If you made any changes in Pure these will be visible here soon.

Research Output 2001 2019

Article
1 Citation (Scopus)

Access control encryption with efficient verifiable sanitized decryption

Wang, H., Chen, K., Liu, J. K., Hu, Z. & Long, Y., Oct 2018, In : Information Sciences. 465, p. 72-85 14 p.

Research output: Contribution to journalArticleResearchpeer-review

52 Citations (Scopus)

A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing

Liang, K., Au, M. H., Liu, J. K., Susilo, W., Wong, D. S., Yang, G., Phuong, T. V. X. & Xie, Q., Oct 2014, In : IEEE Transactions on Information Forensics and Security. 9, 10, p. 1667 - 1680 14 p.

Research output: Contribution to journalArticleResearchpeer-review

8 Citations (Scopus)

A general framework for secure sharing of personal health records in cloud system

Au, M. H., Yuen, T. H., Liu, J. K., Susilo, W., Huang, X., Xiang, Y. & Jiang, Z. L., Dec 2017, In : Journal of Computer and System Sciences. 90, p. 46-62 17 p.

Research output: Contribution to journalArticleResearchpeer-review

A generic construction of tightly secure signatures in the multi-user setting

Zhang, X., Liu, S., Gu, D. & Liu, J. K., 5 Jul 2019, In : Theoretical Computer Science. 775, p. 32-52 21 p.

Research output: Contribution to journalArticleResearchpeer-review

35 Citations (Scopus)

An efficient access control scheme with outsourcing capability and attribute update for fog computing

Zhang, P., Chen, Z., Liu, J. K., Liang, K. A. & Liu, H., Jan 2018, In : Future Generation Computer Systems. 78, Part 2, p. 753-762 10 p.

Research output: Contribution to journalArticleResearchpeer-review

86 Citations (Scopus)

An efficient file hierarchy attribute-based encryption scheme in cloud computing

Wang, S., Zhou, J., Liu, J. K., Yu, J., Chen, J. & Xie, W., 1 Jun 2016, In : IEEE Transactions on Information Forensics and Security. 11, 6, p. 1265-1277 13 p.

Research output: Contribution to journalArticleResearchpeer-review

40 Citations (Scopus)

An efficient PHR service system supporting fuzzy keyword search and fine-grained access control

Xhafa, F., Wang, J., Chen, X., Liu, J. K., Li, J. & Krause, P., Sep 2014, In : Soft Computing. 18, 9, p. 1795 - 1802 8 p.

Research output: Contribution to journalArticleResearchpeer-review

33 Citations (Scopus)

A new payment system for enhancing location privacy of electric vehicles

Au, M. H. A., Liu, J. K., Fang, J., Jiang, Z. L., Susilo, W. & Zhou, J., Jan 2014, In : IEEE Transactions on Vehicular Technology. 63, 1, p. 3 - 18 16 p.

Research output: Contribution to journalArticleResearchpeer-review

3 Citations (Scopus)

A new public remote integrity checking scheme with user and data privacy

Feng, Y., Yang, G. & Liu, J. K., 2017, In : International Journal of Applied Cryptography. 3, 3, p. 196-209 14 p.

Research output: Contribution to journalArticleResearchpeer-review

1 Citation (Scopus)

A resolving set based algorithm for fault identification in wireless mesh networks

Wang, X., Xu, L., Zhou, S. & Liu, J. K., Mar 2015, In : Journal of Universal Computer Science. 21, 3, p. 384-405 22 p.

Research output: Contribution to journalArticleResearchpeer-review

63 Citations (Scopus)

A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing

Liang, K., Au, M. H., Liu, J. K., Susilo, W., Wong, D. S., Yang, G., Yu, Y. & Yang, A., Nov 2015, In : Future Generation Computer Systems. 52, p. 95-108 14 p.

Research output: Contribution to journalArticleResearchpeer-review

112 Citations (Scopus)

A secure cloud computing based framework for big data information management of smart grid

Baek, J., Vu, Q. H., Liu, J. K., Huang, X. & Xiang, Y., 2015, In : IEEE Transactions on Cloud Computing. 3, 2, p. 233-244 12 p.

