year>
<month>June</month>
<volume>228</volume>
<journal>Comput. Networks</journal>
<ee>https://doi.org/10.1016/j.comnet.2023.109735</ee>
<url>db/journals/cn/cn228.html#ZhangSGWK23</url>
</article>
</r>
<r><article key="journals/istr/XieSZWG23" mdate="2024-07-16">
<author pid="352/8911">Chenlu Xie</author>
<author orcid="0000-0003-4513-1306" pid="20/2948">Runhua Shi</author>
<author pid="347/3987">XiaoXu Zhang</author>
<author pid="00/8993">Pengbo Wang</author>
<author pid="347/3774">Wanpeng Guo</author>
<title>Verifiable outsourcing EMRs scheme with attribute-based encryption in cloud-edge environments.</title>
<pages>103526</pages>
<year>2023</year>
<month>August</month>
<volume>76</volume>
<journal>J. Inf. Secur. Appl.</journal>
<ee>https://doi.org/10.1016/j.jisa.2023.103526</ee>
<url>db/journals/istr/istr76.html#XieSZWG23</url>
</article>
</r>
<coauthors n="5" nc="1">
<co c="0" n="2"><na f="g/Guo:WanPeng" pid="347/3774">WanPeng Guo</na><na>Wanpeng Guo</na></co>
<co c="0"><na f="k/Ke:WeiYang" pid="347/3814">WeiYang Ke</na></co>
<co c="0"><na f="s/Shi:Runhua" pid="20/2948">Runhua Shi</na></co>
<co c="0"><na f="w/Wang:Pengbo" pid="00/8993">Pengbo Wang</na></co>
<co c="0"><na f="x/Xie:Chenlu" pid="352/8911">Chenlu Xie</na></co>
</coauthors>
</dblpperson>

