Obserwuj
Joseph K. Liu
Joseph K. Liu
Associate Professor, Faculty of IT, Monash University
Zweryfikowany adres z monash.edu - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
Linkable spontaneous anonymous group signature for ad hoc groups
JK Liu, VK Wei, DS Wong
Australasian Conference on Information Security and Privacy, 325-335, 2004
4802004
Toward efficient and privacy-preserving computing in big data era
R Lu, H Zhu, X Liu, JK Liu, J Shao
IEEE Network 28 (4), 46-50, 2014
3532014
A secure cloud computing based framework for big data information management of smart grid
J Baek, QH Vu, JK Liu, X Huang, Y Xiang
IEEE transactions on cloud computing 3 (2), 233-244, 2014
2842014
Malicious KGC attacks in certificateless cryptography
MH Au, Y Mu, J Chen, DS Wong, JK Liu, G Yang
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
2792007
Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model
JK Liu, MH Au, W Susilo
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
2712007
An efficient file hierarchy attribute-based encryption scheme in cloud computing
S Wang, J Zhou, JK Liu, J Yu, J Chen, W Xie
IEEE Transactions on Information Forensics and Security 11 (6), 1265-1277, 2016
2342016
Ringct 2.0: A compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency monero
SF Sun, MH Au, JK Liu, TH Yuen
European Symposium on Research in Computer Security, 456-474, 2017
2332017
Secure sharing of personal health records in cloud computing: Ciphertext-policy attribute-based signcryption
J Liu, X Huang, JK Liu
Future Generation Computer Systems 52, 67-76, 2015
2292015
An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing
K Liang, JK Liu, DS Wong, W Susilo
European symposium on research in computer security, 257-272, 2014
1692014
Efficient online/offline identity-based signature for wireless sensor network
JK Liu, J Baek, J Zhou, Y Yang, JW Wong
International Journal of Information Security 9 (4), 287-296, 2010
1692010
Cost-effective authentic and anonymous data sharing with forward security
X Huang, JK Liu, S Tang, Y Xiang, K Liang, L Xu, J Zhou
IEEE Transactions on computers 64 (4), 971-983, 2014
1472014
An efficient access control scheme with outsourcing capability and attribute update for fog computing
P Zhang, Z Chen, JK Liu, K Liang, H Liu
Future Generation Computer Systems 78, 753-762, 2018
1432018
A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing
K Liang, MH Au, JK Liu, W Susilo, DS Wong, G Yang, TVX Phuong, Q Xie
IEEE Transactions on Information Forensics and Security 9 (10), 1667-1680, 2014
1432014
A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing
K Liang, MH Au, JK Liu, W Susilo, DS Wong, G Yang, Y Yu, A Yang
Future Generation Computer Systems 52, 95-108, 2015
1412015
Practical backward-secure searchable encryption from symmetric puncturable encryption
SF Sun, X Yuan, JK Liu, R Steinfeld, A Sakzad, V Vo, S Nepal
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1342018
Fine-grained two-factor access control for web-based cloud computing services
JK Liu, MH Au, X Huang, R Lu, J Li
IEEE Transactions on Information Forensics and Security 11 (3), 484-497, 2015
1342015
Attribute-based data sharing scheme revisited in cloud computing
S Wang, K Liang, JK Liu, J Chen, J Yu, W Xie
IEEE Transactions on Information Forensics and Security 11 (8), 1661-1673, 2016
1312016
ID-based ring signature scheme secure in the standard model
MH Au, JK Liu, TH Yuen, DS Wong
International Workshop on Security, 1-16, 2006
1302006
Separable linkable threshold ring signatures
PP Tsang, VK Wei, TK Chan, MH Au, JK Liu, DS Wong
International Conference on Cryptology in India, 384-398, 2004
1302004
Security concerns in popular cloud storage services
CK Chu, WT Zhu, J Han, JK Liu, J Xu, J Zhou
IEEE Pervasive Computing 12 (4), 50-57, 2013
1272013
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20