If you made any changes in Pure these will be visible here soon.

Research Output 2001 2019

2013
21 Citations (Scopus)

Privacy-preserving smart metering with regional statistics and personal enquiry services

Chu, C-K., Liu, J. K., Wong, J. W., Zhao, Y. & Zhou, J., 2013, Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security (ASIA CSS 2013). Li, N. & Tzeng, W-G. (eds.). New York NY USA: Association for Computing Machinery (ACM), Vol. 1. p. 369 - 379 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

12 Citations (Scopus)

Realizing fully secure unrestricted ID-based ring signature in the standard model based on HIBE

Au, M. H. A., Liu, K. S. J., Susilo, W. & Zhou, J., 2013, In : IEEE Transactions on Information Forensics and Security. 8, 12, p. 1909 - 1922 14 p.

Research output: Contribution to journalArticleResearchpeer-review

26 Citations (Scopus)

Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction

Au, M. H. A., Liu, J. K., Susilo, W. & Yuen, T. H., 2013, In : Theoretical Computer Science. 469, 14 p.

Research output: Contribution to journalArticleResearchpeer-review

40 Citations (Scopus)

Security concerns in popular cloud storage services

Chu, C-K., Zhu, W. T., Han, J., Liu, K. S. J., Xu, J. & Zhou, J., 2013, In : IEEE Pervasive Computing. 12, 4, p. 50 - 57 8 p.

Research output: Contribution to journalArticleResearchpeer-review

3 Citations (Scopus)

Threshold-oriented optimistic fair exchange

Wang, Y., Au, M. H. A., Liu, J. K., Yuen, T. H. & Susilo, W., 2013, Proceedings of the 7th International Conference on Network and System Security (NSS 2013). Lopez, J., Huang, X. & Sandhu, R. (eds.). Heidelberg Germany: Springer, Vol. 7873. p. 424 - 438 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

4 Citations (Scopus)

Towards anonymous ciphertext indistinguishability with identity leakage

Yuen, T. H., Zhang, C., Chow, S. S-M. & Liu, J. K., 2013, 7th International Conference on Provable Security (ProvSec 2013). Susilo, W. & Reyhanitabar, R. (eds.). Heidelberg Germany: Springer, Vol. 8209. p. 139 - 153 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2014
52 Citations (Scopus)

A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing

Liang, K., Au, M. H., Liu, J. K., Susilo, W., Wong, D. S., Yang, G., Phuong, T. V. X. & Xie, Q., Oct 2014, In : IEEE Transactions on Information Forensics and Security. 9, 10, p. 1667 - 1680 14 p.

Research output: Contribution to journalArticleResearchpeer-review

74 Citations (Scopus)

An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing

Liang, K. A., Liu, J. K., Wong, D. S. & Susilo, W., 2014, Computer Security - ESORICS 2014: 19th European Symposium on Research in Computer Security Wroclaw, Poland, September 7-11, 2014 - Proceedings, Part II. Kutylowski, M. & Vaidya, J. (eds.). Heidelberg Germany: Springer, p. 257-272 16 p. (Lecture Notes in Computer Science; vol. 8712).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

40 Citations (Scopus)

An efficient PHR service system supporting fuzzy keyword search and fine-grained access control

Xhafa, F., Wang, J., Chen, X., Liu, J. K., Li, J. & Krause, P., Sep 2014, In : Soft Computing. 18, 9, p. 1795 - 1802 8 p.

Research output: Contribution to journalArticleResearchpeer-review

33 Citations (Scopus)

A new payment system for enhancing location privacy of electric vehicles

Au, M. H. A., Liu, J. K., Fang, J., Jiang, Z. L., Susilo, W. & Zhou, J., Jan 2014, In : IEEE Transactions on Vehicular Technology. 63, 1, p. 3 - 18 16 p.

Research output: Contribution to journalArticleResearchpeer-review

11 Citations (Scopus)

A secure remote data integrity checking cloud storage system from threshold encryption

Yao, C., Xu, L., Huang, X. & Liu, J. K., Dec 2014, In : Journal of Ambient Intelligence and Humanized Computing. 5, 6, p. 857-865 9 p.

