If you made any changes in Pure these will be visible here soon.

Research Output 2001 2019

37 Citations (Scopus)

Secure sharing and searching for real-time video data in mobile cloud

Liu, K. S. J., Au, M. H. A., Susilo, W., Liang, K. A., Lu, R. & Srinivasan, B., 2015, In : IEEE Network. 29, 2, p. 46 - 50 5 p.

Research output: Contribution to journalArticleResearchpeer-review

87 Citations (Scopus)

Secure sharing of personal health records in cloud computing: ciphertext-policy attribute-based signcryption

Liu, J., Huang, X. & Liu, J. K., Nov 2015, In : Future Generation Computer Systems. 52, p. 67-76 10 p.

Research output: Contribution to journalArticleResearchpeer-review

1 Citation (Scopus)

Security analysis of three cryptographic schemes from other cryptographic schemes

Chow, S. S. M., Cao, Z. & Liu, J. K., 1 Dec 2005, Information Security and Cryptology - First SKLOIS Conference, CISC 2005, Proceedings. p. 290-301 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3822 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

40 Citations (Scopus)

Security concerns in popular cloud storage services

Chu, C-K., Zhu, W. T., Han, J., Liu, K. S. J., Xu, J. & Zhou, J., 2013, In : IEEE Pervasive Computing. 12, 4, p. 50 - 57 8 p.

Research output: Contribution to journalArticleResearchpeer-review

172 Citations (Scopus)

Self-Generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model

Liu, J. K., Au, M. H. & Susilo, W., 2007, Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security. New York NY USA: Association for Computing Machinery (ACM), p. 273-283 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperOtherpeer-review

9 Citations (Scopus)

Server-Aided Attribute-Based Signature with Revocation for Resource-Constrained Industrial Internet of Things Devices

Cui, H., Deng, R. H., Liu, J. K., Yi, X. & Li, Y., Aug 2018, In : IEEE Transactions on Industrial Informatics. 14, 8, p. 3724-3732 9 p.

Research output: Contribution to journalArticleResearchpeer-review

16 Citations (Scopus)

Short and efficient certificate-based signature

Liu, J. K., Bao, F. & Zhou, J., 2011, Proceedings of the Networking 2011 Workshops: Workshop on Wireless Cooperative Networks Security (WCNS 2011). Casares-Giner, V., Manzoni, P. & Pont, A. (eds.). Heidelberg Germany: Springer, Vol. 6827. p. 167 - 178 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

4 Citations (Scopus)

Short generic transformation to strongly unforgeable signature in the standard model

Liu, J. K., Au, M. H. A., Susilo, W. & Zhou, J., 2010, Proceedings of the 15th European Symposium on Research in Computer Security (ESORICS 2010). Gritzalis, D., Preneel, B. & Theoharidou, M. (eds.). Heidelberg Germany: Springer, Vol. 6345. p. 168 - 181 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

Short lattice-based one-out-of-many proofs and applications to ring signatures

Esgin, M. F., Steinfeld, R., Sakzad, A., Liu, J. K. & Liu, D., 2019, Applied Cryptography and Network Security: 17th International Conference, ACNS 2019 Bogota, Colombia, June 5–7, 2019 Proceedings. Deng, R. H., Gauthier-Umaña, V., Ochoa, M. & Yung, M. (eds.). Cham Switzerland: Springer, p. 67-88 22 p. (Lecture Notes in Computer Science ; vol. 11464 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

4 Citations (Scopus)

Single sign-on and key establishment for ubiquitous smart environments

Chan, Y. Y., Fleissner, S., Liu, J. K. & Li, J., 2006, Computational Science and Its Applications - ICCSA 2006. Springer, p. 406-415 10 p. (Lecture Notes in Computer Science ; vol. 3983).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

16 Citations (Scopus)

Solutions to key exposure problem in ring signature

Liu, J. K. & Wong, D. S., 1 Dec 2008, In : International Journal of Network Security. 6, 2, p. 170-180 11 p.