Research output: Contribution to journalArticleResearchpeer-review

10 Citations (Scopus)

A secure remote data integrity checking cloud storage system from threshold encryption

Yao, C., Xu, L., Huang, X. & Liu, J. K., Dec 2014, In : Journal of Ambient Intelligence and Humanized Computing. 5, 6, p. 857-865 9 p.

Research output: Contribution to journalArticleResearchpeer-review

19 Citations (Scopus)

A Survey on Access Control in Fog Computing

Zhang, P., Liu, J. K., Richard Yu, F., Sookhak, M., Au, M. H. & Luo, X., 1 Feb 2018, In : IEEE Communications Magazine. 56, 2, p. 144-149 6 p.

Research output: Contribution to journalArticleResearchpeer-review

63 Citations (Scopus)

Attribute-based data sharing scheme revisited in cloud computing

Wang, S., Liang, K., Liu, J. K., Chen, J., Yu, J. & Xie, W., 1 Aug 2016, In : IEEE Transactions on Information Forensics and Security. 11, 8, p. 1661-1673 13 p., 7448433.

Research output: Contribution to journalArticleResearchpeer-review

3 Citations (Scopus)

Attribute-based hybrid boolean keyword search over outsourced encrypted data

He, K., Guo, J., Weng, J., Weng, J., Liu, J. K. & Yi, X., 6 Aug 2018, (Accepted/In press) In : IEEE Transactions on Dependable and Secure Computing. 12 p.

Research output: Contribution to journalArticleResearchpeer-review

Building a dynamic searchable encrypted medical database for multi-client

Xu, L., Xu, C., Liu, J. K., Zuo, C. & Zhang, P., 19 May 2019, In : Information Sciences. 28 p.

Research output: Contribution to journalArticleResearchpeer-review

46 Citations (Scopus)

Certificateless public key encryption secure against malicious KGC attacks in the standard model

Hwang, Y. H., Liu, K. S. & Chow, S. S-M., 2008, In : Journal of Universal Computer Science. 14, 3, p. 463 - 480 18 p.

Research output: Contribution to journalArticleResearchpeer-review

24 Citations (Scopus)

Comments on 'Analysis and improvement of a secure and efficient handover authentication based on bilinear pairing functions'

Yeo, S. L., Yap, W-S., Liu, K. S. J. & Henricksen, M., 2013, In : IEEE Communications Letters. 17, 8, p. 1521 - 1523 3 p.

Research output: Contribution to journalArticleResearchpeer-review

6 Citations (Scopus)

Cooperative attribute-based access control for enterprise computing system

Li, M., Huang, X., Liu, J. K., Xu, L. & Wu, W., 2015, In : International Journal of Embedded Systems. 7, 3/4, p. 191-202 12 p.

Research output: Contribution to journalArticleResearchpeer-review

69 Citations (Scopus)

Cost-effective authentic and anonymous data sharing with forward security

Huang, X., Liu, J. K., Tang, S., Xiang, Y., Liang, K., Xu, L. & Zhou, J., 1 Apr 2015, In : IEEE Transactions on Computers. 64, 4, p. 971-983 13 p.

Research output: Contribution to journalArticleResearchpeer-review

Efficient and Adaptive Procurement Protocol with Purchasing Privacy

Jiang, P., Guo, F., Susilo, W., Au, M. H., Huang, X. & Liu, J. K., 2019, (Accepted/In press) In : IEEE Transactions on Services Computing. 12 p.

Research output: Contribution to journalArticleResearchpeer-review

8 Citations (Scopus)

Efficient and fully CCA secure conditional proxy re-encryption from hierarchical identity-based encryption

Liang, K. A., Susilo, W., Liu, K. S. & Wong, D. S., 2015, In : Computer Journal. 58, 10, p. 2778 - 2792 15 p.

Research output: Contribution to journalArticleResearchpeer-review

43 Citations (Scopus)

Efficient handover authentication with user anonymity and untraceability for mobile cloud computing

Yang, X., Huang, X. & Liu, J., Sep 2016, In : Future Generation Computer Systems. 62, p. 190-195 6 p.

Research output: Contribution to journalArticleResearchpeer-review

22 Citations (Scopus)

Efficient Linkable and/or Threshold Ring Signature Without Random Oracles

Yuen, T. H., Liu, K. S. J., Au, M. H. A., Susilo, W. & Zhou, J., 2013, In : Computer Journal. 56, 4, p. 407 - 421 15 p.

