If you made any changes in Pure these will be visible here soon.

Research Output 2001 2019

2018

Towards privacy-preserving forensic analysis for time-series medical data

Liu, X., Yuan, X. & Liu, J., 2018, Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2018) - 12th IEEE International Conference on Big Data Science and Engineering (IEEE BigDataSE 2018): 31 July–3 August 2018 New York, New York. Choo, K-K. R., Zhu, Y., Fei, Z., Thuraisingham, B. & Xiang, Y. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 1664-1668 5 p. 8456115

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

18 Citations (Scopus)

Trust chain: Establishing trust in the iot-based applications ecosystem using blockchain

Yu, B., Wright, J., Nepal, S., Zhu, L., Liu, J. & Ranjan, R., Jul 2018, In : IEEE Cloud Computing. 5, 4, p. 12-23 12 p.

Research output: Contribution to journalArticleOtherpeer-review

6 Citations (Scopus)

Verifiable keyword search for secure big data-based mobile healthcare networks with fine-grained authorization control

Chen, Z., Zhang, F., Zhang, P., Liu, J. K., Huang, J., Zhao, H. & Shen, J., Oct 2018, In : Future Generation Computer Systems. 87, p. 712-724 13 p.

Research output: Contribution to journalArticleResearchpeer-review

2017
8 Citations (Scopus)

A general framework for secure sharing of personal health records in cloud system

Au, M. H., Yuen, T. H., Liu, J. K., Susilo, W., Huang, X., Xiang, Y. & Jiang, Z. L., Dec 2017, In : Journal of Computer and System Sciences. 90, p. 46-62 17 p.

Research output: Contribution to journalArticleResearchpeer-review

10 Citations (Scopus)

A new blockchain-based Value-Added Tax system

Wijaya, D. A., Liu, J. K., Suwarsono, D. A. & Zhang, P., 2017, Provable Security : 11th International Conference, ProvSec 2017 Xi’an, China, October 23–25, 2017 Proceedings. Okamoto, T., Yu, Y., Au, M. H. & Li, Y. (eds.). Cham Switzerland: Springer, p. 471-486 16 p. (Lecture Notes in Computer Science; vol. 10592 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

3 Citations (Scopus)

A new public remote integrity checking scheme with user and data privacy

Feng, Y., Yang, G. & Liu, J. K., 2017, In : International Journal of Applied Cryptography. 3, 3, p. 196-209 14 p.

Research output: Contribution to journalArticleResearchpeer-review

1 Citation (Scopus)

Anonymous anti-Sybil attack protocol for mobile healthcare networks analytics

Zhang, P., Zhang, X., Sun, X., Liu, J. K., Yu, J. & Jiang, Z. L., 7 Sep 2017, Proceedings - The 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, The 11th IEEE International Conference on Big Data Science and Engineering and the 14th IEEE International Conference on Embedded Software and Systems: 2017 IEEE Trustcom/BigDataSE/ICESS. Nanda, P., Xiang, Y. & Mu, Y. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 668-674 7 p. 8029501

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

10 Citations (Scopus)

A trust and privacy preserving handover authentication protocol for wireless networks

Yang, X., Zhang, Y., Liu, J. K. & Zeng, Y., 7 Feb 2017, 2016 IEEE Trustcom/BigDataSE/ISPA: Tianjin, China, 23-26 August, 2016, [Proceedings]. Xiang, Y., Ren, K. & Feng, D. (eds.). Piscataway, NJ : IEEE, Institute of Electrical and Electronics Engineers, p. 138-143 6 p. 7846939

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

4 Citations (Scopus)

Attribute-based encryption with expressive and authorized keyword search

Cui, K-H., Deng, R. H., Liu, J. K. & Li, Y., 2017, Information Security and Privacy: 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part I. Pieprzyk, J. & Suriadi, S. (eds.). Cham, Switzerland: Springer, p. 106-126 21 p. (Lecture Notes in Computer Science ; vol. 10342 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

Editorial: Special issue on security and privacy for smart cities

Liu, J. K., Choo, K-K. R., Huang, X. & Au, M. H. A., Oct 2017, In : Personal and Ubiquitous Computing. 21, 5, p. 775 1 p.

