If you made any changes in Pure these will be visible here soon.

Research Output 2001 2019

Conference Paper
10 Citations (Scopus)

Result pattern hiding searchable encryption for conjunctive queries

Lai, S., Patranabis, S., Sakzad, A., Liu, J. K., Mukhopadhyay, D., Steinfeld, R., Sun, S-F., Liu, D. & Zuo, C., 2018, CCS’18 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security: October 15-19, 2018 Toronto, ON, Canada. Backes, M. & Wang, X. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 745-762 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

Revocable Identity-based encryption from the Computational Diffie-Hellman problem

Hu, Z., Liu, S., Chen, K. & Liu, J. K., 2018, Information Security and Privacy : 23rd Australasian Conference, ACISP 2018 Wollongong, NSW, Australia, July 11–13, 2018 Proceedings. Susilo, W. & Yang, G. (eds.). Cham Switzerland: Springer, p. 265-283 19 p. (Lecture Notes in Computer Science ; vol. 10946).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

40 Citations (Scopus)

RingCT 2.0: A compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency Monero

Sun, S-F., Au, M. H., Liu, J. K. & Yuen, T. H., 2017, Computer Security – ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Proceedings. Foley, S., Snekkenes, E. & Gollmann, D. (eds.). Cham, Switzerland: Springer, Vol. 10493 . p. 456-474 19 p. (Lecture Notes in Computer Science; vol. 10493 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

61 Citations (Scopus)

Ring signatures without random oracles

Chow, S. S. M., Wei, V. K., Liu, J. K. & Yuen, T. H., 2006, Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06. New York NY USA : Association for Computing Machinery (ACM), p. 297-302 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

17 Citations (Scopus)

Ring signature with designated linkability

Liu, J. K., Susilo, W. & Wong, D. S., 1 Jan 2006, Advances in Information and Computer Security - First International Workshop on Security, IWSEC 2006, Proceedings. Springer, p. 104-119 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4266 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Risk of asynchronous protocol update: attacks to Monero protocols

Wijaya, D. A., Liu, J. K., Steinfeld, R. & Liu, D., 2019, Information Security and Privacy: 24th Australasian Conference, ACISP 2019 Christchurch, New Zealand, July 3–5, 2019 Proceedings. Jang-Jaccard, J. & Guo, F. (eds.). Cham Switzerland: Springer, p. 307-321 15 p. (Lecture Notes in Computer Science ; vol. 11547 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

15 Citations (Scopus)

Sanitizable signatures revisited

Yuen, T. H., Susilo, W., Liu, J. K. & Mu, Y., 1 Dec 2008, Cryptology and Network Security - 7th International Conference, CANS 2008, Proceedings. p. 80-97 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5339 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

Security analysis of three cryptographic schemes from other cryptographic schemes

Chow, S. S. M., Cao, Z. & Liu, J. K., 1 Dec 2005, Information Security and Cryptology - First SKLOIS Conference, CISC 2005, Proceedings. p. 290-301 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3822 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

173 Citations (Scopus)

Self-Generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model

Liu, J. K., Au, M. H. & Susilo, W., 2007, Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security. New York NY USA: Association for Computing Machinery (ACM), p. 273-283 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperOtherpeer-review

16 Citations (Scopus)

Short and efficient certificate-based signature

Liu, J. K., Bao, F. & Zhou, J., 2011, Proceedings of the Networking 2011 Workshops: Workshop on Wireless Cooperative Networks Security (WCNS 2011). Casares-Giner, V., Manzoni, P. & Pont, A. (eds.). Heidelberg Germany: Springer, Vol. 6827. p. 167 - 178 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

4 Citations (Scopus)

Short generic transformation to strongly unforgeable signature in the standard model

Liu, J. K., Au, M. H. A., Susilo, W. & Zhou, J., 2010, Proceedings of the 15th European Symposium on Research in Computer Security (ESORICS 2010). Gritzalis, D., Preneel, B. & Theoharidou, M. (eds.). Heidelberg Germany: Springer, Vol. 6345. p. 168 - 181 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2 Citations (Scopus)

