If you made any changes in Pure these will be visible here soon.

Research Output 2001 2019

Conference Paper
7 Citations (Scopus)

Result pattern hiding searchable encryption for conjunctive queries

Lai, S., Patranabis, S., Sakzad, A., Liu, J. K., Mukhopadhyay, D., Steinfeld, R., Sun, S-F., Liu, D. & Zuo, C., 2018, CCS’18 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security: October 15-19, 2018 Toronto, ON, Canada. Backes, M. & Wang, X. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 745-762 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Revocable Identity-based encryption from the Computational Diffie-Hellman problem

Hu, Z., Liu, S., Chen, K. & Liu, J. K., 2018, Information Security and Privacy : 23rd Australasian Conference, ACISP 2018 Wollongong, NSW, Australia, July 11–13, 2018 Proceedings. Susilo, W. & Yang, G. (eds.). Cham Switzerland: Springer, p. 265-283 19 p. (Lecture Notes in Computer Science ; vol. 10946).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

29 Citations (Scopus)

RingCT 2.0: A compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency Monero

Sun, S-F., Au, M. H., Liu, J. K. & Yuen, T. H., 2017, Computer Security – ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Proceedings. Foley, S., Snekkenes, E. & Gollmann, D. (eds.). Cham, Switzerland: Springer, Vol. 10493 . p. 456-474 19 p. (Lecture Notes in Computer Science; vol. 10493 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

61 Citations (Scopus)

Ring signatures without random oracles

Chow, S. S. M., Wei, V. K., Liu, J. K. & Yuen, T. H., 2006, Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06. New York NY USA : Association for Computing Machinery (ACM), p. 297-302 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

17 Citations (Scopus)

Ring signature with designated linkability

Liu, J. K., Susilo, W. & Wong, D. S., 1 Jan 2006, Advances in Information and Computer Security - First International Workshop on Security, IWSEC 2006, Proceedings. Springer, p. 104-119 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4266 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Risk of asynchronous protocol update: attacks to Monero protocols

Wijaya, D. A., Liu, J. K., Steinfeld, R. & Liu, D., 2019, Information Security and Privacy: 24th Australasian Conference, ACISP 2019 Christchurch, New Zealand, July 3–5, 2019 Proceedings. Jang-Jaccard, J. & Guo, F. (eds.). Cham Switzerland: Springer, p. 307-321 15 p. (Lecture Notes in Computer Science ; vol. 11547 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

15 Citations (Scopus)

Sanitizable signatures revisited

Yuen, T. H., Susilo, W., Liu, J. K. & Mu, Y., 1 Dec 2008, Cryptology and Network Security - 7th International Conference, CANS 2008, Proceedings. p. 80-97 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5339 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

Security analysis of three cryptographic schemes from other cryptographic schemes

Chow, S. S. M., Cao, Z. & Liu, J. K., 1 Dec 2005, Information Security and Cryptology - First SKLOIS Conference, CISC 2005, Proceedings. p. 290-301 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3822 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

172 Citations (Scopus)

Self-Generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model

Liu, J. K., Au, M. H. & Susilo, W., 2007, Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security. New York NY USA: Association for Computing Machinery (ACM), p. 273-283 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperOtherpeer-review

16 Citations (Scopus)

Short and efficient certificate-based signature

Liu, J. K., Bao, F. & Zhou, J., 2011, Proceedings of the Networking 2011 Workshops: Workshop on Wireless Cooperative Networks Security (WCNS 2011). Casares-Giner, V., Manzoni, P. & Pont, A. (eds.). Heidelberg Germany: Springer, Vol. 6827. p. 167 - 178 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

4 Citations (Scopus)

Short generic transformation to strongly unforgeable signature in the standard model

Liu, J. K., Au, M. H. A., Susilo, W. & Zhou, J., 2010, Proceedings of the 15th European Symposium on Research in Computer Security (ESORICS 2010). Gritzalis, D., Preneel, B. & Theoharidou, M. (eds.). Heidelberg Germany: Springer, Vol. 6345. p. 168 - 181 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

Short lattice-based one-out-of-many proofs and applications to ring signatures

Esgin, M. F., Steinfeld, R., Sakzad, A., Liu, J. K. & Liu, D., 2019, Applied Cryptography and Network Security: 17th International Conference, ACNS 2019 Bogota, Colombia, June 5–7, 2019 Proceedings. Deng, R. H., Gauthier-Umaña, V., Ochoa, M. & Yung, M. (eds.). Cham Switzerland: Springer, p. 67-88 22 p. (Lecture Notes in Computer Science ; vol. 11464 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

4 Citations (Scopus)

Single sign-on and key establishment for ubiquitous smart environments

Chan, Y. Y., Fleissner, S., Liu, J. K. & Li, J., 2006, Computational Science and Its Applications - ICCSA 2006. Springer, p. 406-415 10 p. (Lecture Notes in Computer Science ; vol. 3983).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Strong leakage and tamper-resilient PKE from refined hash proof system

Sun, S. F., Gu, D., Au, M. H., Han, S., Yu, Y. & Liu, J., 2019, Applied Cryptography and Network Security: 17th International Conference, ACNS 2019 Bogota, Colombia, June 5–7, 2019 Proceedings. Deng, R. H., Gauthier-Umaña, V., Ochoa, M. & Yung, M. (eds.). Cham Switzerland: Springer, p. 486-506 21 p. (Lecture Notes in Computer Science; vol. 11464 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

3 Citations (Scopus)

Threshold-oriented optimistic fair exchange

Wang, Y., Au, M. H. A., Liu, J. K., Yuen, T. H. & Susilo, W., 2013, Proceedings of the 7th International Conference on Network and System Security (NSS 2013). Lopez, J., Huang, X. & Sandhu, R. (eds.). Heidelberg Germany: Springer, Vol. 7873. p. 424 - 438 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

13 Citations (Scopus)

Threshold ring signature without random oracles

Yuen, T. H., Liu, J. K., Au, M. H. A., Susilo, W. & Zhou, J., 2011, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011). Sandhu, R. & Wong, D. S. (eds.). New York NY USA: Association for Computing Machinery (ACM), Vol. 1. p. 261 - 267 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperOtherpeer-review

7 Citations (Scopus)

Time-based direct revocable Ciphertext-Policy Attribute-Based Encryption with short revocation list

Liu, J. K., Yuen, T. H., Zhang, P. & Liang, K., 2018, Applied Cryptography and Network Security: 16th International Conference, ACNS 2018 Leuven, Belgium, July 2–4, 2018 Proceedings. Preneel, B. & Vercauteren, F. (eds.). Cham Switzerland: Springer, p. 516-534 19 p. (Lecture Notes in Computer Science ; vol. 10892 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

Time-dependent decision-making and decentralization in Proof-of-Work Cryptocurrencies

Zolotavkin, Y., Garcia, J. & Liu, J., 2019, Proceedings - 2019 IEEE 32nd Computer Security Foundations Symposium, CSF 2019. Delaune, S. & Jia, L. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 108-121 14 p. 8823663

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

12 Citations (Scopus)

TIMER: Secure and reliable cloud storage against data re-outsourcing

Jiang, T., Chen, X., Li, J., Wong, D. S., Ma, J. & Liu, J. K., 2014, Proceedings of the 10th International Confrerence on Information Security Practice and Experience (ISPEC 2014). Huang, X. & Zhou, J. (eds.). Heidelberg Germany: Springer, Vol. 8434. p. 346 - 358 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperOtherpeer-review

4 Citations (Scopus)

Towards anonymous ciphertext indistinguishability with identity leakage

Yuen, T. H., Zhang, C., Chow, S. S-M. & Liu, J. K., 2013, 7th International Conference on Provable Security (ProvSec 2013). Susilo, W. & Reyhanitabar, R. (eds.). Heidelberg Germany: Springer, Vol. 8209. p. 139 - 153 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Towards certificate-based group encryption

Ren, Y., Luo, X., Wu, Q., Liu, J. K. & Zhang, P., 2016, Provable Security: 10th International Conference, ProvSec 2016, Nanjing, China, November 10–11, 2016, Proceedings. Chen, L. & Han, J. (eds.). Cham, Switzerland: Springer, p. 296-305 10 p. (Lecture Notes in Computer Science ; vol. 10005 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

5 Citations (Scopus)

Towards efficient verifiable conjunctive keyword search for large encrypted database

Wang, J., Chen, X., Sun, S-F., Liu, J. K., Au, M. H. & Zhan, Z-H., 2018, Computer Security: 23rd European Symposium on Research in Computer Security, ESORICS 2018 Barcelona, Spain, September 3–7, 2018 Proceedings, Part II. Lopez, J., Zhou, J. & Soriano, M. (eds.). Cham Switzerland: Springer, p. 83-100 18 p. (Lecture Notes in Computer Science ; vol. 11099 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

4 Citations (Scopus)

Towards multi-user searchable encryption supporting boolean query and fast decryption

Wang, Y., Wang, J., Sun, S-F., Liu, J. K., Susilo, W. & Chen, X., 2017, Provable Security: 11th International Conference, ProvSec 2017, 2017, Xi'an, China, October 23-25, 2017. Okamoto, T., Yu, Y., Ao, M. H. & Li, Y. (eds.). Cham Switzerland: Springer, Vol. 10592 . p. 24-38 15 p. (Lecture Notes in Computer Science ; vol. 10592 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Towards privacy-preserving forensic analysis for time-series medical data

Liu, X., Yuan, X. & Liu, J., 2018, Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2018) - 12th IEEE International Conference on Big Data Science and Engineering (IEEE BigDataSE 2018): 31 July–3 August 2018 New York, New York. Choo, K-K. R., Zhu, Y., Fei, Z., Thuraisingham, B. & Xiang, Y. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 1664-1668 5 p. 8456115

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2 Citations (Scopus)

Towards revocable fine-grained encryption of cloud data: Reducing trust upon cloud

Yang, Y., Liu, J., Wei, Z. & Huang, X., 2017, Information Security and Privacy: 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part I. Pieprzyk, J. & Suriadi, S. (eds.). Cham, Switzerland: Springer, p. 127-144 18 p. (Lecture Notes in Computer Science ; vol. 10342 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

35 Citations (Scopus)

Traceable and retrievable identity-based encryption

Au, M. H., Huang, Q., Liu, J. K., Susilo, W., Wong, D. S. & Yang, G., 30 Jun 2008, Applied Cryptography and Network Security - 6th International Conference, ACNS 2008, Proceedings. p. 94-110 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5037 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

Transferable e-cash revisit

Liu, J. K., Wong, S. H. & Wong, D. S., 1 Dec 2005, Security and Privacy in the Age of Ubiquitous Computing - IFIP TC11 20th International Information Security Conference. p. 171-188 18 p. (IFIP Advances in Information and Communication Technology; vol. 181).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

14 Citations (Scopus)

Trusted Boolean Search on Cloud Using Searchable Symmetric Encryption

Zuo, C., Macindoe, J., Yang, S., Steinfeld, R. & Liu, J. K., 2016, 2016 IEEE Trustcom/BigDataSE/ISPA: Tianjin, China, 23-26 August, 2016, [Proceedings]. Xiang, Y., Ren, K. & Feng, D. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 113-120 8 p. 7846936

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

4 Citations (Scopus)

Trust enhancement over range search for encrypted data

Yang, X., Lee, T. T., Liu, J. K. & Huang, X., 7 Feb 2017, 2016 IEEE Trustcom/BigDataSE/ISPA: Tianjin, China, 23-26 August, 2016, [Proceedings]. Xiang, Y., Ren, K. & Feng, D. (eds.). Piscataway, NJ : IEEE, Institute of Electrical and Electronics Engineers, p. 66-73 8 p. 7846930

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

7 Citations (Scopus)

Universal custodian-hiding verifiable encryption for discrete logarithms

Liu, J. K., Tsang, P. P., Wong, D. S. & Zhu, R. W., 1 Jan 2006, Information Security and Cryptology, ICISC 2005 - 8th International Conference, Revised Selected Papers. Springer, p. 389-409 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3935 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

7 Citations (Scopus)

Verifier-local revocation group signatures with time-bound keys

Chu, C-K., Liu, J. K., Huang, X. & Zhou, J., 2012, Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2012). Lai, X. & Reiter, M. (eds.). New York NY USA: Association for Computing Machinery (ACM), Vol. 1. p. 1 - 11 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

3 Citations (Scopus)

While mobile encounters with clouds

Au, M. H. A., Liang, K. A., Liu, J. K. & Lu, R., 2016, Network and System Security : 10th International Conference, NSS 2016, Taipei, Taiwan, September 28–30, 2016, Proceedings. Chen, J., Piuri, V., Su, C. & Yung, M. (eds.). Cham, Switzerland: Springer, p. 3-18 16 p. (Lecture Notes in Computer Science ; vol. 9955 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

Editorial

Editorial

Chen, X., Huang, X. & Liu, J. K., 2015, In : International Journal of High Performance Computing and Networking. 8, 2, p. 91-92 2 p.

Research output: Contribution to journalEditorialOtherpeer-review

Open Access
File

Editorial: Special issue on security and privacy for smart cities

Liu, J. K., Choo, K-K. R., Huang, X. & Au, M. H. A., Oct 2017, In : Personal and Ubiquitous Computing. 21, 5, p. 775 1 p.

Research output: Contribution to journalEditorialOtherpeer-review

Editorial: Special issue on security data science and cyber threat management

Huang, X. (ed.), Liu, J. (ed.) & Lopez, J. (ed.), 1 Aug 2017, In : Computers and Security. 69, p. 1-2 2 p.

Research output: Contribution to journalEditorialOtherpeer-review

1 Citation (Scopus)

Rethinking authentication on smart mobile devices

Wang, D., Shen, J., Liu, J. K. & Choo, K-K. R., 18 Dec 2018, In : Wireless Communications and Mobile Computing. 2018, 5 p., 7079037.

Research output: Contribution to journalEditorialOtherpeer-review

Open Access
File
2 Citations (Scopus)

Special issue on security and privacy in mobile clouds

Chow, S. S-M. (ed.), Hengartner, U. (ed.), Liu, J. K. (ed.) & Ren, K. (ed.), 1 Jun 2016, In : Pervasive and Mobile Computing. 28, p. 100-101 2 p.

Research output: Contribution to journalEditorialOtherpeer-review

Foreword / Postscript

Preface

Liu, J. K. & Steinfeld, R., 2016, Information Security and Privacy: 21st Australasian Conference on Information Security and Privacy (ACISP 2016): Melbourne, Vic, Australia, July 4–6, 2016, Proceedings, Part I. Switzerland: Springer, p. vi 1 p. (Lecture Notes in Computer Science; vol. 9722).

Research output: Chapter in Book/Report/Conference proceedingForeword / PostscriptOtherpeer-review

Preface

Liu, J. K. & Steinfeld, R., 2016, Information Security and Privacy: 21st Australasian Conference on Information Security and Privacy (ACISP 2016): Melbourne, Vic, Australia, July 4–6, 2016, Proceedings, Part II. Switzerland: Springer, Vol. 9723. p. v (Lecture Notes in Computer Science; vol. 9723).

Research output: Chapter in Book/Report/Conference proceedingForeword / PostscriptOtherpeer-review

Preface

Liu, J. K. & Samarati, P., 2017, Information Security Practice and Experience: 13th International Conference, ISPEC 2017 Melbourne, VIC, Australia, December 13–15, 2017 Proceedings. K. Liu, J. & Samarati, P. (eds.). Cham Switzerland: Springer, p. VI 1 p.

Research output: Chapter in Book/Report/Conference proceedingForeword / PostscriptOther