Research output: Contribution to journalEditorialOtherpeer-review

Editorial: Special issue on security data science and cyber threat management

Huang, X. (ed.), Liu, J. (ed.) & Lopez, J. (ed.), 1 Aug 2017, In : Computers and Security. 69, p. 1-2 2 p.

Research output: Contribution to journalEditorialOtherpeer-review

Erratum to: Special issue on security and privacy for smart cities (Personal and Ubiquitous Computing, (2017), 21, 5, (775), 10.1007/s00779-017-1043-z)

Liu, J. K., Choo, K-K. R., Huang, X. & Au, M. H., 1 Oct 2017, In : Personal and Ubiquitous Computing. 21, 5, p. 777 1 p.

Research output: Contribution to journalComment / DebateOtherpeer-review

7 Citations (Scopus)

Multi-user cloud-based secure keyword search

Kasra Kermanshahi, S., Liu, J. K. & Steinfeld, R., 2017, Information Security and Privacy: 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part I. Pieprzyk, J. & Suriadi, S. (eds.). Cham, Switzerland: Springer, p. 227-247 21 p. (Lecture Notes in Computer Science ; vol. 10342).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Preface

Liu, J. K. & Samarati, P., 2017, Information Security Practice and Experience: 13th International Conference, ISPEC 2017 Melbourne, VIC, Australia, December 13–15, 2017 Proceedings. K. Liu, J. & Samarati, P. (eds.). Cham Switzerland: Springer, p. VI 1 p.

Research output: Chapter in Book/Report/Conference proceedingForeword / PostscriptOther

29 Citations (Scopus)

RingCT 2.0: A compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency Monero

Sun, S-F., Au, M. H., Liu, J. K. & Yuen, T. H., 2017, Computer Security – ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Proceedings. Foley, S., Snekkenes, E. & Gollmann, D. (eds.). Cham, Switzerland: Springer, Vol. 10493 . p. 456-474 19 p. (Lecture Notes in Computer Science; vol. 10493 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

4 Citations (Scopus)

Towards multi-user searchable encryption supporting boolean query and fast decryption

Wang, Y., Wang, J., Sun, S-F., Liu, J. K., Susilo, W. & Chen, X., 2017, Provable Security: 11th International Conference, ProvSec 2017, 2017, Xi'an, China, October 23-25, 2017. Okamoto, T., Yu, Y., Ao, M. H. & Li, Y. (eds.). Cham Switzerland: Springer, Vol. 10592 . p. 24-38 15 p. (Lecture Notes in Computer Science ; vol. 10592 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2 Citations (Scopus)

Towards revocable fine-grained encryption of cloud data: Reducing trust upon cloud

Yang, Y., Liu, J., Wei, Z. & Huang, X., 2017, Information Security and Privacy: 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part I. Pieprzyk, J. & Suriadi, S. (eds.). Cham, Switzerland: Springer, p. 127-144 18 p. (Lecture Notes in Computer Science ; vol. 10342 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

8 Citations (Scopus)

Towards secure and cost-effective fuzzy access control in mobile cloud computing

Wu, W., Hu, S., Yang, X., Liu, J. K. & Au, M. H., 1 May 2017, In : Soft Computing. 21, 10, p. 2643-2649 7 p.

Research output: Contribution to journalArticleResearchpeer-review

4 Citations (Scopus)

Trust enhancement over range search for encrypted data

Yang, X., Lee, T. T., Liu, J. K. & Huang, X., 7 Feb 2017, 2016 IEEE Trustcom/BigDataSE/ISPA: Tianjin, China, 23-26 August, 2016, [Proceedings]. Xiang, Y., Ren, K. & Feng, D. (eds.). Piscataway, NJ : IEEE, Institute of Electrical and Electronics Engineers, p. 66-73 8 p. 7846930

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

2016
86 Citations (Scopus)

An efficient file hierarchy attribute-based encryption scheme in cloud computing

Wang, S., Zhou, J., Liu, J. K., Yu, J., Chen, J. & Xie, W., 1 Jun 2016, In : IEEE Transactions on Information Forensics and Security. 11, 6, p. 1265-1277 13 p.