Research output: Contribution to journalArticleResearchpeer-review

12 Citations (Scopus)

Efficient and verifiable algorithm for secure outsourcing of large-scale linear programming

Nie, H., Chen, X., Li, J., Liu, J. & Lou, W., 2014, Proceedings - 2014 IEEE/AINA 28th International Conference on Advanced Information Networking and Applications, AINA 2014: 13-16 May 2014, University of Victoria, Victoria, Canada. Barolli, L., Fun Li, K., Enokido, T., Xhafa, F. & Takizawa, M. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 591-596 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

6 Citations (Scopus)

GO-ABE: group-oriented attribute-based encryption

Li, M., Huang, X., Liu, J. K. & Xu, L., 2014, Network and System Security: 8th International Conference, NSS 2014 Xi’an, China, October 15-17, 2014 Proceedings. Au, M. H., Carminati, B. & Kuo, C-C. J. (eds.). Heidelberg Germany: Springer, p. 260-270 11 p. (Lecture Notes in Computer Science; vol. 8792).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

24 Citations (Scopus)

Identity-based encryption with post-challenge auxiliary inputs for secure cloud applications and sensor networks

Yuen, T. H., Zhang, Y., Yiu, S. M. & Liu, J. K., 2014, Computer Security - ESORICS 2014: 19th European Symposium on Research in Computer Security Wroclaw, Poland, September 7-11, 2014 - Proceedings, Part II. Kutylowski, M. & Vaidya, J. (eds.). Heidelberg Germany: Springer, p. 130-147 18 p. (Lecture Notes in Computer Science; vol. 8712).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

57 Citations (Scopus)

Improvements on an authentication scheme for vehicular sensor networks

Liu, J. K., Yuen, T. H., Au, M. H. & Susilo, W., Apr 2014, In : Expert Systems with Applications. 41, 5, p. 2559 - 2564 6 p.

Research output: Contribution to journalArticleResearchpeer-review

31 Citations (Scopus)

Linkable ring signature with unconditional anonymity

Liu, J. K., Au, M. H., Susilo, W. & Zhou, J., Jan 2014, In : IEEE Transactions on Knowledge and Data Engineering. 26, 1, p. 157-165 9 p.

Research output: Contribution to journalArticleResearchpeer-review

7 Citations (Scopus)

New insight to preserve online survey accuracy and privacy in big data era

Liu, J. K., Au, M. H. A., Huang, X., Susilo, W., Zhou, J. & Yu, Y., 2014, Computer Security - ESORICS 2014: 9th European Symposium on Research in Computer Security Wroclaw, Poland, September 7-11, 2014 - Proceedings, Part II. Kutylowski, M. & Vaidya, J. (eds.). Heidelberg Germany: Springer, p. 182-199 18 p. (Lecture Notes in Computer Science; vol. 8713).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

12 Citations (Scopus)

TIMER: Secure and reliable cloud storage against data re-outsourcing

Jiang, T., Chen, X., Li, J., Wong, D. S., Ma, J. & Liu, J. K., 2014, Proceedings of the 10th International Confrerence on Information Security Practice and Experience (ISPEC 2014). Huang, X. & Zhou, J. (eds.). Heidelberg Germany: Springer, Vol. 8434. p. 346 - 358 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperOtherpeer-review

158 Citations (Scopus)

Toward efficient and privacy-preserving computing in big data era

Lu, R., Zhu, H., Liu, X., Liu, J. K. & Shao, J., 2014, In : IEEE Network. 28, 4, p. 46-50 5 p.

Research output: Contribution to journalArticleResearchpeer-review

2015
4 Citations (Scopus)

A new public remote integrity checking scheme with user privacy

Feng, Y., Mu, Y., Yang, G. & Liu, K. S., 2015, Information Security and Privacy: 20th Australian Conference (ACISP 2015). Foo, E. & Stebila, D. (eds.). Cham Switzerland: Springer, Vol. 9144. p. 377 - 394 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

A resolving set based algorithm for fault identification in wireless mesh networks

Wang, X., Xu, L., Zhou, S. & Liu, J. K., Mar 2015, In : Journal of Universal Computer Science. 21, 3, p. 384-405 22 p.

Research output: Contribution to journalArticleResearchpeer-review

66 Citations (Scopus)

A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing

Liang, K., Au, M. H., Liu, J. K., Susilo, W., Wong, D. S., Yang, G., Yu, Y. & Yang, A., Nov 2015, In : Future Generation Computer Systems. 52, p. 95-108 14 p.

Research output: Contribution to journalArticleResearchpeer-review

118 Citations (Scopus)

A secure cloud computing based framework for big data information management of smart grid

Baek, J., Vu, Q. H., Liu, J. K., Huang, X. & Xiang, Y., 2015, In : IEEE Transactions on Cloud Computing. 3, 2, p. 233-244 12 p.

Research output: Contribution to journalArticleResearchpeer-review

9 Citations (Scopus)

Asymmetric cross-cryptosystem re-encryption applicable to efficient and secure mobile access to outsourced data

Deng, H., Wu, Q., Qin, B., Susilo, W., Liu, J. & Shi, W., 2015, ASIACCS'15 - Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security. Zhou, J. & Ahn, G-J. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 393 - 404 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2 Citations (Scopus)

Comments on 'efficient revocable certificateless encryption secure in the standard model'

Tang, Y., Chow, S. S. M. & Liu, J. K., 2015, In : Computer Journal. 58, 4, p. 779-781 3 p.

Research output: Contribution to journalComment / DebateResearchpeer-review

6 Citations (Scopus)

Cooperative attribute-based access control for enterprise computing system

Li, M., Huang, X., Liu, J. K., Xu, L. & Wu, W., 2015, In : International Journal of Embedded Systems. 7, 3/4, p. 191-202 12 p.

Research output: Contribution to journalArticleResearchpeer-review

70 Citations (Scopus)

Cost-effective authentic and anonymous data sharing with forward security

Huang, X., Liu, J. K., Tang, S., Xiang, Y., Liang, K., Xu, L. & Zhou, J., 1 Apr 2015, In : IEEE Transactions on Computers. 64, 4, p. 971-983 13 p.

Research output: Contribution to journalArticleResearchpeer-review

Editorial

Chen, X., Huang, X. & Liu, J. K., 2015, In : International Journal of High Performance Computing and Networking. 8, 2, p. 91-92 2 p.

Research output: Contribution to journalEditorialOtherpeer-review

Open Access
File
8 Citations (Scopus)

Efficient and fully CCA secure conditional proxy re-encryption from hierarchical identity-based encryption

Liang, K. A., Susilo, W., Liu, K. S. & Wong, D. S., 2015, In : Computer Journal. 58, 10, p. 2778 - 2792 15 p.

Research output: Contribution to journalArticleResearchpeer-review

57 Citations (Scopus)

Extended proxy-assisted approach: Achieving revocable fine-grained encryption of cloud data

Yang, Y., Liu, K. S., Liang, K. A., Choo, K-K. R. & Zhou, J., 2015, 20th European Symposium on Research in Computer Security: Proceedings, Part II (ESORICS 2015). Pernul, G., Ryan, P. Y. A. & Weippl, E. (eds.). Cham Switzerland: Springer, p. 146 - 166 21 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

7 Citations (Scopus)

Fully secure ciphertext-policy attribute based encryption with security mediator

Chen, Y., Jiang, Z. L., Yiu, S. M., Liu, J. K., Au, M. H. A. & Wang, X., 2015, Information and Communications Security: 16th International Conference, ICICS 2014 Hong Kong, China, December 16–17, 2014 Revised Selected Papers. C.K. Hui, L., Qing, S. H., Shi, E. & Yiu, S. M. (eds.). Cham Switzerland: Springer, p. 274-289 16 p. (Lecture Notes in Computer Science ; vol. 8958).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

20 Citations (Scopus)

k-times attribute-based anonymous access control for cloud computing

Yuen, T. H., Liu, J. K., Au, M. H., Huang, X., Susilo, W. & Zhou, J., 1 Sep 2015, In : IEEE Transactions on Computers. 64, 9, p. 2595-2608 14 p., 6945366.

Research output: Contribution to journalArticleResearchpeer-review

5 Citations (Scopus)

Lightweight anonymous authentication for ad Hoc group: A ring signature approach

Yang, X., Wu, W., Liu, K. S. & Chen, X., 2015, 9th International Conference on Provable Security (ProvSec 2015). Au, M-H. & Miyaji, A. (eds.). Cham Switzerland: Springer, p. 215 - 226 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Message from LSNS 2015 Workshop Chairs

Wang, H. & Liu, J. K., 30 Oct 2015, Proceedings - 2015 9th International Conference on Frontier of Computer Science and Technology, FCST 2015. p. xiv 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperOther

1 Citation (Scopus)

On the security of a lightweight authentication and encryption scheme for mobile ad hoc network

Yap, W-S., Liu, J. K., Tan, S. Y. & Goi, B-M., 2015, In : Security and Communication Networks. 8, 17, p. 3094-3098 5 p.

Research output: Contribution to journalArticleOtherpeer-review

Open Access
File

PEVTS: Privacy-preserving electric vehicles test-bedding scheme

Yang, X., Liu, J. K., Wu, W., Au, M. H. A. & Susilo, W., Dec 2015, Proceedings of the 2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS 2015): 14-17 December 2015, Melbourne, Victoria, Australia. Gu, T. & Prasanna, V. K. (eds.). Piscataway, NJ: IEEE, Institute of Electrical and Electronics Engineers, p. 282-289 8 p. 7384306

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

9 Citations (Scopus)

Practical threshold password-authenticated secret sharing protocol

Yi, X., Hao, F., Chen, L. & Liu, K. S., 2015, 20th European Symposium on Research in Computer Security: Proceedings, Part I (ESORICS 2015). Pernul, G., Ryan, P. Y. A. & Weippl, E. (eds.). Cham Switzerland: Springer, p. 347 - 365 19 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

20 Citations (Scopus)

Privacy concerns for photo sharing in online social networks

Liang, K. A., Liu, K. S. J., Lu, R. & Wong, D. S., 2015, In : IEEE Internet Computing. 19, 2, p. 58 - 63 6 p.

