If you made any changes in Pure these will be visible here soon.

Research Output 2005 2019

Filter
Article
2019

Efficient and Adaptive Procurement Protocol with Purchasing Privacy

Jiang, P., Guo, F., Susilo, W., Au, M. H., Huang, X. & Liu, J. K., 2019, (Accepted/In press) In : IEEE Transactions on Services Computing. 12 p.

Research output: Contribution to journalArticleResearchpeer-review

Private machine learning classification based on fully homomorphic encryption

Sun, X., Zhang, P., Liu, J. K., Yu, J. & Xie, W., 2019, (Accepted/In press) In : IEEE Transactions on Emerging Topics in Computing. p. 1-13 13 p.

Research output: Contribution to journalArticleResearchpeer-review

2018

An efficient access control scheme with outsourcing capability and attribute update for fog computing

Zhang, P., Chen, Z., Liu, J. K., Liang, K. A. & Liu, H., Jan 2018, In : Future Generation Computer Systems. 78, Part 2, p. 753-762 10 p.

Research output: Contribution to journalArticleResearchpeer-review

A Survey on Access Control in Fog Computing

Zhang, P., Liu, J. K., Richard Yu, F., Sookhak, M., Au, M. H. & Luo, X., 1 Feb 2018, In : IEEE Communications Magazine. 56, 2, p. 144-149 6 p.

Research output: Contribution to journalArticleResearchpeer-review

Expressive attribute-based keyword search with constant-size ciphertext

Han, J., Yang, Y., Liu, J. K., Li, J., Liang, K. & Shen, J., Aug 2018, In : Soft Computing. 22, 15, p. 5163-5177 15 p.

Research output: Contribution to journalArticleResearchpeer-review

Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage

Zuo, C., Shao, J., Liu, J. K., Wei, G. & Ling, Y., Jan 2018, In : IEEE Transactions on Information Forensics and Security. 13, 1, p. 186-196 11 p.

Research output: Contribution to journalArticleResearchpeer-review

Privacy-preserving personal data operation on mobile cloud-Chances and challenges over advanced persistent threat

Au, M. H. A., Liang, K. A., Liu, J. K., Lu, R. & Ning, J., Feb 2018, In : Future Generation Computer Systems. 79, 1, p. 337-349 12 p.

Research output: Contribution to journalArticleResearchpeer-review

Server-Aided Attribute-Based Signature with Revocation for Resource-Constrained Industrial Internet of Things Devices

Cui, H., Deng, R. H., Liu, J. K., Yi, X. & Li, Y., Aug 2018, In : IEEE Transactions on Industrial Informatics. 14, 8, p. 3724-3732 9 p.

Research output: Contribution to journalArticleResearchpeer-review

Verifiable keyword search for secure big data-based mobile healthcare networks with fine-grained authorization control

Chen, Z., Zhang, F., Zhang, P., Liu, J. K., Huang, J., Zhao, H. & Shen, J., Oct 2018, In : Future Generation Computer Systems. 87, p. 712-724 13 p.

Research output: Contribution to journalArticleResearchpeer-review

2017

A general framework for secure sharing of personal health records in cloud system

Au, M. H., Yuen, T. H., Liu, J. K., Susilo, W., Huang, X., Xiang, Y. & Jiang, Z. L., Dec 2017, In : Journal of Computer and System Sciences. 90, p. 46-62 17 p.

Research output: Contribution to journalArticleResearchpeer-review

A new public remote integrity checking scheme with user and data privacy

Feng, Y., Yang, G. & Liu, J. K., 2017, In : International Journal of Applied Cryptography. 3, 3, p. 196-209 14 p.

Research output: Contribution to journalArticleResearchpeer-review

Towards secure and cost-effective fuzzy access control in mobile cloud computing

Wu, W., Hu, S., Yang, X., Liu, J. K. & Au, M. H., 1 May 2017, In : Soft Computing. 21, 10, p. 2643-2649 7 p.

Research output: Contribution to journalArticleResearchpeer-review

2016

An efficient file hierarchy attribute-based encryption scheme in cloud computing

Wang, S., Zhou, J., Liu, J. K., Yu, J., Chen, J. & Xie, W., 1 Jun 2016, In : IEEE Transactions on Information Forensics and Security. 11, 6, p. 1265-1277 13 p.

Research output: Contribution to journalArticleResearchpeer-review

Attribute-based data sharing scheme revisited in cloud computing

Wang, S., Liang, K., Liu, J. K., Chen, J., Yu, J. & Xie, W., 1 Aug 2016, In : IEEE Transactions on Information Forensics and Security. 11, 8, p. 1661-1673 13 p., 7448433.

Research output: Contribution to journalArticleResearchpeer-review

Efficient handover authentication with user anonymity and untraceability for mobile cloud computing

Yang, X., Huang, X. & Liu, J., Sep 2016, In : Future Generation Computer Systems. 62, p. 190-195 6 p.

Research output: Contribution to journalArticleResearchpeer-review

Efficient privacy-preserving charging station reservation system for electric vehicles

Liu, J. K., Susilo, W., Yuen, T. H., Au, M. H., Fang, J., Jiang, Z. L. & Zhou, J., 2016, In : Computer Journal. 59, 7, p. 1040-1053 14 p.

Research output: Contribution to journalArticleResearchpeer-review

Faulty instantiations of threshold ring signature from threshold proof-of-knowledge protocol

Liu, J. K., Yeo, S. L., Yap, W-S., Chow, S. S. M., Wong, D. S. & Susilo, W., 21 Jul 2016, In : Computer Journal. 59, 7, p. 945-954 10 p.

Research output: Contribution to journalArticleResearchpeer-review

Fine-grained two-factor access control for web-based cloud computing services

Liu, J. K., Au, M. H., Huang, X., Lu, R. & Li, J., 2016, In : IEEE Transactions on Information Forensics and Security. 11, 3, p. 484-497 14 p.

Research output: Contribution to journalArticleResearchpeer-review

On the security of two identity-based conditional proxy re-encryption schemes

He, K., Weng, J., Deng, R. H. & Liu, J. K., 2016, In : Theoretical Computer Science. 652, p. 18-27 10 p.

Research output: Contribution to journalArticleResearchpeer-review

Privacy-preserving and regular language search over encrypted cloud data

Liang, K., Huang, X., Guo, F. & Liu, J. K., 2016, In : IEEE Transactions on Information Forensics and Security. 11, 10, p. 2365-2376 12 p., 7492188.

Research output: Contribution to journalArticleResearchpeer-review

Privacy-preserving public auditing protocol for low-performance end devices in cloud

Li, J., Zhang, L., Liu, J. K., Qian, H. & Dong, Z., 2016, In : IEEE Transactions on Information Forensics and Security. 11, 11, p. 2572-2583 12 p., 7506095.

Research output: Contribution to journalArticleResearchpeer-review

RKA-secure public key encryptions against efficiently invertible functions

Sun, S-F., Liu, J. K., Yu, Y., Qin, B. & Gu, D., 2016, In : Computer Journal. 59, 11, p. 1637-1658 22 p.

Research output: Contribution to journalArticleResearchpeer-review

Two-factor data security protection mechanism for cloud storage system

Liu, J. K., Liang, K., Susilo, W., Liu, J. & Xiang, Y., 1 Jun 2016, In : IEEE Transactions on Computers. 65, 6, p. 1992-2004 13 p., 7173024.

Research output: Contribution to journalArticleResearchpeer-review

2015

A resolving set based algorithm for fault identification in wireless mesh networks

Wang, X., Xu, L., Zhou, S. & Liu, J. K., Mar 2015, In : Journal of Universal Computer Science. 21, 3, p. 384-405 22 p.

Research output: Contribution to journalArticleResearchpeer-review

A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing

Liang, K., Au, M. H., Liu, J. K., Susilo, W., Wong, D. S., Yang, G., Yu, Y. & Yang, A., Nov 2015, In : Future Generation Computer Systems. 52, p. 95-108 14 p.

Research output: Contribution to journalArticleResearchpeer-review

A secure cloud computing based framework for big data information management of smart grid

Baek, J., Vu, Q. H., Liu, J. K., Huang, X. & Xiang, Y., 2015, In : IEEE Transactions on Cloud Computing. 3, 2, p. 233-244 12 p.

Research output: Contribution to journalArticleResearchpeer-review

Cooperative attribute-based access control for enterprise computing system

Li, M., Huang, X., Liu, J. K., Xu, L. & Wu, W., 2015, In : International Journal of Embedded Systems. 7, 3/4, p. 191-202 12 p.

Research output: Contribution to journalArticleResearchpeer-review

Cost-effective authentic and anonymous data sharing with forward security

Huang, X., Liu, J. K., Tang, S., Xiang, Y., Liang, K., Xu, L. & Zhou, J., 1 Apr 2015, In : IEEE Transactions on Computers. 64, 4, p. 971-983 13 p.

Research output: Contribution to journalArticleResearchpeer-review

Efficient and fully CCA secure conditional proxy re-encryption from hierarchical identity-based encryption

Liang, K. A., Susilo, W., Liu, K. S. & Wong, D. S., 2015, In : Computer Journal. 58, 10, p. 2778 - 2792 15 p.

Research output: Contribution to journalArticleResearchpeer-review

k-times attribute-based anonymous access control for cloud computing

Yuen, T. H., Liu, J. K., Au, M. H., Huang, X., Susilo, W. & Zhou, J., 1 Sep 2015, In : IEEE Transactions on Computers. 64, 9, p. 2595-2608 14 p., 6945366.

Research output: Contribution to journalArticleResearchpeer-review

On the security of a lightweight authentication and encryption scheme for mobile ad hoc network

Yap, W-S., Liu, J. K., Tan, S. Y. & Goi, B-M., 2015, In : Security and Communication Networks. 8, 17, p. 3094-3098 5 p.

Research output: Contribution to journalArticleOtherpeer-review

Open Access
File

Privacy concerns for photo sharing in online social networks

Liang, K. A., Liu, K. S. J., Lu, R. & Wong, D. S., 2015, In : IEEE Internet Computing. 19, 2, p. 58 - 63 6 p.

Research output: Contribution to journalArticleResearchpeer-review

Privacy-preserving ciphertext multi-sharing control for big data storage

Liang, K. A., Susilo, W. & Liu, K. S., 2015, In : IEEE Transactions on Information Forensics and Security. 10, 8, p. 1578 - 1589 12 p.

Research output: Contribution to journalArticleResearchpeer-review

Secure sharing and searching for real-time video data in mobile cloud

Liu, K. S. J., Au, M. H. A., Susilo, W., Liang, K. A., Lu, R. & Srinivasan, B., 2015, In : IEEE Network. 29, 2, p. 46 - 50 5 p.

Research output: Contribution to journalArticleResearchpeer-review

Secure sharing of personal health records in cloud computing: ciphertext-policy attribute-based signcryption

Liu, J., Huang, X. & Liu, J. K., Nov 2015, In : Future Generation Computer Systems. 52, p. 67-76 10 p.

Research output: Contribution to journalArticleResearchpeer-review

Time-bound anonymous authentication for roaming networks

Liu, J. K., Chu, C-K., Chow, S. S. M., Huang, X., Au, M. H. & Zhou, J., Jan 2015, In : IEEE Transactions on Information Forensics and Security. 10, 1, p. 178-189 12 p.

Research output: Contribution to journalArticleResearchpeer-review

Towards secure and reliable cloud storage against data re-outsourcing

Jiang, T., Chen, X., Li, J., Wong, D. S., Ma, J. & Liu, J. K., Nov 2015, In : Future Generation Computer Systems. 52, p. 86-94 9 p.

Research output: Contribution to journalArticleResearchpeer-review

Universal designated verifier transitive signatures for graph-based big data

Hou, S., Huang, X., Liu, K. S., Li, J. & Xu, L., 2015, In : Information Sciences. 318, p. 144 - 156 13 p.

Research output: Contribution to journalArticleResearchpeer-review

2014

A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing

Liang, K., Au, M. H., Liu, J. K., Susilo, W., Wong, D. S., Yang, G., Phuong, T. V. X. & Xie, Q., Oct 2014, In : IEEE Transactions on Information Forensics and Security. 9, 10, p. 1667 - 1680 14 p.

Research output: Contribution to journalArticleResearchpeer-review

An efficient PHR service system supporting fuzzy keyword search and fine-grained access control

Xhafa, F., Wang, J., Chen, X., Liu, J. K., Li, J. & Krause, P., Sep 2014, In : Soft Computing. 18, 9, p. 1795 - 1802 8 p.

Research output: Contribution to journalArticleResearchpeer-review

A new payment system for enhancing location privacy of electric vehicles

Au, M. H. A., Liu, J. K., Fang, J., Jiang, Z. L., Susilo, W. & Zhou, J., Jan 2014, In : IEEE Transactions on Vehicular Technology. 63, 1, p. 3 - 18 16 p.

Research output: Contribution to journalArticleResearchpeer-review

A secure remote data integrity checking cloud storage system from threshold encryption

Yao, C., Xu, L., Huang, X. & Liu, J. K., Dec 2014, In : Journal of Ambient Intelligence and Humanized Computing. 5, 6, p. 857-865 9 p.

Research output: Contribution to journalArticleResearchpeer-review

Improvements on an authentication scheme for vehicular sensor networks

Liu, J. K., Yuen, T. H., Au, M. H. & Susilo, W., Apr 2014, In : Expert Systems with Applications. 41, 5, p. 2559 - 2564 6 p.

Research output: Contribution to journalArticleResearchpeer-review

Linkable ring signature with unconditional anonymity

Liu, J. K., Au, M. H., Susilo, W. & Zhou, J., Jan 2014, In : IEEE Transactions on Knowledge and Data Engineering. 26, 1, p. 157-165 9 p.

Research output: Contribution to journalArticleResearchpeer-review

Toward efficient and privacy-preserving computing in big data era

Lu, R., Zhu, H., Liu, X., Liu, J. K. & Shao, J., 2014, In : IEEE Network. 28, 4, p. 46-50 5 p.

Research output: Contribution to journalArticleResearchpeer-review

2013

Comments on 'Analysis and improvement of a secure and efficient handover authentication based on bilinear pairing functions'

Yeo, S. L., Yap, W-S., Liu, K. S. J. & Henricksen, M., 2013, In : IEEE Communications Letters. 17, 8, p. 1521 - 1523 3 p.

Research output: Contribution to journalArticleResearchpeer-review

Efficient Linkable and/or Threshold Ring Signature Without Random Oracles

Yuen, T. H., Liu, K. S. J., Au, M. H. A., Susilo, W. & Zhou, J., 2013, In : Computer Journal. 56, 4, p. 407 - 421 15 p.

Research output: Contribution to journalArticleResearchpeer-review

Realizing fully secure unrestricted ID-based ring signature in the standard model based on HIBE

Au, M. H. A., Liu, K. S. J., Susilo, W. & Zhou, J., 2013, In : IEEE Transactions on Information Forensics and Security. 8, 12, p. 1909 - 1922 14 p.

Research output: Contribution to journalArticleResearchpeer-review

Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction

Au, M. H. A., Liu, J. K., Susilo, W. & Yuen, T. H., 2013, In : Theoretical Computer Science. 469, 14 p.

Research output: Contribution to journalArticleResearchpeer-review

Security concerns in popular cloud storage services

Chu, C-K., Zhu, W. T., Han, J., Liu, K. S. J., Xu, J. & Zhou, J., 2013, In : IEEE Pervasive Computing. 12, 4, p. 50 - 57 8 p.

Research output: Contribution to journalArticleResearchpeer-review