Research output: Contribution to journalArticleResearchpeer-review

29 Citations (Scopus)

An efficient non-interactive multi-client searchable encryption with support for boolean queries

Sun, S-F., Liu, J. K., Sakzad, A., Steinfeld, R. & Yuen, T. H., 15 Sep 2016, Computer Security - ESORICS 2016: 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26–30, 2016, Proceedings, Part I. Askoxylakis, I., Ioannidis, S., Katsikas, S. & Meadows, C. (eds.). Switzerland: Springer, p. 154-172 19 p. (Lecture Notes in Computer Science ; vol. 9878 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

6 Citations (Scopus)

Anonymizing bitcoin transaction

Wijaya, D. A., Liu, J. K., Steinfeld, R., Sun, S. F. & Huang, X., 2016, Information Security Practice and Experience : 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16–18, 2016, Proceedings. Bao, F., Chen, L., Deng, R. H. & Wang, G. (eds.). Cham, Switzerland: Springer, p. 271-283 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10060 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

11 Citations (Scopus)

Anonymous identity-based broadcast encryption with chosen-ciphertext security

He, K., Weng, J., Liu, J-N., Liu, J. K., Liu, W. & Deng, R. H., 30 May 2016, ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security: May 30–June 3, 2016, Xi’an, China. Wang, X. & Huang, X. (eds.). New York, NY: Association for Computing Machinery (ACM), p. 247-255 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

64 Citations (Scopus)

Attribute-based data sharing scheme revisited in cloud computing

Wang, S., Liang, K., Liu, J. K., Chen, J., Yu, J. & Xie, W., 1 Aug 2016, In : IEEE Transactions on Information Forensics and Security. 11, 8, p. 1661-1673 13 p., 7448433.

Research output: Contribution to journalArticleResearchpeer-review

3 Citations (Scopus)

Credential wrapping: From anonymous password authentication to anonymous biometric authentication

Yang, Y., Weng, J., Lu, H., Zhang, Y., Liu, J. K. & Zhou, J., 30 May 2016, ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security: May 30 – June 3, 2016, Xi’an, China. Wang, X. & Huang, X. (eds.). New York, NY: Association for Computing Machinery (ACM), p. 141-151 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

Efficient construction of completely non-malleable CCA secure public key encryption

Sun, S. F., Gu, D., Liu, J. K., Parampalli, U. & Yuen, T. H., 30 May 2016, ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security. Wang, X. & Huang, X. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 901-906 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

6 Citations (Scopus)

Efficient fine-grained access control for secure personal health records in cloud computing

He, K., Weng, J., Liu, J. K., Zhou, W. & Liu, J. N., 2016, Network and System Security : 10th International Conference, NSS 2016, Taipei, Taiwan, September 28–30, 2016, Proceedings. Chen, J., Su, C., Piuri, V. & Yung, M. (eds.). Cham, Switzerland: Springer, p. 65-79 15 p. (Lecture Notes in Computer Science ; vol. 9955 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

44 Citations (Scopus)

Efficient handover authentication with user anonymity and untraceability for mobile cloud computing

Yang, X., Huang, X. & Liu, J., Sep 2016, In : Future Generation Computer Systems. 62, p. 190-195 6 p.

Research output: Contribution to journalArticleResearchpeer-review

16 Citations (Scopus)

Efficient multi-function data sharing and searching mechanism for cloud-based encrypted data

Liang, K. A., Su, C., Liu, J. K. & Chen, J., 30 May 2016, ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security: May 30 – June 3, 2016, Xi’an, China. Wang, X. & Huang, X. (eds.). New York, NY: Association for Computing Machinery (ACM), p. 83-94 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

5 Citations (Scopus)

Efficient privacy-preserving charging station reservation system for electric vehicles

Liu, J. K., Susilo, W., Yuen, T. H., Au, M. H., Fang, J., Jiang, Z. L. & Zhou, J., 2016, In : Computer Journal. 59, 7, p. 1040-1053 14 p.

