If you made any changes in Pure these will be visible here soon.

Research Output 2001 2019

2015
9 Citations (Scopus)

Asymmetric cross-cryptosystem re-encryption applicable to efficient and secure mobile access to outsourced data

Deng, H., Wu, Q., Qin, B., Susilo, W., Liu, J. & Shi, W., 2015, ASIACCS'15 - Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security. Zhou, J. & Ahn, G-J. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 393 - 404 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2 Citations (Scopus)

Comments on 'efficient revocable certificateless encryption secure in the standard model'

Tang, Y., Chow, S. S. M. & Liu, J. K., 2015, In : Computer Journal. 58, 4, p. 779-781 3 p.

Research output: Contribution to journalComment / DebateResearchpeer-review

6 Citations (Scopus)

Cooperative attribute-based access control for enterprise computing system

Li, M., Huang, X., Liu, J. K., Xu, L. & Wu, W., 2015, In : International Journal of Embedded Systems. 7, 3/4, p. 191-202 12 p.

Research output: Contribution to journalArticleResearchpeer-review

69 Citations (Scopus)

Cost-effective authentic and anonymous data sharing with forward security

Huang, X., Liu, J. K., Tang, S., Xiang, Y., Liang, K., Xu, L. & Zhou, J., 1 Apr 2015, In : IEEE Transactions on Computers. 64, 4, p. 971-983 13 p.

Research output: Contribution to journalArticleResearchpeer-review

Editorial

Chen, X., Huang, X. & Liu, J. K., 2015, In : International Journal of High Performance Computing and Networking. 8, 2, p. 91-92 2 p.

Research output: Contribution to journalEditorialOtherpeer-review

Open Access
File
8 Citations (Scopus)

Efficient and fully CCA secure conditional proxy re-encryption from hierarchical identity-based encryption

Liang, K. A., Susilo, W., Liu, K. S. & Wong, D. S., 2015, In : Computer Journal. 58, 10, p. 2778 - 2792 15 p.

Research output: Contribution to journalArticleResearchpeer-review

57 Citations (Scopus)

Extended proxy-assisted approach: Achieving revocable fine-grained encryption of cloud data

Yang, Y., Liu, K. S., Liang, K. A., Choo, K-K. R. & Zhou, J., 2015, 20th European Symposium on Research in Computer Security: Proceedings, Part II (ESORICS 2015). Pernul, G., Ryan, P. Y. A. & Weippl, E. (eds.). Cham Switzerland: Springer, p. 146 - 166 21 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

7 Citations (Scopus)

Fully secure ciphertext-policy attribute based encryption with security mediator

Chen, Y., Jiang, Z. L., Yiu, S. M., Liu, J. K., Au, M. H. A. & Wang, X., 2015, Information and Communications Security: 16th International Conference, ICICS 2014 Hong Kong, China, December 16–17, 2014 Revised Selected Papers. C.K. Hui, L., Qing, S. H., Shi, E. & Yiu, S. M. (eds.). Cham Switzerland: Springer, p. 274-289 16 p. (Lecture Notes in Computer Science ; vol. 8958).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

20 Citations (Scopus)

k-times attribute-based anonymous access control for cloud computing

Yuen, T. H., Liu, J. K., Au, M. H., Huang, X., Susilo, W. & Zhou, J., 1 Sep 2015, In : IEEE Transactions on Computers. 64, 9, p. 2595-2608 14 p., 6945366.

Research output: Contribution to journalArticleResearchpeer-review

5 Citations (Scopus)

Lightweight anonymous authentication for ad Hoc group: A ring signature approach

Yang, X., Wu, W., Liu, K. S. & Chen, X., 2015, 9th International Conference on Provable Security (ProvSec 2015). Au, M-H. & Miyaji, A. (eds.). Cham Switzerland: Springer, p. 215 - 226 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Message from LSNS 2015 Workshop Chairs

Wang, H. & Liu, J. K., 30 Oct 2015, Proceedings - 2015 9th International Conference on Frontier of Computer Science and Technology, FCST 2015. p. xiv 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperOther

On the security of a lightweight authentication and encryption scheme for mobile ad hoc network

Yap, W-S., Liu, J. K., Tan, S. Y. & Goi, B-M., 2015, In : Security and Communication Networks. 8, 17, p. 3094-3098 5 p.