Research output: Contribution to journalArticleResearchpeer-review

78 Citations (Scopus)

Efficient online/offline identity-based signature for wireless sensor network

Liu, K. S. J., Baek, J., Zhou, J., Yang, Y. & Wong, J. W., 2010, In : International Journal of Information Security. 9, 4, p. 287 - 296 10 p.

Research output: Contribution to journalArticleResearchpeer-review

5 Citations (Scopus)

Efficient privacy-preserving charging station reservation system for electric vehicles

Liu, J. K., Susilo, W., Yuen, T. H., Au, M. H., Fang, J., Jiang, Z. L. & Zhou, J., 2016, In : Computer Journal. 59, 7, p. 1040-1053 14 p.

Research output: Contribution to journalArticleResearchpeer-review

1 Citation (Scopus)

Efficient threshold password-authenticated secret sharing protocols for cloud computing

Yi, X., Tari, Z., Hao, F., Chen, L., Liu, J. K., Yang, X., Lam, K. Y., Khalil, I. & Zomaya, A. Y., Jun 2019, In : Journal of Parallel and Distributed Computing. 128, p. 57-70 14 p.

Research output: Contribution to journalArticleResearchpeer-review

1 Citation (Scopus)

Enabling authorized encrypted search for multi-authority medical databases

Xu, L., Sun, S., Yuan, X., Liu, J. K., Zuo, C. & Chungen, X., 18 Mar 2019, (Accepted/In press) In : IEEE Transactions on Emerging Topics in Computing. 12 p.

Research output: Contribution to journalArticleResearchpeer-review

15 Citations (Scopus)

Enhanced security models and a generic construction approach for linkable ring signature

Liu, J. K. & Wong, D. S., 1 Dec 2006, In : International Journal of Foundations of Computer Science. 17, 6, p. 1403-1422 20 p.

Research output: Contribution to journalArticleResearchpeer-review

4 Citations (Scopus)

Expressive attribute-based keyword search with constant-size ciphertext

Han, J., Yang, Y., Liu, J. K., Li, J., Liang, K. & Shen, J., Aug 2018, In : Soft Computing. 22, 15, p. 5163-5177 15 p.

Research output: Contribution to journalArticleResearchpeer-review

1 Citation (Scopus)

Faulty instantiations of threshold ring signature from threshold proof-of-knowledge protocol

Liu, J. K., Yeo, S. L., Yap, W-S., Chow, S. S. M., Wong, D. S. & Susilo, W., 21 Jul 2016, In : Computer Journal. 59, 7, p. 945-954 10 p.

Research output: Contribution to journalArticleResearchpeer-review

49 Citations (Scopus)

Fine-grained two-factor access control for web-based cloud computing services

Liu, J. K., Au, M. H., Huang, X., Lu, R. & Li, J., 2016, In : IEEE Transactions on Information Forensics and Security. 11, 3, p. 484-497 14 p.

Research output: Contribution to journalArticleResearchpeer-review

19 Citations (Scopus)

Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage

Zuo, C., Shao, J., Liu, J. K., Wei, G. & Ling, Y., Jan 2018, In : IEEE Transactions on Information Forensics and Security. 13, 1, p. 186-196 11 p.

Research output: Contribution to journalArticleResearchpeer-review

1 Citation (Scopus)

GO-CP-ABE: group-oriented ciphertext-policy attribute-based encryption

Li, Y., Tao, X., Wu, W. & Liu, J. K., 2018, In : International Journal of Embedded Systems. 10, 1, p. 62-70 9 p.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File
56 Citations (Scopus)

Improvements on an authentication scheme for vehicular sensor networks

Liu, J. K., Yuen, T. H., Au, M. H. & Susilo, W., Apr 2014, In : Expert Systems with Applications. 41, 5, p. 2559 - 2564 6 p.

Research output: Contribution to journalArticleResearchpeer-review

20 Citations (Scopus)

k-times attribute-based anonymous access control for cloud computing

Yuen, T. H., Liu, J. K., Au, M. H., Huang, X., Susilo, W. & Zhou, J., 1 Sep 2015, In : IEEE Transactions on Computers. 64, 9, p. 2595-2608 14 p., 6945366.

Research output: Contribution to journalArticleResearchpeer-review

28 Citations (Scopus)

Linkable ring signature with unconditional anonymity

Liu, J. K., Au, M. H., Susilo, W. & Zhou, J., Jan 2014, In : IEEE Transactions on Knowledge and Data Engineering. 26, 1, p. 157-165 9 p.

Research output: Contribution to journalArticleResearchpeer-review

On the security of a lightweight authentication and encryption scheme for mobile ad hoc network

Yap, W-S., Liu, J. K., Tan, S. Y. & Goi, B-M., 2015, In : Security and Communication Networks. 8, 17, p. 3094-3098 5 p.

Research output: Contribution to journalArticleOtherpeer-review

Open Access
File
2 Citations (Scopus)

On the security of two identity-based conditional proxy re-encryption schemes

He, K., Weng, J., Deng, R. H. & Liu, J. K., 2016, In : Theoretical Computer Science. 652, p. 18-27 10 p.

Research output: Contribution to journalArticleResearchpeer-review

20 Citations (Scopus)

Privacy concerns for photo sharing in online social networks

Liang, K. A., Liu, K. S. J., Lu, R. & Wong, D. S., 2015, In : IEEE Internet Computing. 19, 2, p. 58 - 63 6 p.

Research output: Contribution to journalArticleResearchpeer-review

23 Citations (Scopus)

Privacy-preserving and regular language search over encrypted cloud data

Liang, K., Huang, X., Guo, F. & Liu, J. K., 2016, In : IEEE Transactions on Information Forensics and Security. 11, 10, p. 2365-2376 12 p., 7492188.

Research output: Contribution to journalArticleResearchpeer-review

52 Citations (Scopus)

Privacy-preserving ciphertext multi-sharing control for big data storage

Liang, K. A., Susilo, W. & Liu, K. S., 2015, In : IEEE Transactions on Information Forensics and Security. 10, 8, p. 1578 - 1589 12 p.

Research output: Contribution to journalArticleResearchpeer-review

13 Citations (Scopus)

Privacy-preserving personal data operation on mobile cloud-Chances and challenges over advanced persistent threat

Au, M. H. A., Liang, K. A., Liu, J. K., Lu, R. & Ning, J., Feb 2018, In : Future Generation Computer Systems. 79, 1, p. 337-349 12 p.

Research output: Contribution to journalArticleResearchpeer-review

30 Citations (Scopus)

Privacy-preserving public auditing protocol for low-performance end devices in cloud

Li, J., Zhang, L., Liu, J. K., Qian, H. & Dong, Z., 2016, In : IEEE Transactions on Information Forensics and Security. 11, 11, p. 2572-2583 12 p., 7506095.

Research output: Contribution to journalArticleResearchpeer-review

3 Citations (Scopus)

Private machine learning classification based on fully homomorphic encryption

Sun, X., Zhang, P., Liu, J. K., Yu, J. & Xie, W., 2019, (Accepted/In press) In : IEEE Transactions on Emerging Topics in Computing. p. 1-13 13 p.

Research output: Contribution to journalArticleResearchpeer-review

Proof-of-QoS: QoS based blockchain consensus protocol

Yu, B., Liu, J., Nepal, S., Yu, J. & Rimba, P., Nov 2019, In : Computers & Security. 87, 13 p., 101580.

Research output: Contribution to journalArticleResearchpeer-review

12 Citations (Scopus)

Realizing fully secure unrestricted ID-based ring signature in the standard model based on HIBE

Au, M. H. A., Liu, K. S. J., Susilo, W. & Zhou, J., 2013, In : IEEE Transactions on Information Forensics and Security. 8, 12, p. 1909 - 1922 14 p.

Research output: Contribution to journalArticleResearchpeer-review

40 Citations (Scopus)

Revocable ring signature

Liu, D. Y. W., Liu, K. S., Mu, Y., Susilo, W. & Wong, D. S., 2007, In : Journal of Computer Science and Technology. 22, 6, p. 785 - 794 10 p.

Research output: Contribution to journalArticleResearchpeer-review

1 Citation (Scopus)

RKA-secure public key encryptions against efficiently invertible functions

Sun, S-F., Liu, J. K., Yu, Y., Qin, B. & Gu, D., 2016, In : Computer Journal. 59, 11, p. 1637-1658 22 p.

Research output: Contribution to journalArticleResearchpeer-review