Research output: Contribution to journalArticleResearchpeer-review

1 Citation (Scopus)

Faulty instantiations of threshold ring signature from threshold proof-of-knowledge protocol

Liu, J. K., Yeo, S. L., Yap, W-S., Chow, S. S. M., Wong, D. S. & Susilo, W., 21 Jul 2016, In : Computer Journal. 59, 7, p. 945-954 10 p.

Research output: Contribution to journalArticleResearchpeer-review

50 Citations (Scopus)

Fine-grained two-factor access control for web-based cloud computing services

Liu, J. K., Au, M. H., Huang, X., Lu, R. & Li, J., 2016, In : IEEE Transactions on Information Forensics and Security. 11, 3, p. 484-497 14 p.

Research output: Contribution to journalArticleResearchpeer-review

8 Citations (Scopus)

On lightweight security enforcement in cyber-physical systems

Yang, Y., Lu, J., Choo, K-K. R. & Liu, J. K., 2016, Lightweight Cryptography for Security and Privacy: 4th International Workshop, LightSec 2015, Bochum, Germany, September 10–11, 2015, Revised Selected Papers. Güneysu, T., Moradi, A. & Leander, G. (eds.). Switzerland: Springer, p. 97-112 16 p. (Lecture Notes in Computer Science ; vol. 9542).

Research output: Chapter in Book/Report/Conference proceedingChapter (Book)Researchpeer-review

2 Citations (Scopus)

On the security of two identity-based conditional proxy re-encryption schemes

He, K., Weng, J., Deng, R. H. & Liu, J. K., 2016, In : Theoretical Computer Science. 652, p. 18-27 10 p.

Research output: Contribution to journalArticleResearchpeer-review

Preface

Liu, J. K. & Steinfeld, R., 2016, Information Security and Privacy: 21st Australasian Conference on Information Security and Privacy (ACISP 2016): Melbourne, Vic, Australia, July 4–6, 2016, Proceedings, Part I. Switzerland: Springer, p. vi 1 p. (Lecture Notes in Computer Science; vol. 9722).

Research output: Chapter in Book/Report/Conference proceedingForeword / PostscriptOtherpeer-review

Preface

Liu, J. K. & Steinfeld, R., 2016, Information Security and Privacy: 21st Australasian Conference on Information Security and Privacy (ACISP 2016): Melbourne, Vic, Australia, July 4–6, 2016, Proceedings, Part II. Switzerland: Springer, Vol. 9723. p. v (Lecture Notes in Computer Science; vol. 9723).

Research output: Chapter in Book/Report/Conference proceedingForeword / PostscriptOtherpeer-review

23 Citations (Scopus)

Privacy-preserving and regular language search over encrypted cloud data

Liang, K., Huang, X., Guo, F. & Liu, J. K., 2016, In : IEEE Transactions on Information Forensics and Security. 11, 10, p. 2365-2376 12 p., 7492188.

Research output: Contribution to journalArticleResearchpeer-review

30 Citations (Scopus)

Privacy-preserving public auditing protocol for low-performance end devices in cloud

Li, J., Zhang, L., Liu, J. K., Qian, H. & Dong, Z., 2016, In : IEEE Transactions on Information Forensics and Security. 11, 11, p. 2572-2583 12 p., 7506095.

Research output: Contribution to journalArticleResearchpeer-review

1 Citation (Scopus)

RKA-secure public key encryptions against efficiently invertible functions

Sun, S-F., Liu, J. K., Yu, Y., Qin, B. & Gu, D., 2016, In : Computer Journal. 59, 11, p. 1637-1658 22 p.

Research output: Contribution to journalArticleResearchpeer-review

6 Citations (Scopus)

Secret picture: An efficient tool for mitigating deletion delay on OSN

Lai, S., Liu, J. K., Choo, K-K. R. & Liang, K. A., 1 Mar 2016, Information and Communications Security: 17th International Conference, ICICS 2015 Beijing, China, December 9–11, 2015, Revised Selected Papers. Qing, S., Kim, K., Okamoto, E. & Liu, D. (eds.). Switzerland: Springer, p. 467-477 11 p. (Lecture Notes in Computer Science; vol. 9543).

Research output: Chapter in Book/Report/Conference proceedingChapter (Book)Researchpeer-review

2 Citations (Scopus)

Special issue on security and privacy in mobile clouds

Chow, S. S-M. (ed.), Hengartner, U. (ed.), Liu, J. K. (ed.) & Ren, K. (ed.), 1 Jun 2016, In : Pervasive and Mobile Computing. 28, p. 100-101 2 p.

Research output: Contribution to journalEditorialOtherpeer-review

Towards certificate-based group encryption

Ren, Y., Luo, X., Wu, Q., Liu, J. K. & Zhang, P., 2016, Provable Security: 10th International Conference, ProvSec 2016, Nanjing, China, November 10–11, 2016, Proceedings. Chen, L. & Han, J. (eds.). Cham, Switzerland: Springer, p. 296-305 10 p. (Lecture Notes in Computer Science ; vol. 10005 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

14 Citations (Scopus)

Trusted Boolean Search on Cloud Using Searchable Symmetric Encryption

Zuo, C., Macindoe, J., Yang, S., Steinfeld, R. & Liu, J. K., 2016, 2016 IEEE Trustcom/BigDataSE/ISPA: Tianjin, China, 23-26 August, 2016, [Proceedings]. Xiang, Y., Ren, K. & Feng, D. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 113-120 8 p. 7846936

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

34 Citations (Scopus)

Two-factor data security protection mechanism for cloud storage system

Liu, J. K., Liang, K., Susilo, W., Liu, J. & Xiang, Y., 1 Jun 2016, In : IEEE Transactions on Computers. 65, 6, p. 1992-2004 13 p., 7173024.

Research output: Contribution to journalArticleResearchpeer-review

3 Citations (Scopus)

While mobile encounters with clouds

Au, M. H. A., Liang, K. A., Liu, J. K. & Lu, R., 2016, Network and System Security : 10th International Conference, NSS 2016, Taipei, Taiwan, September 28–30, 2016, Proceedings. Chen, J., Piuri, V., Su, C. & Yung, M. (eds.). Cham, Switzerland: Springer, p. 3-18 16 p. (Lecture Notes in Computer Science ; vol. 9955 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

2015
4 Citations (Scopus)

A new public remote integrity checking scheme with user privacy

Feng, Y., Mu, Y., Yang, G. & Liu, K. S., 2015, Information Security and Privacy: 20th Australian Conference (ACISP 2015). Foo, E. & Stebila, D. (eds.). Cham Switzerland: Springer, Vol. 9144. p. 377 - 394 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

A resolving set based algorithm for fault identification in wireless mesh networks

Wang, X., Xu, L., Zhou, S. & Liu, J. K., Mar 2015, In : Journal of Universal Computer Science. 21, 3, p. 384-405 22 p.

Research output: Contribution to journalArticleResearchpeer-review

64 Citations (Scopus)

A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing

Liang, K., Au, M. H., Liu, J. K., Susilo, W., Wong, D. S., Yang, G., Yu, Y. & Yang, A., Nov 2015, In : Future Generation Computer Systems. 52, p. 95-108 14 p.

Research output: Contribution to journalArticleResearchpeer-review

112 Citations (Scopus)

A secure cloud computing based framework for big data information management of smart grid

Baek, J., Vu, Q. H., Liu, J. K., Huang, X. & Xiang, Y., 2015, In : IEEE Transactions on Cloud Computing. 3, 2, p. 233-244 12 p.

Research output: Contribution to journalArticleResearchpeer-review

9 Citations (Scopus)

Asymmetric cross-cryptosystem re-encryption applicable to efficient and secure mobile access to outsourced data

Deng, H., Wu, Q., Qin, B., Susilo, W., Liu, J. & Shi, W., 2015, ASIACCS'15 - Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security. Zhou, J. & Ahn, G-J. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 393 - 404 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review