Research output: Contribution to journalArticleResearchpeer-review

2 Citations (Scopus)

Special issue on security and privacy in mobile clouds

Chow, S. S-M. (ed.), Hengartner, U. (ed.), Liu, J. K. (ed.) & Ren, K. (ed.), 1 Jun 2016, In : Pervasive and Mobile Computing. 28, p. 100-101 2 p.

Research output: Contribution to journalEditorialOtherpeer-review

Strong leakage and tamper-resilient PKE from refined hash proof system

Sun, S. F., Gu, D., Au, M. H., Han, S., Yu, Y. & Liu, J., 2019, Applied Cryptography and Network Security: 17th International Conference, ACNS 2019 Bogota, Colombia, June 5–7, 2019 Proceedings. Deng, R. H., Gauthier-Umaña, V., Ochoa, M. & Yung, M. (eds.). Cham Switzerland: Springer, p. 486-506 21 p. (Lecture Notes in Computer Science; vol. 11464 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

3 Citations (Scopus)

Threshold-oriented optimistic fair exchange

Wang, Y., Au, M. H. A., Liu, J. K., Yuen, T. H. & Susilo, W., 2013, Proceedings of the 7th International Conference on Network and System Security (NSS 2013). Lopez, J., Huang, X. & Sandhu, R. (eds.). Heidelberg Germany: Springer, Vol. 7873. p. 424 - 438 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

13 Citations (Scopus)

Threshold ring signature without random oracles

Yuen, T. H., Liu, J. K., Au, M. H. A., Susilo, W. & Zhou, J., 2011, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011). Sandhu, R. & Wong, D. S. (eds.). New York NY USA: Association for Computing Machinery (ACM), Vol. 1. p. 261 - 267 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperOtherpeer-review

7 Citations (Scopus)

Time-based direct revocable Ciphertext-Policy Attribute-Based Encryption with short revocation list

Liu, J. K., Yuen, T. H., Zhang, P. & Liang, K., 2018, Applied Cryptography and Network Security: 16th International Conference, ACNS 2018 Leuven, Belgium, July 2–4, 2018 Proceedings. Preneel, B. & Vercauteren, F. (eds.). Cham Switzerland: Springer, p. 516-534 19 p. (Lecture Notes in Computer Science ; vol. 10892 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

24 Citations (Scopus)

Time-bound anonymous authentication for roaming networks

Liu, J. K., Chu, C-K., Chow, S. S. M., Huang, X., Au, M. H. & Zhou, J., Jan 2015, In : IEEE Transactions on Information Forensics and Security. 10, 1, p. 178-189 12 p.

Research output: Contribution to journalArticleResearchpeer-review

Time-dependent decision-making and decentralization in Proof-of-Work Cryptocurrencies

Zolotavkin, Y., Garcia, J. & Liu, J., 2019, Proceedings - 2019 IEEE 32nd Computer Security Foundations Symposium, CSF 2019. Delaune, S. & Jia, L. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 108-121 14 p. 8823663

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

12 Citations (Scopus)

TIMER: Secure and reliable cloud storage against data re-outsourcing

Jiang, T., Chen, X., Li, J., Wong, D. S., Ma, J. & Liu, J. K., 2014, Proceedings of the 10th International Confrerence on Information Security Practice and Experience (ISPEC 2014). Huang, X. & Zhou, J. (eds.). Heidelberg Germany: Springer, Vol. 8434. p. 346 - 358 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperOtherpeer-review

155 Citations (Scopus)

Toward efficient and privacy-preserving computing in big data era

Lu, R., Zhu, H., Liu, X., Liu, J. K. & Shao, J., 2014, In : IEEE Network. 28, 4, p. 46-50 5 p.

Research output: Contribution to journalArticleResearchpeer-review

4 Citations (Scopus)

Towards anonymous ciphertext indistinguishability with identity leakage

Yuen, T. H., Zhang, C., Chow, S. S-M. & Liu, J. K., 2013, 7th International Conference on Provable Security (ProvSec 2013). Susilo, W. & Reyhanitabar, R. (eds.). Heidelberg Germany: Springer, Vol. 8209. p. 139 - 153 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Towards certificate-based group encryption

Ren, Y., Luo, X., Wu, Q., Liu, J. K. & Zhang, P., 2016, Provable Security: 10th International Conference, ProvSec 2016, Nanjing, China, November 10–11, 2016, Proceedings. Chen, L. & Han, J. (eds.). Cham, Switzerland: Springer, p. 296-305 10 p. (Lecture Notes in Computer Science ; vol. 10005 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

5 Citations (Scopus)

Towards efficient verifiable conjunctive keyword search for large encrypted database

Wang, J., Chen, X., Sun, S-F., Liu, J. K., Au, M. H. & Zhan, Z-H., 2018, Computer Security: 23rd European Symposium on Research in Computer Security, ESORICS 2018 Barcelona, Spain, September 3–7, 2018 Proceedings, Part II. Lopez, J., Zhou, J. & Soriano, M. (eds.). Cham Switzerland: Springer, p. 83-100 18 p. (Lecture Notes in Computer Science ; vol. 11099 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

4 Citations (Scopus)

Towards multi-user searchable encryption supporting boolean query and fast decryption

Wang, Y., Wang, J., Sun, S-F., Liu, J. K., Susilo, W. & Chen, X., 2017, Provable Security: 11th International Conference, ProvSec 2017, 2017, Xi'an, China, October 23-25, 2017. Okamoto, T., Yu, Y., Ao, M. H. & Li, Y. (eds.). Cham Switzerland: Springer, Vol. 10592 . p. 24-38 15 p. (Lecture Notes in Computer Science ; vol. 10592 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Towards multi-user searchable encryption supporting Boolean query and fast decryption

Wang, Y., Wang, J., Sun, S-F., Liu, J. K., Susilo, W., Baek, J., You, I. & Chen, X., 28 Mar 2019, In : Journal of Universal Computer Science. 25, 3, p. 222-244 23 p.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File

Towards privacy-preserving forensic analysis for time-series medical data

Liu, X., Yuan, X. & Liu, J., 2018, Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2018) - 12th IEEE International Conference on Big Data Science and Engineering (IEEE BigDataSE 2018): 31 July–3 August 2018 New York, New York. Choo, K-K. R., Zhu, Y., Fei, Z., Thuraisingham, B. & Xiang, Y. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 1664-1668 5 p. 8456115

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2 Citations (Scopus)

Towards revocable fine-grained encryption of cloud data: Reducing trust upon cloud

Yang, Y., Liu, J., Wei, Z. & Huang, X., 2017, Information Security and Privacy: 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part I. Pieprzyk, J. & Suriadi, S. (eds.). Cham, Switzerland: Springer, p. 127-144 18 p. (Lecture Notes in Computer Science ; vol. 10342 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

8 Citations (Scopus)

Towards secure and cost-effective fuzzy access control in mobile cloud computing

Wu, W., Hu, S., Yang, X., Liu, J. K. & Au, M. H., 1 May 2017, In : Soft Computing. 21, 10, p. 2643-2649 7 p.

Research output: Contribution to journalArticleResearchpeer-review

24 Citations (Scopus)

Towards secure and reliable cloud storage against data re-outsourcing

Jiang, T., Chen, X., Li, J., Wong, D. S., Ma, J. & Liu, J. K., Nov 2015, In : Future Generation Computer Systems. 52, p. 86-94 9 p.

Research output: Contribution to journalArticleResearchpeer-review

35 Citations (Scopus)

Traceable and retrievable identity-based encryption

Au, M. H., Huang, Q., Liu, J. K., Susilo, W., Wong, D. S. & Yang, G., 30 Jun 2008, Applied Cryptography and Network Security - 6th International Conference, ACNS 2008, Proceedings. p. 94-110 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5037 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

Transferable e-cash revisit

Liu, J. K., Wong, S. H. & Wong, D. S., 1 Dec 2005, Security and Privacy in the Age of Ubiquitous Computing - IFIP TC11 20th International Information Security Conference. p. 171-188 18 p. (IFIP Advances in Information and Communication Technology; vol. 181).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

20 Citations (Scopus)

Trust chain: Establishing trust in the iot-based applications ecosystem using blockchain

Yu, B., Wright, J., Nepal, S., Zhu, L., Liu, J. & Ranjan, R., Jul 2018, In : IEEE Cloud Computing. 5, 4, p. 12-23 12 p.

Research output: Contribution to journalArticleOtherpeer-review

14 Citations (Scopus)

Trusted Boolean Search on Cloud Using Searchable Symmetric Encryption

Zuo, C., Macindoe, J., Yang, S., Steinfeld, R. & Liu, J. K., 2016, 2016 IEEE Trustcom/BigDataSE/ISPA: Tianjin, China, 23-26 August, 2016, [Proceedings]. Xiang, Y., Ren, K. & Feng, D. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 113-120 8 p. 7846936

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

4 Citations (Scopus)

Trust enhancement over range search for encrypted data

Yang, X., Lee, T. T., Liu, J. K. & Huang, X., 7 Feb 2017, 2016 IEEE Trustcom/BigDataSE/ISPA: Tianjin, China, 23-26 August, 2016, [Proceedings]. Xiang, Y., Ren, K. & Feng, D. (eds.). Piscataway, NJ : IEEE, Institute of Electrical and Electronics Engineers, p. 66-73 8 p. 7846930

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

35 Citations (Scopus)

Two-factor data security protection mechanism for cloud storage system

Liu, J. K., Liang, K., Susilo, W., Liu, J. & Xiang, Y., 1 Jun 2016, In : IEEE Transactions on Computers. 65, 6, p. 1992-2004 13 p., 7173024.

Research output: Contribution to journalArticleResearchpeer-review

7 Citations (Scopus)

Universal custodian-hiding verifiable encryption for discrete logarithms

Liu, J. K., Tsang, P. P., Wong, D. S. & Zhu, R. W., 1 Jan 2006, Information Security and Cryptology, ICISC 2005 - 8th International Conference, Revised Selected Papers. Springer, p. 389-409 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3935 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

13 Citations (Scopus)

Universal designated verifier transitive signatures for graph-based big data

Hou, S., Huang, X., Liu, K. S., Li, J. & Xu, L., 2015, In : Information Sciences. 318, p. 144 - 156 13 p.

Research output: Contribution to journalArticleResearchpeer-review

6 Citations (Scopus)

Verifiable keyword search for secure big data-based mobile healthcare networks with fine-grained authorization control

Chen, Z., Zhang, F., Zhang, P., Liu, J. K., Huang, J., Zhao, H. & Shen, J., Oct 2018, In : Future Generation Computer Systems. 87, p. 712-724 13 p.

Research output: Contribution to journalArticleResearchpeer-review

7 Citations (Scopus)

Verifier-local revocation group signatures with time-bound keys

Chu, C-K., Liu, J. K., Huang, X. & Zhou, J., 2012, Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2012). Lai, X. & Reiter, M. (eds.). New York NY USA: Association for Computing Machinery (ACM), Vol. 1. p. 1 - 11 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

3 Citations (Scopus)

While mobile encounters with clouds

Au, M. H. A., Liang, K. A., Liu, J. K. & Lu, R., 2016, Network and System Security : 10th International Conference, NSS 2016, Taipei, Taiwan, September 28–30, 2016, Proceedings. Chen, J., Piuri, V., Su, C. & Yung, M. (eds.). Cham, Switzerland: Springer, p. 3-18 16 p. (Lecture Notes in Computer Science ; vol. 9955 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch