If you made any changes in Pure these will be visible here soon.

Research Output 2001 2019

Filter
Article
2019

A generic construction of tightly secure signatures in the multi-user setting

Zhang, X., Liu, S., Gu, D. & Liu, J. K., 5 Jul 2019, In : Theoretical Computer Science. 775, p. 32-52 21 p.

Research output: Contribution to journalArticleResearchpeer-review

Building a dynamic searchable encrypted medical database for multi-client

Xu, L., Xu, C., Liu, J. K., Zuo, C. & Zhang, P., 19 May 2019, In : Information Sciences. 28 p.

Research output: Contribution to journalArticleResearchpeer-review

Efficient and Adaptive Procurement Protocol with Purchasing Privacy

Jiang, P., Guo, F., Susilo, W., Au, M. H., Huang, X. & Liu, J. K., 2019, (Accepted/In press) In : IEEE Transactions on Services Computing. 12 p.

Research output: Contribution to journalArticleResearchpeer-review

Efficient threshold password-authenticated secret sharing protocols for cloud computing

Yi, X., Tari, Z., Hao, F., Chen, L., Liu, J. K., Yang, X., Lam, K. Y., Khalil, I. & Zomaya, A. Y., Jun 2019, In : Journal of Parallel and Distributed Computing. 128, p. 57-70 14 p.

Research output: Contribution to journalArticleResearchpeer-review

Enabling authorized encrypted search for multi-authority medical databases

Xu, L., Sun, S., Yuan, X., Liu, J. K., Zuo, C. & Chungen, X., 18 Mar 2019, (Accepted/In press) In : IEEE Transactions on Emerging Topics in Computing. 12 p.

Research output: Contribution to journalArticleResearchpeer-review

Private machine learning classification based on fully homomorphic encryption

Sun, X., Zhang, P., Liu, J. K., Yu, J. & Xie, W., 2019, (Accepted/In press) In : IEEE Transactions on Emerging Topics in Computing. p. 1-13 13 p.

Research output: Contribution to journalArticleResearchpeer-review

Proof-of-QoS: QoS based blockchain consensus protocol

Yu, B., Liu, J., Nepal, S., Yu, J. & Rimba, P., Nov 2019, In : Computers & Security. 87, 13 p., 101580.

Research output: Contribution to journalArticleResearchpeer-review

Towards multi-user searchable encryption supporting Boolean query and fast decryption

Wang, Y., Wang, J., Sun, S-F., Liu, J. K., Susilo, W., Baek, J., You, I. & Chen, X., 28 Mar 2019, In : Journal of Universal Computer Science. 25, 3, p. 222-244 23 p.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File
2018

Access control encryption with efficient verifiable sanitized decryption

Wang, H., Chen, K., Liu, J. K., Hu, Z. & Long, Y., Oct 2018, In : Information Sciences. 465, p. 72-85 14 p.

Research output: Contribution to journalArticleResearchpeer-review

An efficient access control scheme with outsourcing capability and attribute update for fog computing

Zhang, P., Chen, Z., Liu, J. K., Liang, K. A. & Liu, H., Jan 2018, In : Future Generation Computer Systems. 78, Part 2, p. 753-762 10 p.

Research output: Contribution to journalArticleResearchpeer-review

A Survey on Access Control in Fog Computing

Zhang, P., Liu, J. K., Richard Yu, F., Sookhak, M., Au, M. H. & Luo, X., 1 Feb 2018, In : IEEE Communications Magazine. 56, 2, p. 144-149 6 p.

Research output: Contribution to journalArticleResearchpeer-review

Attribute-based hybrid boolean keyword search over outsourced encrypted data

He, K., Guo, J., Weng, J., Weng, J., Liu, J. K. & Yi, X., 6 Aug 2018, (Accepted/In press) In : IEEE Transactions on Dependable and Secure Computing. 12 p.

Research output: Contribution to journalArticleResearchpeer-review

Expressive attribute-based keyword search with constant-size ciphertext

Han, J., Yang, Y., Liu, J. K., Li, J., Liang, K. & Shen, J., Aug 2018, In : Soft Computing. 22, 15, p. 5163-5177 15 p.

Research output: Contribution to journalArticleResearchpeer-review

Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage

Zuo, C., Shao, J., Liu, J. K., Wei, G. & Ling, Y., Jan 2018, In : IEEE Transactions on Information Forensics and Security. 13, 1, p. 186-196 11 p.

Research output: Contribution to journalArticleResearchpeer-review

GO-CP-ABE: group-oriented ciphertext-policy attribute-based encryption

Li, Y., Tao, X., Wu, W. & Liu, J. K., 2018, In : International Journal of Embedded Systems. 10, 1, p. 62-70 9 p.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File

Privacy-preserving personal data operation on mobile cloud-Chances and challenges over advanced persistent threat

Au, M. H. A., Liang, K. A., Liu, J. K., Lu, R. & Ning, J., Feb 2018, In : Future Generation Computer Systems. 79, 1, p. 337-349 12 p.

Research output: Contribution to journalArticleResearchpeer-review

Server-Aided Attribute-Based Signature with Revocation for Resource-Constrained Industrial Internet of Things Devices

Cui, H., Deng, R. H., Liu, J. K., Yi, X. & Li, Y., Aug 2018, In : IEEE Transactions on Industrial Informatics. 14, 8, p. 3724-3732 9 p.

Research output: Contribution to journalArticleResearchpeer-review

Trust chain: Establishing trust in the iot-based applications ecosystem using blockchain

Yu, B., Wright, J., Nepal, S., Zhu, L., Liu, J. & Ranjan, R., Jul 2018, In : IEEE Cloud Computing. 5, 4, p. 12-23 12 p.

Research output: Contribution to journalArticleOtherpeer-review

Verifiable keyword search for secure big data-based mobile healthcare networks with fine-grained authorization control

Chen, Z., Zhang, F., Zhang, P., Liu, J. K., Huang, J., Zhao, H. & Shen, J., Oct 2018, In : Future Generation Computer Systems. 87, p. 712-724 13 p.

Research output: Contribution to journalArticleResearchpeer-review

2017

A general framework for secure sharing of personal health records in cloud system

Au, M. H., Yuen, T. H., Liu, J. K., Susilo, W., Huang, X., Xiang, Y. & Jiang, Z. L., Dec 2017, In : Journal of Computer and System Sciences. 90, p. 46-62 17 p.

Research output: Contribution to journalArticleResearchpeer-review

A new public remote integrity checking scheme with user and data privacy

Feng, Y., Yang, G. & Liu, J. K., 2017, In : International Journal of Applied Cryptography. 3, 3, p. 196-209 14 p.

Research output: Contribution to journalArticleResearchpeer-review

Towards secure and cost-effective fuzzy access control in mobile cloud computing

Wu, W., Hu, S., Yang, X., Liu, J. K. & Au, M. H., 1 May 2017, In : Soft Computing. 21, 10, p. 2643-2649 7 p.

Research output: Contribution to journalArticleResearchpeer-review

2016

An efficient file hierarchy attribute-based encryption scheme in cloud computing

Wang, S., Zhou, J., Liu, J. K., Yu, J., Chen, J. & Xie, W., 1 Jun 2016, In : IEEE Transactions on Information Forensics and Security. 11, 6, p. 1265-1277 13 p.

Research output: Contribution to journalArticleResearchpeer-review

Attribute-based data sharing scheme revisited in cloud computing

Wang, S., Liang, K., Liu, J. K., Chen, J., Yu, J. & Xie, W., 1 Aug 2016, In : IEEE Transactions on Information Forensics and Security. 11, 8, p. 1661-1673 13 p., 7448433.

Research output: Contribution to journalArticleResearchpeer-review

Efficient handover authentication with user anonymity and untraceability for mobile cloud computing

Yang, X., Huang, X. & Liu, J., Sep 2016, In : Future Generation Computer Systems. 62, p. 190-195 6 p.

Research output: Contribution to journalArticleResearchpeer-review

Efficient privacy-preserving charging station reservation system for electric vehicles

Liu, J. K., Susilo, W., Yuen, T. H., Au, M. H., Fang, J., Jiang, Z. L. & Zhou, J., 2016, In : Computer Journal. 59, 7, p. 1040-1053 14 p.

Research output: Contribution to journalArticleResearchpeer-review

Faulty instantiations of threshold ring signature from threshold proof-of-knowledge protocol

Liu, J. K., Yeo, S. L., Yap, W-S., Chow, S. S. M., Wong, D. S. & Susilo, W., 21 Jul 2016, In : Computer Journal. 59, 7, p. 945-954 10 p.

Research output: Contribution to journalArticleResearchpeer-review

Fine-grained two-factor access control for web-based cloud computing services

Liu, J. K., Au, M. H., Huang, X., Lu, R. & Li, J., 2016, In : IEEE Transactions on Information Forensics and Security. 11, 3, p. 484-497 14 p.

Research output: Contribution to journalArticleResearchpeer-review

On the security of two identity-based conditional proxy re-encryption schemes

He, K., Weng, J., Deng, R. H. & Liu, J. K., 2016, In : Theoretical Computer Science. 652, p. 18-27 10 p.

Research output: Contribution to journalArticleResearchpeer-review

Privacy-preserving and regular language search over encrypted cloud data

Liang, K., Huang, X., Guo, F. & Liu, J. K., 2016, In : IEEE Transactions on Information Forensics and Security. 11, 10, p. 2365-2376 12 p., 7492188.

Research output: Contribution to journalArticleResearchpeer-review

Privacy-preserving public auditing protocol for low-performance end devices in cloud

Li, J., Zhang, L., Liu, J. K., Qian, H. & Dong, Z., 2016, In : IEEE Transactions on Information Forensics and Security. 11, 11, p. 2572-2583 12 p., 7506095.

Research output: Contribution to journalArticleResearchpeer-review

RKA-secure public key encryptions against efficiently invertible functions

Sun, S-F., Liu, J. K., Yu, Y., Qin, B. & Gu, D., 2016, In : Computer Journal. 59, 11, p. 1637-1658 22 p.

Research output: Contribution to journalArticleResearchpeer-review

Two-factor data security protection mechanism for cloud storage system

Liu, J. K., Liang, K., Susilo, W., Liu, J. & Xiang, Y., 1 Jun 2016, In : IEEE Transactions on Computers. 65, 6, p. 1992-2004 13 p., 7173024.

Research output: Contribution to journalArticleResearchpeer-review

2015

A resolving set based algorithm for fault identification in wireless mesh networks

Wang, X., Xu, L., Zhou, S. & Liu, J. K., Mar 2015, In : Journal of Universal Computer Science. 21, 3, p. 384-405 22 p.

Research output: Contribution to journalArticleResearchpeer-review

A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing

Liang, K., Au, M. H., Liu, J. K., Susilo, W., Wong, D. S., Yang, G., Yu, Y. & Yang, A., Nov 2015, In : Future Generation Computer Systems. 52, p. 95-108 14 p.

Research output: Contribution to journalArticleResearchpeer-review

A secure cloud computing based framework for big data information management of smart grid

Baek, J., Vu, Q. H., Liu, J. K., Huang, X. & Xiang, Y., 2015, In : IEEE Transactions on Cloud Computing. 3, 2, p. 233-244 12 p.

Research output: Contribution to journalArticleResearchpeer-review

Cooperative attribute-based access control for enterprise computing system

Li, M., Huang, X., Liu, J. K., Xu, L. & Wu, W., 2015, In : International Journal of Embedded Systems. 7, 3/4, p. 191-202 12 p.

Research output: Contribution to journalArticleResearchpeer-review

Cost-effective authentic and anonymous data sharing with forward security

Huang, X., Liu, J. K., Tang, S., Xiang, Y., Liang, K., Xu, L. & Zhou, J., 1 Apr 2015, In : IEEE Transactions on Computers. 64, 4, p. 971-983 13 p.

Research output: Contribution to journalArticleResearchpeer-review

Efficient and fully CCA secure conditional proxy re-encryption from hierarchical identity-based encryption

Liang, K. A., Susilo, W., Liu, K. S. & Wong, D. S., 2015, In : Computer Journal. 58, 10, p. 2778 - 2792 15 p.

Research output: Contribution to journalArticleResearchpeer-review

k-times attribute-based anonymous access control for cloud computing

Yuen, T. H., Liu, J. K., Au, M. H., Huang, X., Susilo, W. & Zhou, J., 1 Sep 2015, In : IEEE Transactions on Computers. 64, 9, p. 2595-2608 14 p., 6945366.

Research output: Contribution to journalArticleResearchpeer-review

On the security of a lightweight authentication and encryption scheme for mobile ad hoc network

Yap, W-S., Liu, J. K., Tan, S. Y. & Goi, B-M., 2015, In : Security and Communication Networks. 8, 17, p. 3094-3098 5 p.

Research output: Contribution to journalArticleOtherpeer-review

Open Access
File

Privacy concerns for photo sharing in online social networks

Liang, K. A., Liu, K. S. J., Lu, R. & Wong, D. S., 2015, In : IEEE Internet Computing. 19, 2, p. 58 - 63 6 p.

Research output: Contribution to journalArticleResearchpeer-review

Privacy-preserving ciphertext multi-sharing control for big data storage

Liang, K. A., Susilo, W. & Liu, K. S., 2015, In : IEEE Transactions on Information Forensics and Security. 10, 8, p. 1578 - 1589 12 p.

Research output: Contribution to journalArticleResearchpeer-review

Secure sharing and searching for real-time video data in mobile cloud

Liu, K. S. J., Au, M. H. A., Susilo, W., Liang, K. A., Lu, R. & Srinivasan, B., 2015, In : IEEE Network. 29, 2, p. 46 - 50 5 p.

Research output: Contribution to journalArticleResearchpeer-review

Secure sharing of personal health records in cloud computing: ciphertext-policy attribute-based signcryption

Liu, J., Huang, X. & Liu, J. K., Nov 2015, In : Future Generation Computer Systems. 52, p. 67-76 10 p.

Research output: Contribution to journalArticleResearchpeer-review

Time-bound anonymous authentication for roaming networks

Liu, J. K., Chu, C-K., Chow, S. S. M., Huang, X., Au, M. H. & Zhou, J., Jan 2015, In : IEEE Transactions on Information Forensics and Security. 10, 1, p. 178-189 12 p.

Research output: Contribution to journalArticleResearchpeer-review

Towards secure and reliable cloud storage against data re-outsourcing

Jiang, T., Chen, X., Li, J., Wong, D. S., Ma, J. & Liu, J. K., Nov 2015, In : Future Generation Computer Systems. 52, p. 86-94 9 p.

Research output: Contribution to journalArticleResearchpeer-review

Universal designated verifier transitive signatures for graph-based big data

Hou, S., Huang, X., Liu, K. S., Li, J. & Xu, L., 2015, In : Information Sciences. 318, p. 144 - 156 13 p.

Research output: Contribution to journalArticleResearchpeer-review

2014

A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing

Liang, K., Au, M. H., Liu, J. K., Susilo, W., Wong, D. S., Yang, G., Phuong, T. V. X. & Xie, Q., Oct 2014, In : IEEE Transactions on Information Forensics and Security. 9, 10, p. 1667 - 1680 14 p.

Research output: Contribution to journalArticleResearchpeer-review

An efficient PHR service system supporting fuzzy keyword search and fine-grained access control

Xhafa, F., Wang, J., Chen, X., Liu, J. K., Li, J. & Krause, P., Sep 2014, In : Soft Computing. 18, 9, p. 1795 - 1802 8 p.

Research output: Contribution to journalArticleResearchpeer-review