Research output: Contribution to journalArticleOtherpeer-review

Open Access
File

PEVTS: Privacy-preserving electric vehicles test-bedding scheme

Yang, X., Liu, J. K., Wu, W., Au, M. H. A. & Susilo, W., Dec 2015, Proceedings of the 2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS 2015): 14-17 December 2015, Melbourne, Victoria, Australia. Gu, T. & Prasanna, V. K. (eds.). Piscataway, NJ: IEEE, Institute of Electrical and Electronics Engineers, p. 282-289 8 p. 7384306

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

8 Citations (Scopus)

Practical threshold password-authenticated secret sharing protocol

Yi, X., Hao, F., Chen, L. & Liu, K. S., 2015, 20th European Symposium on Research in Computer Security: Proceedings, Part I (ESORICS 2015). Pernul, G., Ryan, P. Y. A. & Weippl, E. (eds.). Cham Switzerland: Springer, p. 347 - 365 19 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

20 Citations (Scopus)

Privacy concerns for photo sharing in online social networks

Liang, K. A., Liu, K. S. J., Lu, R. & Wong, D. S., 2015, In : IEEE Internet Computing. 19, 2, p. 58 - 63 6 p.

Research output: Contribution to journalArticleResearchpeer-review

52 Citations (Scopus)

Privacy-preserving ciphertext multi-sharing control for big data storage

Liang, K. A., Susilo, W. & Liu, K. S., 2015, In : IEEE Transactions on Information Forensics and Security. 10, 8, p. 1578 - 1589 12 p.

Research output: Contribution to journalArticleResearchpeer-review

37 Citations (Scopus)

Secure sharing and searching for real-time video data in mobile cloud

Liu, K. S. J., Au, M. H. A., Susilo, W., Liang, K. A., Lu, R. & Srinivasan, B., 2015, In : IEEE Network. 29, 2, p. 46 - 50 5 p.

Research output: Contribution to journalArticleResearchpeer-review

86 Citations (Scopus)

Secure sharing of personal health records in cloud computing: ciphertext-policy attribute-based signcryption

Liu, J., Huang, X. & Liu, J. K., Nov 2015, In : Future Generation Computer Systems. 52, p. 67-76 10 p.

Research output: Contribution to journalArticleResearchpeer-review

24 Citations (Scopus)

Time-bound anonymous authentication for roaming networks

Liu, J. K., Chu, C-K., Chow, S. S. M., Huang, X., Au, M. H. & Zhou, J., Jan 2015, In : IEEE Transactions on Information Forensics and Security. 10, 1, p. 178-189 12 p.

Research output: Contribution to journalArticleResearchpeer-review

24 Citations (Scopus)

Towards secure and reliable cloud storage against data re-outsourcing

Jiang, T., Chen, X., Li, J., Wong, D. S., Ma, J. & Liu, J. K., Nov 2015, In : Future Generation Computer Systems. 52, p. 86-94 9 p.

Research output: Contribution to journalArticleResearchpeer-review

12 Citations (Scopus)

Universal designated verifier transitive signatures for graph-based big data

Hou, S., Huang, X., Liu, K. S., Li, J. & Xu, L., 2015, In : Information Sciences. 318, p. 144 - 156 13 p.

Research output: Contribution to journalArticleResearchpeer-review

2014
52 Citations (Scopus)

A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing

Liang, K., Au, M. H., Liu, J. K., Susilo, W., Wong, D. S., Yang, G., Phuong, T. V. X. & Xie, Q., Oct 2014, In : IEEE Transactions on Information Forensics and Security. 9, 10, p. 1667 - 1680 14 p.

Research output: Contribution to journalArticleResearchpeer-review

73 Citations (Scopus)

An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing

Liang, K. A., Liu, J. K., Wong, D. S. & Susilo, W., 2014, Computer Security - ESORICS 2014: 19th European Symposium on Research in Computer Security Wroclaw, Poland, September 7-11, 2014 - Proceedings, Part II. Kutylowski, M. & Vaidya, J. (eds.). Heidelberg Germany: Springer, p. 257-272 16 p. (Lecture Notes in Computer Science; vol. 8712).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

40 Citations (Scopus)

An efficient PHR service system supporting fuzzy keyword search and fine-grained access control

Xhafa, F., Wang, J., Chen, X., Liu, J. K., Li, J. & Krause, P., Sep 2014, In : Soft Computing. 18, 9, p. 1795 - 1802 8 p.

Research output: Contribution to journalArticleResearchpeer-review

33 Citations (Scopus)

A new payment system for enhancing location privacy of electric vehicles

Au, M. H. A., Liu, J. K., Fang, J., Jiang, Z. L., Susilo, W. & Zhou, J., Jan 2014, In : IEEE Transactions on Vehicular Technology. 63, 1, p. 3 - 18 16 p.

Research output: Contribution to journalArticleResearchpeer-review

11 Citations (Scopus)

A secure remote data integrity checking cloud storage system from threshold encryption

Yao, C., Xu, L., Huang, X. & Liu, J. K., Dec 2014, In : Journal of Ambient Intelligence and Humanized Computing. 5, 6, p. 857-865 9 p.

Research output: Contribution to journalArticleResearchpeer-review

11 Citations (Scopus)

Efficient and verifiable algorithm for secure outsourcing of large-scale linear programming

Nie, H., Chen, X., Li, J., Liu, J. & Lou, W., 2014, Proceedings - 2014 IEEE/AINA 28th International Conference on Advanced Information Networking and Applications, AINA 2014: 13-16 May 2014, University of Victoria, Victoria, Canada. Barolli, L., Fun Li, K., Enokido, T., Xhafa, F. & Takizawa, M. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 591-596 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

6 Citations (Scopus)

GO-ABE: group-oriented attribute-based encryption

Li, M., Huang, X., Liu, J. K. & Xu, L., 2014, Network and System Security: 8th International Conference, NSS 2014 Xi’an, China, October 15-17, 2014 Proceedings. Au, M. H., Carminati, B. & Kuo, C-C. J. (eds.). Heidelberg Germany: Springer, p. 260-270 11 p. (Lecture Notes in Computer Science; vol. 8792).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

24 Citations (Scopus)

Identity-based encryption with post-challenge auxiliary inputs for secure cloud applications and sensor networks

Yuen, T. H., Zhang, Y., Yiu, S. M. & Liu, J. K., 2014, Computer Security - ESORICS 2014: 19th European Symposium on Research in Computer Security Wroclaw, Poland, September 7-11, 2014 - Proceedings, Part II. Kutylowski, M. & Vaidya, J. (eds.). Heidelberg Germany: Springer, p. 130-147 18 p. (Lecture Notes in Computer Science; vol. 8712).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

57 Citations (Scopus)

Improvements on an authentication scheme for vehicular sensor networks

Liu, J. K., Yuen, T. H., Au, M. H. & Susilo, W., Apr 2014, In : Expert Systems with Applications. 41, 5, p. 2559 - 2564 6 p.

Research output: Contribution to journalArticleResearchpeer-review

28 Citations (Scopus)

Linkable ring signature with unconditional anonymity

Liu, J. K., Au, M. H., Susilo, W. & Zhou, J., Jan 2014, In : IEEE Transactions on Knowledge and Data Engineering. 26, 1, p. 157-165 9 p.

Research output: Contribution to journalArticleResearchpeer-review

7 Citations (Scopus)

New insight to preserve online survey accuracy and privacy in big data era

Liu, J. K., Au, M. H. A., Huang, X., Susilo, W., Zhou, J. & Yu, Y., 2014, Computer Security - ESORICS 2014: 9th European Symposium on Research in Computer Security Wroclaw, Poland, September 7-11, 2014 - Proceedings, Part II. Kutylowski, M. & Vaidya, J. (eds.). Heidelberg Germany: Springer, p. 182-199 18 p. (Lecture Notes in Computer Science; vol. 8713).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

12 Citations (Scopus)

TIMER: Secure and reliable cloud storage against data re-outsourcing

Jiang, T., Chen, X., Li, J., Wong, D. S., Ma, J. & Liu, J. K., 2014, Proceedings of the 10th International Confrerence on Information Security Practice and Experience (ISPEC 2014). Huang, X. & Zhou, J. (eds.). Heidelberg Germany: Springer, Vol. 8434. p. 346 - 358 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperOtherpeer-review

154 Citations (Scopus)

Toward efficient and privacy-preserving computing in big data era

Lu, R., Zhu, H., Liu, X., Liu, J. K. & Shao, J., 2014, In : IEEE Network. 28, 4, p. 46-50 5 p.

Research output: Contribution to journalArticleResearchpeer-review

2013
24 Citations (Scopus)

Comments on 'Analysis and improvement of a secure and efficient handover authentication based on bilinear pairing functions'

Yeo, S. L., Yap, W-S., Liu, K. S. J. & Henricksen, M., 2013, In : IEEE Communications Letters. 17, 8, p. 1521 - 1523 3 p.

Research output: Contribution to journalArticleResearchpeer-review

22 Citations (Scopus)

Efficient Linkable and/or Threshold Ring Signature Without Random Oracles

Yuen, T. H., Liu, K. S. J., Au, M. H. A., Susilo, W. & Zhou, J., 2013, In : Computer Journal. 56, 4, p. 407 - 421 15 p.

Research output: Contribution to journalArticleResearchpeer-review

21 Citations (Scopus)

Privacy-preserving smart metering with regional statistics and personal enquiry services

Chu, C-K., Liu, J. K., Wong, J. W., Zhao, Y. & Zhou, J., 2013, Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security (ASIA CSS 2013). Li, N. & Tzeng, W-G. (eds.). New York NY USA: Association for Computing Machinery (ACM), Vol. 1. p. 369 - 379 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

12 Citations (Scopus)

Realizing fully secure unrestricted ID-based ring signature in the standard model based on HIBE

Au, M. H. A., Liu, K. S. J., Susilo, W. & Zhou, J., 2013, In : IEEE Transactions on Information Forensics and Security. 8, 12, p. 1909 - 1922 14 p.

Research output: Contribution to journalArticleResearchpeer-review

25 Citations (Scopus)

Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction

Au, M. H. A., Liu, J. K., Susilo, W. & Yuen, T. H., 2013, In : Theoretical Computer Science. 469, 14 p.

Research output: Contribution to journalArticleResearchpeer-review

40 Citations (Scopus)

Security concerns in popular cloud storage services

Chu, C-K., Zhu, W. T., Han, J., Liu, K. S. J., Xu, J. & Zhou, J., 2013, In : IEEE Pervasive Computing. 12, 4, p. 50 - 57 8 p.

Research output: Contribution to journalArticleResearchpeer-review

3 Citations (Scopus)

Threshold-oriented optimistic fair exchange

Wang, Y., Au, M. H. A., Liu, J. K., Yuen, T. H. & Susilo, W., 2013, Proceedings of the 7th International Conference on Network and System Security (NSS 2013). Lopez, J., Huang, X. & Sandhu, R. (eds.). Heidelberg Germany: Springer, Vol. 7873. p. 424 - 438 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

4 Citations (Scopus)

Towards anonymous ciphertext indistinguishability with identity leakage

Yuen, T. H., Zhang, C., Chow, S. S-M. & Liu, J. K., 2013, 7th International Conference on Provable Security (ProvSec 2013). Susilo, W. & Reyhanitabar, R. (eds.). Heidelberg Germany: Springer, Vol. 8209. p. 139 - 153 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2012
7 Citations (Scopus)

Efficient escrow-free identity-based signature

Zhang, Y., Liu, J. K., Huang, X., Au, M. H. A. & Susilo, W., 2012, 6th International Conference on Provable Security (ProvSec 2012). Takagi, T., Qin, Z. & Yu, Y. (eds.). Heidelberg Germany: Springer, Vol. 7496. p. 161 - 174 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

20 Citations (Scopus)

Enhancing location privacy for electric vehicles (at the right time)

Liu, J. K., Au, M. H. A., Susilo, W. & Zhou, J., 2012, Proceedings of the 17th European Symposium on Research in Computer Security (ESORICS 2012). Foresti, S., Yung, M. & Martinelli, F. (eds.). Heidelberg Germany: Springer, Vol. 7459. p. 397 - 414 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

10 Citations (Scopus)

Forward secure attribute-based signatures

Yuen, T. H., Liu, J. K., Huang, X., Au, M. H., Susilo, W. & Zhou, J., 2012, Proceedings of the 14th International Conference on Information and Communications Security (ICICS 2012). Chim, T. W. & Yuen, T. H. (eds.). Heidelberg Germany: Springer, Vol. 7618. p. 167 - 177 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

7 Citations (Scopus)

Verifier-local revocation group signatures with time-bound keys

Chu, C-K., Liu, J. K., Huang, X. & Zhou, J., 2012, Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2012). Lai, X. & Reiter, M. (eds.). New York NY USA: Association for Computing Machinery (ACM), Vol. 1. p. 1 - 11 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2011
14 Citations (Scopus)

Forward secure ring signature without random oracles

Liu, J. K., Yuen, T. H. & Zhou, J., 2011, Proceedings of the 13th International Conference on Information and Communications Security (ICICS 2011). Qing, S., Susilo, W., Wang, G. & Liu, D. (eds.). Heidelberg Germany: Springer, Vol. 7043. p. 1 - 14 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

41 Citations (Scopus)

Identity-based online/offline key encapsulation and encryption

Chow, S. S-M., Liu, J. K. & Zhou, J., 2011, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011). Sandhu, R. & Wong, D. S. (eds.). New York NY USA: Association for Computing Machinery (ACM), Vol. 1. p. 52 - 60 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

6 Citations (Scopus)

Identity-based server-aided decryption

Liu, J. K., Chu, C-K. & Zhou, J., 2011, Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Proceedings. Springer, Vol. 6812 LNCS. p. 337-352 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6812 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

16 Citations (Scopus)

Short and efficient certificate-based signature

Liu, J. K., Bao, F. & Zhou, J., 2011, Proceedings of the Networking 2011 Workshops: Workshop on Wireless Cooperative Networks Security (WCNS 2011). Casares-Giner, V., Manzoni, P. & Pont, A. (eds.). Heidelberg Germany: Springer, Vol. 6827. p. 167 - 178 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review