Research output: Contribution to journalArticleResearchpeer-review

52 Citations (Scopus)

Privacy-preserving ciphertext multi-sharing control for big data storage

Liang, K. A., Susilo, W. & Liu, K. S., 2015, In : IEEE Transactions on Information Forensics and Security. 10, 8, p. 1578 - 1589 12 p.

Research output: Contribution to journalArticleResearchpeer-review

37 Citations (Scopus)

Secure sharing and searching for real-time video data in mobile cloud

Liu, K. S. J., Au, M. H. A., Susilo, W., Liang, K. A., Lu, R. & Srinivasan, B., 2015, In : IEEE Network. 29, 2, p. 46 - 50 5 p.

Research output: Contribution to journalArticleResearchpeer-review

88 Citations (Scopus)

Secure sharing of personal health records in cloud computing: ciphertext-policy attribute-based signcryption

Liu, J., Huang, X. & Liu, J. K., Nov 2015, In : Future Generation Computer Systems. 52, p. 67-76 10 p.

Research output: Contribution to journalArticleResearchpeer-review

24 Citations (Scopus)

Time-bound anonymous authentication for roaming networks

Liu, J. K., Chu, C-K., Chow, S. S. M., Huang, X., Au, M. H. & Zhou, J., Jan 2015, In : IEEE Transactions on Information Forensics and Security. 10, 1, p. 178-189 12 p.

Research output: Contribution to journalArticleResearchpeer-review

24 Citations (Scopus)

Towards secure and reliable cloud storage against data re-outsourcing

Jiang, T., Chen, X., Li, J., Wong, D. S., Ma, J. & Liu, J. K., Nov 2015, In : Future Generation Computer Systems. 52, p. 86-94 9 p.

Research output: Contribution to journalArticleResearchpeer-review

14 Citations (Scopus)

Universal designated verifier transitive signatures for graph-based big data

Hou, S., Huang, X., Liu, K. S., Li, J. & Xu, L., 2015, In : Information Sciences. 318, p. 144 - 156 13 p.

Research output: Contribution to journalArticleResearchpeer-review

2016
90 Citations (Scopus)

An efficient file hierarchy attribute-based encryption scheme in cloud computing

Wang, S., Zhou, J., Liu, J. K., Yu, J., Chen, J. & Xie, W., 1 Jun 2016, In : IEEE Transactions on Information Forensics and Security. 11, 6, p. 1265-1277 13 p.

Research output: Contribution to journalArticleResearchpeer-review

31 Citations (Scopus)

An efficient non-interactive multi-client searchable encryption with support for boolean queries

Sun, S-F., Liu, J. K., Sakzad, A., Steinfeld, R. & Yuen, T. H., 15 Sep 2016, Computer Security - ESORICS 2016: 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26–30, 2016, Proceedings, Part I. Askoxylakis, I., Ioannidis, S., Katsikas, S. & Meadows, C. (eds.). Switzerland: Springer, p. 154-172 19 p. (Lecture Notes in Computer Science ; vol. 9878 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

6 Citations (Scopus)

Anonymizing bitcoin transaction

Wijaya, D. A., Liu, J. K., Steinfeld, R., Sun, S. F. & Huang, X., 2016, Information Security Practice and Experience : 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16–18, 2016, Proceedings. Bao, F., Chen, L., Deng, R. H. & Wang, G. (eds.). Cham, Switzerland: Springer, p. 271-283 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10060 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

11 Citations (Scopus)

Anonymous identity-based broadcast encryption with chosen-ciphertext security

He, K., Weng, J., Liu, J-N., Liu, J. K., Liu, W. & Deng, R. H., 30 May 2016, ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security: May 30–June 3, 2016, Xi’an, China. Wang, X. & Huang, X. (eds.). New York, NY: Association for Computing Machinery (ACM), p. 247-255 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

64 Citations (Scopus)

Attribute-based data sharing scheme revisited in cloud computing

Wang, S., Liang, K., Liu, J. K., Chen, J., Yu, J. & Xie, W., 1 Aug 2016, In : IEEE Transactions on Information Forensics and Security. 11, 8, p. 1661-1673 13 p., 7448433.

Research output: Contribution to journalArticleResearchpeer-review

3 Citations (Scopus)

Credential wrapping: From anonymous password authentication to anonymous biometric authentication

Yang, Y., Weng, J., Lu, H., Zhang, Y., Liu, J. K. & Zhou, J., 30 May 2016, ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security: May 30 – June 3, 2016, Xi’an, China. Wang, X. & Huang, X. (eds.). New York, NY: Association for Computing Machinery (ACM), p. 141-151 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch