If you made any changes in Pure these will be visible here soon.

Research Output 2001 2019

2016

Efficient construction of completely non-malleable CCA secure public key encryption

Sun, S. F., Gu, D., Liu, J. K., Parampalli, U. & Yuen, T. H., 30 May 2016, ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security. Wang, X. & Huang, X. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 901-906 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

6 Citations (Scopus)

Efficient fine-grained access control for secure personal health records in cloud computing

He, K., Weng, J., Liu, J. K., Zhou, W. & Liu, J. N., 2016, Network and System Security : 10th International Conference, NSS 2016, Taipei, Taiwan, September 28–30, 2016, Proceedings. Chen, J., Su, C., Piuri, V. & Yung, M. (eds.). Cham, Switzerland: Springer, p. 65-79 15 p. (Lecture Notes in Computer Science ; vol. 9955 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

45 Citations (Scopus)

Efficient handover authentication with user anonymity and untraceability for mobile cloud computing

Yang, X., Huang, X. & Liu, J., Sep 2016, In : Future Generation Computer Systems. 62, p. 190-195 6 p.

Research output: Contribution to journalArticleResearchpeer-review

16 Citations (Scopus)

Efficient multi-function data sharing and searching mechanism for cloud-based encrypted data

Liang, K. A., Su, C., Liu, J. K. & Chen, J., 30 May 2016, ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security: May 30 – June 3, 2016, Xi’an, China. Wang, X. & Huang, X. (eds.). New York, NY: Association for Computing Machinery (ACM), p. 83-94 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

5 Citations (Scopus)

Efficient privacy-preserving charging station reservation system for electric vehicles

Liu, J. K., Susilo, W., Yuen, T. H., Au, M. H., Fang, J., Jiang, Z. L. & Zhou, J., 2016, In : Computer Journal. 59, 7, p. 1040-1053 14 p.

Research output: Contribution to journalArticleResearchpeer-review

1 Citation (Scopus)

Faulty instantiations of threshold ring signature from threshold proof-of-knowledge protocol

Liu, J. K., Yeo, S. L., Yap, W-S., Chow, S. S. M., Wong, D. S. & Susilo, W., 21 Jul 2016, In : Computer Journal. 59, 7, p. 945-954 10 p.

Research output: Contribution to journalArticleResearchpeer-review

52 Citations (Scopus)

Fine-grained two-factor access control for web-based cloud computing services

Liu, J. K., Au, M. H., Huang, X., Lu, R. & Li, J., 2016, In : IEEE Transactions on Information Forensics and Security. 11, 3, p. 484-497 14 p.

Research output: Contribution to journalArticleResearchpeer-review

9 Citations (Scopus)

On lightweight security enforcement in cyber-physical systems

Yang, Y., Lu, J., Choo, K-K. R. & Liu, J. K., 2016, Lightweight Cryptography for Security and Privacy: 4th International Workshop, LightSec 2015, Bochum, Germany, September 10–11, 2015, Revised Selected Papers. Güneysu, T., Moradi, A. & Leander, G. (eds.). Switzerland: Springer, p. 97-112 16 p. (Lecture Notes in Computer Science ; vol. 9542).

Research output: Chapter in Book/Report/Conference proceedingChapter (Book)Researchpeer-review

2 Citations (Scopus)

On the security of two identity-based conditional proxy re-encryption schemes

He, K., Weng, J., Deng, R. H. & Liu, J. K., 2016, In : Theoretical Computer Science. 652, p. 18-27 10 p.

Research output: Contribution to journalArticleResearchpeer-review

Preface

Liu, J. K. & Steinfeld, R., 2016, Information Security and Privacy: 21st Australasian Conference on Information Security and Privacy (ACISP 2016): Melbourne, Vic, Australia, July 4–6, 2016, Proceedings, Part I. Switzerland: Springer, p. vi 1 p. (Lecture Notes in Computer Science; vol. 9722).

Research output: Chapter in Book/Report/Conference proceedingForeword / PostscriptOtherpeer-review

Preface

Liu, J. K. & Steinfeld, R., 2016, Information Security and Privacy: 21st Australasian Conference on Information Security and Privacy (ACISP 2016): Melbourne, Vic, Australia, July 4–6, 2016, Proceedings, Part II. Switzerland: Springer, Vol. 9723. p. v (Lecture Notes in Computer Science; vol. 9723).

Research output: Chapter in Book/Report/Conference proceedingForeword / PostscriptOtherpeer-review

23 Citations (Scopus)

Privacy-preserving and regular language search over encrypted cloud data

Liang, K., Huang, X., Guo, F. & Liu, J. K., 2016, In : IEEE Transactions on Information Forensics and Security. 11, 10, p. 2365-2376 12 p., 7492188.

Research output: Contribution to journalArticleResearchpeer-review

33 Citations (Scopus)

Privacy-preserving public auditing protocol for low-performance end devices in cloud

Li, J., Zhang, L., Liu, J. K., Qian, H. & Dong, Z., 2016, In : IEEE Transactions on Information Forensics and Security. 11, 11, p. 2572-2583 12 p., 7506095.

Research output: Contribution to journalArticleResearchpeer-review

1 Citation (Scopus)

RKA-secure public key encryptions against efficiently invertible functions

Sun, S-F., Liu, J. K., Yu, Y., Qin, B. & Gu, D., 2016, In : Computer Journal. 59, 11, p. 1637-1658 22 p.

Research output: Contribution to journalArticleResearchpeer-review

6 Citations (Scopus)

Secret picture: An efficient tool for mitigating deletion delay on OSN

Lai, S., Liu, J. K., Choo, K-K. R. & Liang, K. A., 1 Mar 2016, Information and Communications Security: 17th International Conference, ICICS 2015 Beijing, China, December 9–11, 2015, Revised Selected Papers. Qing, S., Kim, K., Okamoto, E. & Liu, D. (eds.). Switzerland: Springer, p. 467-477 11 p. (Lecture Notes in Computer Science; vol. 9543).

Research output: Chapter in Book/Report/Conference proceedingChapter (Book)Researchpeer-review

2 Citations (Scopus)

Special issue on security and privacy in mobile clouds

Chow, S. S-M. (ed.), Hengartner, U. (ed.), Liu, J. K. (ed.) & Ren, K. (ed.), 1 Jun 2016, In : Pervasive and Mobile Computing. 28, p. 100-101 2 p.

Research output: Contribution to journalEditorialOtherpeer-review

Towards certificate-based group encryption

Ren, Y., Luo, X., Wu, Q., Liu, J. K. & Zhang, P., 2016, Provable Security: 10th International Conference, ProvSec 2016, Nanjing, China, November 10–11, 2016, Proceedings. Chen, L. & Han, J. (eds.). Cham, Switzerland: Springer, p. 296-305 10 p. (Lecture Notes in Computer Science ; vol. 10005 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

14 Citations (Scopus)

Trusted Boolean Search on Cloud Using Searchable Symmetric Encryption

Zuo, C., Macindoe, J., Yang, S., Steinfeld, R. & Liu, J. K., 2016, 2016 IEEE Trustcom/BigDataSE/ISPA: Tianjin, China, 23-26 August, 2016, [Proceedings]. Xiang, Y., Ren, K. & Feng, D. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 113-120 8 p. 7846936

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

35 Citations (Scopus)

Two-factor data security protection mechanism for cloud storage system

Liu, J. K., Liang, K., Susilo, W., Liu, J. & Xiang, Y., 1 Jun 2016, In : IEEE Transactions on Computers. 65, 6, p. 1992-2004 13 p., 7173024.

Research output: Contribution to journalArticleResearchpeer-review

3 Citations (Scopus)

While mobile encounters with clouds

Au, M. H. A., Liang, K. A., Liu, J. K. & Lu, R., 2016, Network and System Security : 10th International Conference, NSS 2016, Taipei, Taiwan, September 28–30, 2016, Proceedings. Chen, J., Piuri, V., Su, C. & Yung, M. (eds.). Cham, Switzerland: Springer, p. 3-18 16 p. (Lecture Notes in Computer Science ; vol. 9955 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

2017
8 Citations (Scopus)

A general framework for secure sharing of personal health records in cloud system

Au, M. H., Yuen, T. H., Liu, J. K., Susilo, W., Huang, X., Xiang, Y. & Jiang, Z. L., Dec 2017, In : Journal of Computer and System Sciences. 90, p. 46-62 17 p.

Research output: Contribution to journalArticleResearchpeer-review

11 Citations (Scopus)

A new blockchain-based Value-Added Tax system

Wijaya, D. A., Liu, J. K., Suwarsono, D. A. & Zhang, P., 2017, Provable Security : 11th International Conference, ProvSec 2017 Xi’an, China, October 23–25, 2017 Proceedings. Okamoto, T., Yu, Y., Au, M. H. & Li, Y. (eds.). Cham Switzerland: Springer, p. 471-486 16 p. (Lecture Notes in Computer Science; vol. 10592 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

3 Citations (Scopus)

A new public remote integrity checking scheme with user and data privacy

Feng, Y., Yang, G. & Liu, J. K., 2017, In : International Journal of Applied Cryptography. 3, 3, p. 196-209 14 p.

Research output: Contribution to journalArticleResearchpeer-review

2 Citations (Scopus)

An implementation of access-control protocol for IoT home scenario

Wu, X., Steinfeld, R., Liu, J. & Rudolph, C., 2017, Proceedings - 16th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2017). Zhu, G., Yao, S., Cui, X. & Xu, S. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 31-37 7 p. 7959965

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

Open Access
File
1 Citation (Scopus)

Anonymous anti-Sybil attack protocol for mobile healthcare networks analytics

Zhang, P., Zhang, X., Sun, X., Liu, J. K., Yu, J. & Jiang, Z. L., 7 Sep 2017, Proceedings - The 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, The 11th IEEE International Conference on Big Data Science and Engineering and the 14th IEEE International Conference on Embedded Software and Systems: 2017 IEEE Trustcom/BigDataSE/ICESS. Nanda, P., Xiang, Y. & Mu, Y. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 668-674 7 p. 8029501

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

10 Citations (Scopus)

A trust and privacy preserving handover authentication protocol for wireless networks

Yang, X., Zhang, Y., Liu, J. K. & Zeng, Y., 7 Feb 2017, 2016 IEEE Trustcom/BigDataSE/ISPA: Tianjin, China, 23-26 August, 2016, [Proceedings]. Xiang, Y., Ren, K. & Feng, D. (eds.). Piscataway, NJ : IEEE, Institute of Electrical and Electronics Engineers, p. 138-143 6 p. 7846939

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

4 Citations (Scopus)

Attribute-based encryption with expressive and authorized keyword search

Cui, K-H., Deng, R. H., Liu, J. K. & Li, Y., 2017, Information Security and Privacy: 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part I. Pieprzyk, J. & Suriadi, S. (eds.). Cham, Switzerland: Springer, p. 106-126 21 p. (Lecture Notes in Computer Science ; vol. 10342 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

Editorial: Special issue on security and privacy for smart cities

Liu, J. K., Choo, K-K. R., Huang, X. & Au, M. H. A., Oct 2017, In : Personal and Ubiquitous Computing. 21, 5, p. 775 1 p.

Research output: Contribution to journalEditorialOtherpeer-review

Editorial: Special issue on security data science and cyber threat management

Huang, X. (ed.), Liu, J. (ed.) & Lopez, J. (ed.), 1 Aug 2017, In : Computers and Security. 69, p. 1-2 2 p.

Research output: Contribution to journalEditorialOtherpeer-review

Erratum to: Special issue on security and privacy for smart cities (Personal and Ubiquitous Computing, (2017), 21, 5, (775), 10.1007/s00779-017-1043-z)

Liu, J. K., Choo, K-K. R., Huang, X. & Au, M. H., 1 Oct 2017, In : Personal and Ubiquitous Computing. 21, 5, p. 777 1 p.

Research output: Contribution to journalComment / DebateOtherpeer-review

7 Citations (Scopus)

Multi-user cloud-based secure keyword search

Kasra Kermanshahi, S., Liu, J. K. & Steinfeld, R., 2017, Information Security and Privacy: 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part I. Pieprzyk, J. & Suriadi, S. (eds.). Cham, Switzerland: Springer, p. 227-247 21 p. (Lecture Notes in Computer Science ; vol. 10342).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Preface

Liu, J. K. & Samarati, P., 2017, Information Security Practice and Experience: 13th International Conference, ISPEC 2017 Melbourne, VIC, Australia, December 13–15, 2017 Proceedings. K. Liu, J. & Samarati, P. (eds.). Cham Switzerland: Springer, p. VI 1 p.

Research output: Chapter in Book/Report/Conference proceedingForeword / PostscriptOther

38 Citations (Scopus)

RingCT 2.0: A compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency Monero

Sun, S-F., Au, M. H., Liu, J. K. & Yuen, T. H., 2017, Computer Security – ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Proceedings. Foley, S., Snekkenes, E. & Gollmann, D. (eds.). Cham, Switzerland: Springer, Vol. 10493 . p. 456-474 19 p. (Lecture Notes in Computer Science; vol. 10493 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

4 Citations (Scopus)

Towards multi-user searchable encryption supporting boolean query and fast decryption

Wang, Y., Wang, J., Sun, S-F., Liu, J. K., Susilo, W. & Chen, X., 2017, Provable Security: 11th International Conference, ProvSec 2017, 2017, Xi'an, China, October 23-25, 2017. Okamoto, T., Yu, Y., Ao, M. H. & Li, Y. (eds.). Cham Switzerland: Springer, Vol. 10592 . p. 24-38 15 p. (Lecture Notes in Computer Science ; vol. 10592 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2 Citations (Scopus)

Towards revocable fine-grained encryption of cloud data: Reducing trust upon cloud

Yang, Y., Liu, J., Wei, Z. & Huang, X., 2017, Information Security and Privacy: 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part I. Pieprzyk, J. & Suriadi, S. (eds.). Cham, Switzerland: Springer, p. 127-144 18 p. (Lecture Notes in Computer Science ; vol. 10342 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

8 Citations (Scopus)

Towards secure and cost-effective fuzzy access control in mobile cloud computing

Wu, W., Hu, S., Yang, X., Liu, J. K. & Au, M. H., 1 May 2017, In : Soft Computing. 21, 10, p. 2643-2649 7 p.

Research output: Contribution to journalArticleResearchpeer-review

4 Citations (Scopus)

Trust enhancement over range search for encrypted data

Yang, X., Lee, T. T., Liu, J. K. & Huang, X., 7 Feb 2017, 2016 IEEE Trustcom/BigDataSE/ISPA: Tianjin, China, 23-26 August, 2016, [Proceedings]. Xiang, Y., Ren, K. & Feng, D. (eds.). Piscataway, NJ : IEEE, Institute of Electrical and Electronics Engineers, p. 66-73 8 p. 7846930

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

2018
1 Citation (Scopus)

Access control encryption with efficient verifiable sanitized decryption

Wang, H., Chen, K., Liu, J. K., Hu, Z. & Long, Y., Oct 2018, In : Information Sciences. 465, p. 72-85 14 p.

Research output: Contribution to journalArticleResearchpeer-review

Adding confidential transactions to cryptocurrency IOTA with Bulletproofs

Ince, P., Liu, J. K. & Zhang, P., 2018, Network and System Security : 12th International Conference, NSS 2018 Hong Kong, China, August 27–29, 2018 Proceedings. Au, M. H., Yiu, S. M., Li, J., Luo, X., Wang, C., Castiglione, A. & Kluczniak, K. (eds.). Cham Switzerland: Springer, p. 32-45 14 p. (Lecture Notes in Computer Science; vol. 11058 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

1 Citation (Scopus)

A multi-client dynamic searchable symmetric encryption system with physical deletion

Xu, L., Xu, C., Liu, J. K., Zuo, C. & Zhang, P., 2018, Information and Communications Security : 19th International Conference, ICICS 2017 Beijing, China, December 6–8, 2017 Proceedings. Qing, S., Mitchell, C., Chen, L. & Liu, D. (eds.). Cham Switzerland: Springer, p. 516-528 13 p. (Lecture Notes in Computer Science ; vol. 10631 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

40 Citations (Scopus)

An efficient access control scheme with outsourcing capability and attribute update for fog computing

Zhang, P., Chen, Z., Liu, J. K., Liang, K. A. & Liu, H., Jan 2018, In : Future Generation Computer Systems. 78, Part 2, p. 753-762 10 p.

Research output: Contribution to journalArticleResearchpeer-review

23 Citations (Scopus)

A Survey on Access Control in Fog Computing

Zhang, P., Liu, J. K., Richard Yu, F., Sookhak, M., Au, M. H. & Luo, X., 1 Feb 2018, In : IEEE Communications Magazine. 56, 2, p. 144-149 6 p.

Research output: Contribution to journalArticleResearchpeer-review

3 Citations (Scopus)

Attribute-based hybrid boolean keyword search over outsourced encrypted data

He, K., Guo, J., Weng, J., Weng, J., Liu, J. K. & Yi, X., 6 Aug 2018, (Accepted/In press) In : IEEE Transactions on Dependable and Secure Computing. 12 p.

Research output: Contribution to journalArticleResearchpeer-review

Compact ring signature in the standard model for blockchain

Ren, H., Zhang, P., Shentu, Q., Liu, J. K. & Yuen, T. H., 2018, Information Security Practice and Experience : 14th International Conference, ISPEC 2018 Tokyo, Japan, September 25–27, 2018 Proceedings. Su, C. & Kikuchi, H. (eds.). Cham Switzerland: Springer, p. 50-65 16 p. (Lecture Notes in Computer Science ; vol. 11125 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

6 Citations (Scopus)

Dynamic searchable symmetric encryption schemes supporting range queries with forward (and backward) security

Zuo, C., Sun, S. F., Liu, J. K., Shao, J. & Pieprzyk, J., 2018, Computer Security: 23rd European Symposium on Research in Computer Security, ESORICS 2018 Barcelona, Spain, September 3–7, 2018 Proceedings, Part II. Lopez, J., Zhou, J. & Soriano, M. (eds.). Cham Switzerland: Springer, p. 228-246 19 p. (Lecture Notes in Computer Science ; vol. 11099 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

4 Citations (Scopus)

Expressive attribute-based keyword search with constant-size ciphertext

Han, J., Yang, Y., Liu, J. K., Li, J., Liang, K. & Shen, J., Aug 2018, In : Soft Computing. 22, 15, p. 5163-5177 15 p.

Research output: Contribution to journalArticleResearchpeer-review

19 Citations (Scopus)

Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage

Zuo, C., Shao, J., Liu, J. K., Wei, G. & Ling, Y., Jan 2018, In : IEEE Transactions on Information Forensics and Security. 13, 1, p. 186-196 11 p.

Research output: Contribution to journalArticleResearchpeer-review

Forward secure searchable encryption using key-based blocks chain technique

Lv, S., Huang, Y., Li, B., Wei, Y., Liu, Z., Liu, J. K. & Lee, D. H., 2018, Algorithms and Architectures for Parallel Processing : 18th International Conference, ICA3PP 2018 Guangzhou, China, November 15–17, 2018 Proceedings, Part IV. Vaidya, J. & Li, J. (eds.). Cham Switzerland: Springer, p. 85-97 13 p. (Lecture Notes in Computer Science ; vol. 11337 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

1 Citation (Scopus)

GO-CP-ABE: group-oriented ciphertext-policy attribute-based encryption

Li, Y., Tao, X., Wu, W. & Liu, J. K., 2018, In : International Journal of Embedded Systems. 10, 1, p. 62-70 9 p.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File

Leakage-resilient chosen-ciphertext secure functional encryption from garbled circuits

Wang, H., Chen, K., Liu, J. K. & Hu, Z., 2018, Information Security Practice and Experience : 14th International Conference, ISPEC 2018 Tokyo, Japan, September 25–27, 2018 Proceedings. Su, C. & Kikuchi, H. (eds.). Cham Switzerland: Springer, p. 119-140 22 p. (Lecture Notes in Computer Science ; vol. 11125 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch