If you made any changes in Pure these will be visible here soon.

Research Output 2005 2019

Filter
Conference Paper
2019

Evaluating CryptoNote-style blockchains

Han, R., Yu, J., Liu, J. & Zhang, P., 2019, Information Security and Cryptology : 14th International Conference, Inscrypt 2018 Fuzhou, China, December 14–17, 2018 Revised Selected Papers. Guo, F., Huang, X. & Yung, M. (eds.). Cham Switzerland: Springer, p. 29-48 20 p. (Lecture Notes in Computer Science ; vol. 11449 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2018

Dynamic searchable symmetric encryption schemes supporting range queries with forward (and backward) security

Zuo, C., Sun, S. F., Liu, J. K., Shao, J. & Pieprzyk, J., 2018, Computer Security: 23rd European Symposium on Research in Computer Security, ESORICS 2018 Barcelona, Spain, September 3–7, 2018 Proceedings, Part II. Lopez, J., Zhou, J. & Soriano, M. (eds.). Cham Switzerland: Springer, p. 228-246 19 p. (Lecture Notes in Computer Science ; vol. 11099 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Monero ring attack: recreating zero mixin transaction effect

Wijaya, D. A., Liu, J., Steinfeld, R. & Liu, D., 5 Sep 2018, Proceedings - The 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2018) - The 12th IEEE International Conference on Big Data Science and Engineering (IEEE BigDataSE 2018): 2018 IEEE Trustcom/BigDataSE. Choo, K-K. R., Zhu, Y., Fei, Z., Thuraisingham, B. & Xiang, Y. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 1196-1201 6 p. 8456034

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Platform-independent secure blockchain-based voting system

Yu, B., Liu, J. K., Sakzad, A., Nepal, S., Steinfeld, R., Rimba, P. & Au, M. H., 2018, Information Security: 21st International Conference, ISC 2018 Guildford, UK, September 9–12, 2018 Proceedings. Chen, L., Manulis, M. & Schneider, S. (eds.). Cham Switzerland: Springer, p. 369-386 18 p. (Lecture Notes in Computer Science ; vol. 11060 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Post-quantum one-time linkable ring signature and application to ring confidential transactions in blockchain (Lattice RingCT v1.0)

Alberto Torres, W. A., Steinfeld, R., Sakzad, A., Liu, J. K., Kuchta, V., Bhattacharjee, N., Au, M. H. & Cheng, J., 2018, Information Security and Privacy: 23rd Australasian Conference, ACISP 2018 Wollongong, NSW, Australia, July 11–13, 2018 Proceedings. Susilo, W. & Yang, G. (eds.). Cham Switzerland: Springer, p. 558-576 19 p. (Lecture Notes in Computer Science ; vol. 10946).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Practical backward-Secure Searchable Encryption from symmetric puncturable encryption

Sun, S-F., Yuan, X., Liu, J. K., Steinfeld, R., Sakzad, A., Vo, V. & Nepal, S., 2018, CCS’18 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security: October 15-19, 2018 Toronto, ON, Canada . Backes, M. & Wang, X. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 763-780 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Result pattern hiding searchable encryption for conjunctive queries

Lai, S., Patranabis, S., Sakzad, A., Liu, J. K., Mukhopadhyay, D., Steinfeld, R., Sun, S-F., Liu, D. & Zuo, C., 2018, CCS’18 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security: October 15-19, 2018 Toronto, ON, Canada. Backes, M. & Wang, X. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 745-762 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Towards efficient verifiable conjunctive keyword search for large encrypted database

Wang, J., Chen, X., Sun, S-F., Liu, J. K., Au, M. H. & Zhan, Z-H., 2018, Computer Security: 23rd European Symposium on Research in Computer Security, ESORICS 2018 Barcelona, Spain, September 3–7, 2018 Proceedings, Part II. Lopez, J., Zhou, J. & Soriano, M. (eds.). Cham Switzerland: Springer, p. 83-100 18 p. (Lecture Notes in Computer Science ; vol. 11099 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Towards privacy-preserving forensic analysis for time-series medical data

Liu, X., Yuan, X. & Liu, J., 2018, Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2018) - 12th IEEE International Conference on Big Data Science and Engineering (IEEE BigDataSE 2018): 31 July–3 August 2018 New York, New York. Choo, K-K. R., Zhu, Y., Fei, Z., Thuraisingham, B. & Xiang, Y. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 1664-1668 5 p. 8456115

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2017

Anonymous anti-Sybil attack protocol for mobile healthcare networks analytics

Zhang, P., Zhang, X., Sun, X., Liu, J. K., Yu, J. & Jiang, Z. L., 7 Sep 2017, Proceedings - The 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, The 11th IEEE International Conference on Big Data Science and Engineering and the 14th IEEE International Conference on Embedded Software and Systems: 2017 IEEE Trustcom/BigDataSE/ICESS. Nanda, P., Xiang, Y. & Mu, Y. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 668-674 7 p. 8029501

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

A trust and privacy preserving handover authentication protocol for wireless networks

Yang, X., Zhang, Y., Liu, J. K. & Zeng, Y., 7 Feb 2017, 2016 IEEE Trustcom/BigDataSE/ISPA: Tianjin, China, 23-26 August, 2016, [Proceedings]. Xiang, Y., Ren, K. & Feng, D. (eds.). Piscataway, NJ : IEEE, Institute of Electrical and Electronics Engineers, p. 138-143 6 p. 7846939

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

Attribute-based encryption with expressive and authorized keyword search

Cui, K-H., Deng, R. H., Liu, J. K. & Li, Y., 2017, Information Security and Privacy: 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part I. Pieprzyk, J. & Suriadi, S. (eds.). Cham, Switzerland: Springer, p. 106-126 21 p. (Lecture Notes in Computer Science ; vol. 10342 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

Multi-user cloud-based secure keyword search

Kasra Kermanshahi, S., Liu, J. K. & Steinfeld, R., 2017, Information Security and Privacy: 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part I. Pieprzyk, J. & Suriadi, S. (eds.). Cham, Switzerland: Springer, p. 227-247 21 p. (Lecture Notes in Computer Science ; vol. 10342).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

RingCT 2.0: A compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency Monero

Sun, S-F., Au, M. H., Liu, J. K. & Yuen, T. H., 2017, Computer Security – ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Proceedings. Foley, S., Snekkenes, E. & Gollmann, D. (eds.). Cham, Switzerland: Springer, Vol. 10493 . p. 456-474 19 p. (Lecture Notes in Computer Science; vol. 10493 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Towards multi-user searchable encryption supporting boolean query and fast decryption

Wang, Y., Wang, J., Sun, S-F., Liu, J. K., Susilo, W. & Chen, X., 2017, Provable Security: 11th International Conference, ProvSec 2017, 2017, Xi'an, China, October 23-25, 2017. Okamoto, T., Yu, Y., Ao, M. H. & Li, Y. (eds.). Cham Switzerland: Springer, Vol. 10592 . p. 24-38 15 p. (Lecture Notes in Computer Science ; vol. 10592 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Towards revocable fine-grained encryption of cloud data: Reducing trust upon cloud

Yang, Y., Liu, J., Wei, Z. & Huang, X., 2017, Information Security and Privacy: 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part I. Pieprzyk, J. & Suriadi, S. (eds.). Cham, Switzerland: Springer, p. 127-144 18 p. (Lecture Notes in Computer Science ; vol. 10342 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

Trusted Boolean Search on Cloud Using Searchable Symmetric Encryption

Zuo, C., Macindoe, J., Yang, S., Steinfeld, R. & Liu, J. K., 7 Feb 2017, 2016 IEEE Trustcom/BigDataSE/ISPA: Tianjin, China, 23-26 August, 2016, [Proceedings]. Xiang, Y., Ren, K. & Feng, D. (eds.). Piscataway, NJ : IEEE, Institute of Electrical and Electronics Engineers, p. 113-120 8 p. 7846936

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

Trust enhancement over range search for encrypted data

Yang, X., Lee, T. T., Liu, J. K. & Huang, X., 7 Feb 2017, 2016 IEEE Trustcom/BigDataSE/ISPA: Tianjin, China, 23-26 August, 2016, [Proceedings]. Xiang, Y., Ren, K. & Feng, D. (eds.). Piscataway, NJ : IEEE, Institute of Electrical and Electronics Engineers, p. 66-73 8 p. 7846930

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

2016

An efficient non-interactive multi-client searchable encryption with support for boolean queries

Sun, S-F., Liu, J. K., Sakzad, A., Steinfeld, R. & Yuen, T. H., 15 Sep 2016, Computer Security - ESORICS 2016: 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26–30, 2016, Proceedings, Part I. Askoxylakis, I., Ioannidis, S., Katsikas, S. & Meadows, C. (eds.). Switzerland: Springer, p. 154-172 19 p. (Lecture Notes in Computer Science ; vol. 9878 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Anonymizing bitcoin transaction

Wijaya, D. A., Liu, J. K., Steinfeld, R., Sun, S. F. & Huang, X., 2016, Information Security Practice and Experience : 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16–18, 2016, Proceedings. Bao, F., Chen, L., Deng, R. H. & Wang, G. (eds.). Cham, Switzerland: Springer, p. 271-283 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10060 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Anonymous identity-based broadcast encryption with chosen-ciphertext security

He, K., Weng, J., Liu, J-N., Liu, J. K., Liu, W. & Deng, R. H., 30 May 2016, ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security: May 30–June 3, 2016, Xi’an, China. Wang, X. & Huang, X. (eds.). New York, NY: Association for Computing Machinery (ACM), p. 247-255 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

Credential wrapping: From anonymous password authentication to anonymous biometric authentication

Yang, Y., Weng, J., Lu, H., Zhang, Y., Liu, J. K. & Zhou, J., 30 May 2016, ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security: May 30 – June 3, 2016, Xi’an, China. Wang, X. & Huang, X. (eds.). New York, NY: Association for Computing Machinery (ACM), p. 141-151 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

Efficient construction of completely non-malleable CCA secure public key encryption

Sun, S. F., Gu, D., Liu, J. K., Parampalli, U. & Yuen, T. H., 30 May 2016, ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security. Wang, X. & Huang, X. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 901-906 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Efficient fine-grained access control for secure personal health records in cloud computing

He, K., Weng, J., Liu, J. K., Zhou, W. & Liu, J. N., 2016, Network and System Security : 10th International Conference, NSS 2016, Taipei, Taiwan, September 28–30, 2016, Proceedings. Chen, J., Su, C., Piuri, V. & Yung, M. (eds.). Cham, Switzerland: Springer, p. 65-79 15 p. (Lecture Notes in Computer Science ; vol. 9955 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

Efficient multi-function data sharing and searching mechanism for cloud-based encrypted data

Liang, K. A., Su, C., Liu, J. K. & Chen, J., 30 May 2016, ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security: May 30 – June 3, 2016, Xi’an, China. Wang, X. & Huang, X. (eds.). New York, NY: Association for Computing Machinery (ACM), p. 83-94 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

Towards certificate-based group encryption

Ren, Y., Luo, X., Wu, Q., Liu, J. K. & Zhang, P., 2016, Provable Security: 10th International Conference, ProvSec 2016, Nanjing, China, November 10–11, 2016, Proceedings. Chen, L. & Han, J. (eds.). Cham, Switzerland: Springer, p. 296-305 10 p. (Lecture Notes in Computer Science ; vol. 10005 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

While mobile encounters with clouds

Au, M. H. A., Liang, K. A., Liu, J. K. & Lu, R., 2016, Network and System Security : 10th International Conference, NSS 2016, Taipei, Taiwan, September 28–30, 2016, Proceedings. Chen, J., Piuri, V., Su, C. & Yung, M. (eds.). Cham, Switzerland: Springer, p. 3-18 16 p. (Lecture Notes in Computer Science ; vol. 9955 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

2015

A new public remote integrity checking scheme with user privacy

Feng, Y., Mu, Y., Yang, G. & Liu, K. S., 2015, Information Security and Privacy: 20th Australian Conference (ACISP 2015). Foo, E. & Stebila, D. (eds.). Cham Switzerland: Springer, Vol. 9144. p. 377 - 394 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Asymmetric cross-cryptosystem re-encryption applicable to efficient and secure mobile access to outsourced data

Deng, H., Wu, Q., Qin, B., Susilo, W., Liu, J. & Shi, W., 2015, ASIACCS'15 - Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security. Zhou, J. & Ahn, G-J. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 393 - 404 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Extended proxy-assisted approach: Achieving revocable fine-grained encryption of cloud data

Yang, Y., Liu, K. S., Liang, K. A., Choo, K-K. R. & Zhou, J., 2015, 20th European Symposium on Research in Computer Security: Proceedings, Part II (ESORICS 2015). Pernul, G., Ryan, P. Y. A. & Weippl, E. (eds.). Cham Switzerland: Springer, p. 146 - 166 21 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Fully secure ciphertext-policy attribute based encryption with security mediator

Chen, Y., Jiang, Z. L., Yiu, S. M., Liu, J. K., Au, M. H. A. & Wang, X., 2015, Information and Communications Security: 16th International Conference, ICICS 2014 Hong Kong, China, December 16–17, 2014 Revised Selected Papers. C.K. Hui, L., Qing, S. H., Shi, E. & Yiu, S. M. (eds.). Cham Switzerland: Springer, p. 274-289 16 p. (Lecture Notes in Computer Science ; vol. 8958).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Lightweight anonymous authentication for ad Hoc group: A ring signature approach

Yang, X., Wu, W., Liu, K. S. & Chen, X., 2015, 9th International Conference on Provable Security (ProvSec 2015). Au, M-H. & Miyaji, A. (eds.). Cham Switzerland: Springer, p. 215 - 226 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Message from LSNS 2015 Workshop Chairs

Wang, H. & Liu, J. K., 30 Oct 2015, Proceedings - 2015 9th International Conference on Frontier of Computer Science and Technology, FCST 2015. p. xiv 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperOther

PEVTS: Privacy-preserving electric vehicles test-bedding scheme

Yang, X., Liu, J. K., Wu, W., Au, M. H. A. & Susilo, W., Dec 2015, Proceedings of the 2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS 2015): 14-17 December 2015, Melbourne, Victoria, Australia. Gu, T. & Prasanna, V. K. (eds.). Piscataway, NJ: IEEE, Institute of Electrical and Electronics Engineers, p. 282-289 8 p. 7384306

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

Practical threshold password-authenticated secret sharing protocol

Yi, X., Hao, F., Chen, L. & Liu, K. S., 2015, 20th European Symposium on Research in Computer Security: Proceedings, Part I (ESORICS 2015). Pernul, G., Ryan, P. Y. A. & Weippl, E. (eds.). Cham Switzerland: Springer, p. 347 - 365 19 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2014

An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing

Liang, K. A., Liu, J. K., Wong, D. S. & Susilo, W., 2014, Computer Security - ESORICS 2014: 19th European Symposium on Research in Computer Security Wroclaw, Poland, September 7-11, 2014 - Proceedings, Part II. Kutylowski, M. & Vaidya, J. (eds.). Heidelberg Germany: Springer, p. 257-272 16 p. (Lecture Notes in Computer Science; vol. 8712).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Efficient and verifiable algorithm for secure outsourcing of large-scale linear programming

Nie, H., Chen, X., Li, J., Liu, J. & Lou, W., 2014, Proceedings - 2014 IEEE/AINA 28th International Conference on Advanced Information Networking and Applications, AINA 2014: 13-16 May 2014, University of Victoria, Victoria, Canada. Barolli, L., Fun Li, K., Enokido, T., Xhafa, F. & Takizawa, M. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 591-596 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

GO-ABE: group-oriented attribute-based encryption

Li, M., Huang, X., Liu, J. K. & Xu, L., 2014, Network and System Security: 8th International Conference, NSS 2014 Xi’an, China, October 15-17, 2014 Proceedings. Au, M. H., Carminati, B. & Kuo, C-C. J. (eds.). Heidelberg Germany: Springer, p. 260-270 11 p. (Lecture Notes in Computer Science; vol. 8792).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Identity-based encryption with post-challenge auxiliary inputs for secure cloud applications and sensor networks

Yuen, T. H., Zhang, Y., Yiu, S. M. & Liu, J. K., 2014, Computer Security - ESORICS 2014: 19th European Symposium on Research in Computer Security Wroclaw, Poland, September 7-11, 2014 - Proceedings, Part II. Kutylowski, M. & Vaidya, J. (eds.). Heidelberg Germany: Springer, p. 130-147 18 p. (Lecture Notes in Computer Science; vol. 8712).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

New insight to preserve online survey accuracy and privacy in big data era

Liu, J. K., Au, M. H. A., Huang, X., Susilo, W., Zhou, J. & Yu, Y., 2014, Computer Security - ESORICS 2014: 9th European Symposium on Research in Computer Security Wroclaw, Poland, September 7-11, 2014 - Proceedings, Part II. Kutylowski, M. & Vaidya, J. (eds.). Heidelberg Germany: Springer, p. 182-199 18 p. (Lecture Notes in Computer Science; vol. 8713).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

TIMER: Secure and reliable cloud storage against data re-outsourcing

Jiang, T., Chen, X., Li, J., Wong, D. S., Ma, J. & Liu, J. K., 2014, Proceedings of the 10th International Confrerence on Information Security Practice and Experience (ISPEC 2014). Huang, X. & Zhou, J. (eds.). Heidelberg Germany: Springer, Vol. 8434. p. 346 - 358 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperOtherpeer-review

2013

Privacy-preserving smart metering with regional statistics and personal enquiry services

Chu, C-K., Liu, J. K., Wong, J. W., Zhao, Y. & Zhou, J., 2013, Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security (ASIA CSS 2013). Li, N. & Tzeng, W-G. (eds.). New York NY USA: Association for Computing Machinery (ACM), Vol. 1. p. 369 - 379 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Threshold-oriented optimistic fair exchange

Wang, Y., Au, M. H. A., Liu, J. K., Yuen, T. H. & Susilo, W., 2013, Proceedings of the 7th International Conference on Network and System Security (NSS 2013). Lopez, J., Huang, X. & Sandhu, R. (eds.). Heidelberg Germany: Springer, Vol. 7873. p. 424 - 438 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Towards anonymous ciphertext indistinguishability with identity leakage

Yuen, T. H., Zhang, C., Chow, S. S-M. & Liu, J. K., 2013, 7th International Conference on Provable Security (ProvSec 2013). Susilo, W. & Reyhanitabar, R. (eds.). Heidelberg Germany: Springer, Vol. 8209. p. 139 - 153 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2012

Efficient escrow-free identity-based signature

Zhang, Y., Liu, J. K., Huang, X., Au, M. H. A. & Susilo, W., 2012, 6th International Conference on Provable Security (ProvSec 2012). Takagi, T., Qin, Z. & Yu, Y. (eds.). Heidelberg Germany: Springer, Vol. 7496. p. 161 - 174 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Enhancing location privacy for electric vehicles (at the right time)

Liu, J. K., Au, M. H. A., Susilo, W. & Zhou, J., 2012, Proceedings of the 17th European Symposium on Research in Computer Security (ESORICS 2012). Foresti, S., Yung, M. & Martinelli, F. (eds.). Heidelberg Germany: Springer, Vol. 7459. p. 397 - 414 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Forward secure attribute-based signatures

Yuen, T. H., Liu, J. K., Huang, X., Au, M. H., Susilo, W. & Zhou, J., 2012, Proceedings of the 14th International Conference on Information and Communications Security (ICICS 2012). Chim, T. W. & Yuen, T. H. (eds.). Heidelberg Germany: Springer, Vol. 7618. p. 167 - 177 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Verifier-local revocation group signatures with time-bound keys

Chu, C-K., Liu, J. K., Huang, X. & Zhou, J., 2012, Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2012). Lai, X. & Reiter, M. (eds.). New York NY USA: Association for Computing Machinery (ACM), Vol. 1. p. 1 - 11 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2011

Forward secure ring signature without random oracles

Liu, J. K., Yuen, T. H. & Zhou, J., 2011, Proceedings of the 13th International Conference on Information and Communications Security (ICICS 2011). Qing, S., Susilo, W., Wang, G. & Liu, D. (eds.). Heidelberg Germany: Springer, Vol. 7043. p. 1 - 14 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Identity-based online/offline key encapsulation and encryption

Chow, S. S-M., Liu, J. K. & Zhou, J., 2011, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011). Sandhu, R. & Wong, D. S. (eds.). New York NY USA: Association for Computing Machinery (ACM), Vol. 1. p. 52 - 60 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review