Volgen
Joseph K. Liu
Joseph K. Liu
Full Professor, Faculty of IT, Monash University
Geverifieerd e-mailadres voor monash.edu - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Linkable spontaneous anonymous group signature for ad hoc groups
JK Liu, VK Wei, DS Wong
ACISP 4, 325-335, 2004
5252004
Toward efficient and privacy-preserving computing in big data era
R Lu, H Zhu, X Liu, JK Liu, J Shao
IEEE Network 28 (4), 46-50, 2014
3802014
A secure cloud computing based framework for big data information management of smart grid
J Baek, QH Vu, JK Liu, X Huang, Y Xiang
IEEE transactions on cloud computing 3 (2), 233-244, 2014
2922014
Malicious KGC attacks in certificateless cryptography
MH Au, Y Mu, J Chen, DS Wong, JK Liu, G Yang
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
2822007
Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model
JK Liu, MH Au, W Susilo
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
2812007
Ringct 2.0: A compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency monero
SF Sun, MH Au, JK Liu, TH Yuen
Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017
2722017
An efficient file hierarchy attribute-based encryption scheme in cloud computing
S Wang, J Zhou, JK Liu, J Yu, J Chen, W Xie
IEEE Transactions on Information Forensics and Security 11 (6), 1265-1277, 2016
2652016
Secure sharing of personal health records in cloud computing: Ciphertext-policy attribute-based signcryption
J Liu, X Huang, JK Liu
Future Generation Computer Systems 52, 67-76, 2015
2502015
An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing
K Liang, JK Liu, DS Wong, W Susilo
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
1792014
Efficient online/offline identity-based signature for wireless sensor network
JK Liu, J Baek, J Zhou, Y Yang, JW Wong
Cryptology ePrint Archive, 2010
1702010
Practical backward-secure searchable encryption from symmetric puncturable encryption
SF Sun, X Yuan, JK Liu, R Steinfeld, A Sakzad, V Vo, S Nepal
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1672018
A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing
K Liang, MH Au, JK Liu, W Susilo, DS Wong, G Yang, Y Yu, A Yang
Future Generation Computer Systems 52, 95-108, 2015
1592015
An efficient access control scheme with outsourcing capability and attribute update for fog computing
P Zhang, Z Chen, JK Liu, K Liang, H Liu
Future Generation Computer Systems 78, 753-762, 2018
1572018
Cost-effective authentic and anonymous data sharing with forward security
X Huang, JK Liu, S Tang, Y Xiang, K Liang, L Xu, J Zhou
IEEE Transactions on computers 64 (4), 971-983, 2014
1562014
A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing
K Liang, MH Au, JK Liu, W Susilo, DS Wong, G Yang, TVX Phuong, Q Xie
IEEE Transactions on Information Forensics and Security 9 (10), 1667-1680, 2014
1482014
IoTChain: Establishing trust in the Internet of Things ecosystem using blockchain
B Yu, J Wright, S Nepal, L Zhu, J Liu, R Ranjan
IEEE Cloud Computing 5 (4), 12-23, 2018
143*2018
Attribute-based data sharing scheme revisited in cloud computing
S Wang, K Liang, JK Liu, J Chen, J Yu, W Xie
IEEE Transactions on Information Forensics and Security 11 (8), 1661-1673, 2016
1432016
Fine-grained two-factor access control for web-based cloud computing services
JK Liu, MH Au, X Huang, R Lu, J Li
IEEE Transactions on Information Forensics and Security 11 (3), 484-497, 2015
1382015
Separable linkable threshold ring signatures
PP Tsang, VK Wei, TK Chan, MH Au, JK Liu, DS Wong
Progress in Cryptology-INDOCRYPT 2004: 5th International Conference on …, 2005
1372005
A new payment system for enhancing location privacy of electric vehicles
MH Au, JK Liu, J Fang, ZL Jiang, W Susilo, J Zhou
IEEE transactions on vehicular technology 63 (1), 3-18, 2013
130*2013
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20