Short lattice-based one-out-of-many proofs and applications to ring signatures

Esgin, M. F., Steinfeld, R., Sakzad, A., Liu, J. K. & Liu, D., 2019, Applied Cryptography and Network Security: 17th International Conference, ACNS 2019 Bogota, Colombia, June 5–7, 2019 Proceedings. Deng, R. H., Gauthier-Umaña, V., Ochoa, M. & Yung, M. (eds.). Cham Switzerland: Springer, p. 67-88 22 p. (Lecture Notes in Computer Science ; vol. 11464 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

4 Citations (Scopus)

Single sign-on and key establishment for ubiquitous smart environments

Chan, Y. Y., Fleissner, S., Liu, J. K. & Li, J., 2006, Computational Science and Its Applications - ICCSA 2006. Springer, p. 406-415 10 p. (Lecture Notes in Computer Science ; vol. 3983).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Strong leakage and tamper-resilient PKE from refined hash proof system

Sun, S. F., Gu, D., Au, M. H., Han, S., Yu, Y. & Liu, J., 2019, Applied Cryptography and Network Security: 17th International Conference, ACNS 2019 Bogota, Colombia, June 5–7, 2019 Proceedings. Deng, R. H., Gauthier-Umaña, V., Ochoa, M. & Yung, M. (eds.). Cham Switzerland: Springer, p. 486-506 21 p. (Lecture Notes in Computer Science; vol. 11464 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

3 Citations (Scopus)

Threshold-oriented optimistic fair exchange

Wang, Y., Au, M. H. A., Liu, J. K., Yuen, T. H. & Susilo, W., 2013, Proceedings of the 7th International Conference on Network and System Security (NSS 2013). Lopez, J., Huang, X. & Sandhu, R. (eds.). Heidelberg Germany: Springer, Vol. 7873. p. 424 - 438 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

13 Citations (Scopus)

Threshold ring signature without random oracles

Yuen, T. H., Liu, J. K., Au, M. H. A., Susilo, W. & Zhou, J., 2011, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011). Sandhu, R. & Wong, D. S. (eds.). New York NY USA: Association for Computing Machinery (ACM), Vol. 1. p. 261 - 267 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperOtherpeer-review

8 Citations (Scopus)

Time-based direct revocable Ciphertext-Policy Attribute-Based Encryption with short revocation list

Liu, J. K., Yuen, T. H., Zhang, P. & Liang, K., 2018, Applied Cryptography and Network Security: 16th International Conference, ACNS 2018 Leuven, Belgium, July 2–4, 2018 Proceedings. Preneel, B. & Vercauteren, F. (eds.). Cham Switzerland: Springer, p. 516-534 19 p. (Lecture Notes in Computer Science ; vol. 10892 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

Time-dependent decision-making and decentralization in Proof-of-Work Cryptocurrencies

Zolotavkin, Y., Garcia, J. & Liu, J., 2019, Proceedings - 2019 IEEE 32nd Computer Security Foundations Symposium, CSF 2019. Delaune, S. & Jia, L. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 108-121 14 p. 8823663

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

12 Citations (Scopus)

TIMER: Secure and reliable cloud storage against data re-outsourcing

Jiang, T., Chen, X., Li, J., Wong, D. S., Ma, J. & Liu, J. K., 2014, Proceedings of the 10th International Confrerence on Information Security Practice and Experience (ISPEC 2014). Huang, X. & Zhou, J. (eds.). Heidelberg Germany: Springer, Vol. 8434. p. 346 - 358 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperOtherpeer-review

4 Citations (Scopus)

Towards anonymous ciphertext indistinguishability with identity leakage

Yuen, T. H., Zhang, C., Chow, S. S-M. & Liu, J. K., 2013, 7th International Conference on Provable Security (ProvSec 2013). Susilo, W. & Reyhanitabar, R. (eds.). Heidelberg Germany: Springer, Vol. 8209. p. 139 - 153 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Towards certificate-based group encryption

Ren, Y., Luo, X., Wu, Q., Liu, J. K. & Zhang, P., 2016, Provable Security: 10th International Conference, ProvSec 2016, Nanjing, China, November 10–11, 2016, Proceedings. Chen, L. & Han, J. (eds.). Cham, Switzerland: Springer, p. 296-305 10 p. (Lecture Notes in Computer Science ; vol. 10005 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

8 Citations (Scopus)

Towards efficient verifiable conjunctive keyword search for large encrypted database

Wang, J., Chen, X., Sun, S-F., Liu, J. K., Au, M. H. & Zhan, Z-H., 2018, Computer Security: 23rd European Symposium on Research in Computer Security, ESORICS 2018 Barcelona, Spain, September 3–7, 2018 Proceedings, Part II. Lopez, J., Zhou, J. & Soriano, M. (eds.). Cham Switzerland: Springer, p. 83-100 18 p. (Lecture Notes in Computer Science ; vol. 11099 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

4 Citations (Scopus)

Towards multi-user searchable encryption supporting boolean query and fast decryption

Wang, Y., Wang, J., Sun, S-F., Liu, J. K., Susilo, W. & Chen, X., 2017, Provable Security: 11th International Conference, ProvSec 2017, 2017, Xi'an, China, October 23-25, 2017. Okamoto, T., Yu, Y., Ao, M. H. & Li, Y. (eds.). Cham Switzerland: Springer, Vol. 10592 . p. 24-38 15 p. (Lecture Notes in Computer Science ; vol. 10592 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Towards privacy-preserving forensic analysis for time-series medical data

Liu, X., Yuan, X. & Liu, J., 2018, Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2018) - 12th IEEE International Conference on Big Data Science and Engineering (IEEE BigDataSE 2018): 31 July–3 August 2018 New York, New York. Choo, K-K. R., Zhu, Y., Fei, Z., Thuraisingham, B. & Xiang, Y. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 1664-1668 5 p. 8456115

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2 Citations (Scopus)

Towards revocable fine-grained encryption of cloud data: Reducing trust upon cloud

Yang, Y., Liu, J., Wei, Z. & Huang, X., 2017, Information Security and Privacy: 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part I. Pieprzyk, J. & Suriadi, S. (eds.). Cham, Switzerland: Springer, p. 127-144 18 p. (Lecture Notes in Computer Science ; vol. 10342 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

36 Citations (Scopus)

Traceable and retrievable identity-based encryption

Au, M. H., Huang, Q., Liu, J. K., Susilo, W., Wong, D. S. & Yang, G., 30 Jun 2008, Applied Cryptography and Network Security - 6th International Conference, ACNS 2008, Proceedings. p. 94-110 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5037 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

Transferable e-cash revisit

Liu, J. K., Wong, S. H. & Wong, D. S., 1 Dec 2005, Security and Privacy in the Age of Ubiquitous Computing - IFIP TC11 20th International Information Security Conference. p. 171-188 18 p. (IFIP Advances in Information and Communication Technology; vol. 181).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

15 Citations (Scopus)

Trusted Boolean Search on Cloud Using Searchable Symmetric Encryption

Zuo, C., Macindoe, J., Yang, S., Steinfeld, R. & Liu, J. K., 2016, 2016 IEEE Trustcom/BigDataSE/ISPA: Tianjin, China, 23-26 August, 2016, [Proceedings]. Xiang, Y., Ren, K. & Feng, D. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 113-120 8 p. 7846936

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

4 Citations (Scopus)

Trust enhancement over range search for encrypted data

Yang, X., Lee, T. T., Liu, J. K. & Huang, X., 7 Feb 2017, 2016 IEEE Trustcom/BigDataSE/ISPA: Tianjin, China, 23-26 August, 2016, [Proceedings]. Xiang, Y., Ren, K. & Feng, D. (eds.). Piscataway, NJ : IEEE, Institute of Electrical and Electronics Engineers, p. 66-73 8 p. 7846930

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

7 Citations (Scopus)

Universal custodian-hiding verifiable encryption for discrete logarithms

Liu, J. K., Tsang, P. P., Wong, D. S. & Zhu, R. W., 1 Jan 2006, Information Security and Cryptology, ICISC 2005 - 8th International Conference, Revised Selected Papers. Springer, p. 389-409 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3935 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

7 Citations (Scopus)

Verifier-local revocation group signatures with time-bound keys

Chu, C-K., Liu, J. K., Huang, X. & Zhou, J., 2012, Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2012). Lai, X. & Reiter, M. (eds.). New York NY USA: Association for Computing Machinery (ACM), Vol. 1. p. 1 - 11 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

3 Citations (Scopus)

While mobile encounters with clouds

Au, M. H. A., Liang, K. A., Liu, J. K. & Lu, R., 2016, Network and System Security : 10th International Conference, NSS 2016, Taipei, Taiwan, September 28–30, 2016, Proceedings. Chen, J., Piuri, V., Su, C. & Yung, M. (eds.). Cham, Switzerland: Springer, p. 3-18 16 p. (Lecture Notes in Computer Science ; vol. 9955 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

Editorial

Editorial

Chen, X., Huang, X. & Liu, J. K., 2015, In : International Journal of High Performance Computing and Networking. 8, 2, p. 91-92 2 p.

Research output: Contribution to journalEditorialOtherpeer-review

Open Access
File

Editorial: Special issue on security and privacy for smart cities

Liu, J. K., Choo, K-K. R., Huang, X. & Au, M. H. A., Oct 2017, In : Personal and Ubiquitous Computing. 21, 5, p. 775 1 p.

Research output: Contribution to journalEditorialOtherpeer-review

Editorial: Special issue on security data science and cyber threat management

Huang, X. (ed.), Liu, J. (ed.) & Lopez, J. (ed.), 1 Aug 2017, In : Computers and Security. 69, p. 1-2 2 p.

Research output: Contribution to journalEditorialOtherpeer-review

1 Citation (Scopus)

Rethinking authentication on smart mobile devices

Wang, D., Shen, J., Liu, J. K. & Choo, K-K. R., 18 Dec 2018, In : Wireless Communications and Mobile Computing. 2018, 5 p., 7079037.

Research output: Contribution to journalEditorialOtherpeer-review

Open Access
File
2 Citations (Scopus)

Special issue on security and privacy in mobile clouds

Chow, S. S-M. (ed.), Hengartner, U. (ed.), Liu, J. K. (ed.) & Ren, K. (ed.), 1 Jun 2016, In : Pervasive and Mobile Computing. 28, p. 100-101 2 p.

Research output: Contribution to journalEditorialOtherpeer-review

Foreword / Postscript

Preface

Liu, J. K. & Steinfeld, R., 2016, Information Security and Privacy: 21st Australasian Conference on Information Security and Privacy (ACISP 2016): Melbourne, Vic, Australia, July 4–6, 2016, Proceedings, Part II. Switzerland: Springer, Vol. 9723. p. v (Lecture Notes in Computer Science; vol. 9723).

Research output: Chapter in Book/Report/Conference proceedingForeword / PostscriptOtherpeer-review

Preface

Liu, J. K. & Steinfeld, R., 2016, Information Security and Privacy: 21st Australasian Conference on Information Security and Privacy (ACISP 2016): Melbourne, Vic, Australia, July 4–6, 2016, Proceedings, Part I. Switzerland: Springer, p. vi 1 p. (Lecture Notes in Computer Science; vol. 9722).

Research output: Chapter in Book/Report/Conference proceedingForeword / PostscriptOtherpeer-review

Preface

Liu, J. K. & Samarati, P., 2017, Information Security Practice and Experience: 13th International Conference, ISPEC 2017 Melbourne, VIC, Australia, December 13–15, 2017 Proceedings. K. Liu, J. & Samarati, P. (eds.). Cham Switzerland: Springer, p. VI 1 p.

Research output: Chapter in Book/Report/Conference proceedingForeword / PostscriptOther