default search action
Joseph K. Liu
Person information
- affiliation (since 2015): Monash University, Faculty of Information Technology, Melbourne, Australia
- affiliation (2007 - 2015): Institute for Infocomm Research, Singapore
- affiliation (2005 - 2007): University of Bristol, UK
- affiliation (PhD 2004): Chinese University of Hong Kong, Department of Information Engineering, Hong Kong
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j102]Shabnam Kasra Kermanshahi, Ron Steinfeld, Xun Yi, Joseph K. Liu, Surya Nepal, Junwei Lou:
Fast and private multi-dimensional range search over encrypted data. Inf. Sci. 652: 119773 (2024) - [j101]Lin Mei, Chungen Xu, Lei Xu, Xingliang Yuan, Joseph K. Liu:
Practical Multi-Source Multi-Client Searchable Encryption With Forward Privacy: Refined Security Notion and New Constructions. IEEE Trans. Dependable Secur. Comput. 21(1): 63-77 (2024) - [j100]Chun Wai Lau, Joseph K. Liu, Xin Ma:
Blockchain-Based Messaging and Information Sharing Systems for Air Cargo Supply Chains. IEEE Trans. Engineering Management 71: 9019-9034 (2024) - [j99]Fei Chen, Haohui Zhang, Tao Xiang, Joseph K. Liu:
A Two-Stage Approach for Fair Data Trading Based on Blockchain. IEEE Trans. Inf. Forensics Secur. 19: 9835-9849 (2024) - [c153]Jun Zhao, Jiangshan Yu, Xingliang Yuan, Joseph K. Liu:
AegisDB: Scalable Blockchain Database with Secure Decentralised Load Balancing. ACISP (3) 2024: 105-119 - [c152]Xinyu Zhang, Ron Steinfeld, Joseph K. Liu, Muhammed F. Esgin, Dongxi Liu, Sushmita Ruj:
DualRing-PRF: Post-quantum (Linkable) Ring Signatures from Legendre and Power Residue PRFs. ACISP (2) 2024: 124-143 - [c151]Yanjun Shen, Joseph K. Liu, Xingliang Yuan, Shifeng Sun, Hui Cui:
SecuPath: A Secure and Privacy-Preserving Multiparty Path Planning Framework in UAV Applications. ACISP (3) 2024: 213-232 - [c150]Peter Ince, Xiapu Luo, Jiangshan Yu, Joseph K. Liu, Xiaoning Du:
Detect Llama - Finding Vulnerabilities in Smart Contracts Using Large Language Models. ACISP (3) 2024: 424-443 - [c149]Dongkun Hou, Jie Zhang, Shujie Cui, Joseph K. Liu:
Peer-to-Peer Energy Trading with Privacy and Fair Exchange. Blockchain 2024: 174-182 - [c148]Xinyu Zhang, Ron Steinfeld, Muhammed F. Esgin, Joseph K. Liu, Dongxi Liu, Sushmita Ruj:
Loquat: A SNARK-Friendly Post-quantum Signature Based on the Legendre PRF with Applications in Ring and Aggregate Signatures. CRYPTO (1) 2024: 3-38 - [i61]Peter Ince, Xiapu Luo, Jiangshan Yu, Joseph K. Liu, Xiaoning Du:
Detect Llama - Finding Vulnerabilities in Smart Contracts using Large Language Models. CoRR abs/2407.08969 (2024) - [i60]Xinyu Zhang, Ron Steinfeld, Muhammed F. Esgin, Joseph K. Liu, Dongxi Liu, Sushmita Ruj:
Loquat: A SNARK-Friendly Post-Quantum Signature based on the Legendre PRF with Applications in Ring and Aggregate Signatures. IACR Cryptol. ePrint Arch. 2024: 868 (2024) - [i59]Xinyu Zhang, Ron Steinfeld, Joseph K. Liu, Muhammed F. Esgin, Dongxi Liu, Sushmita Ruj:
DualRing-PRF: Post-Quantum (Linkable) Ring Signatures from Legendre and Power Residue PRFs. IACR Cryptol. ePrint Arch. 2024: 985 (2024) - 2023
- [j98]Hao Lin, Shi-Feng Sun, Mingqiang Wang, Joseph K. Liu, Weijia Wang:
Shorter Linkable Ring Signature Based on Middle-Product Learning with Errors Problem. Comput. J. 66(12): 2974-2989 (2023) - [j97]Maxime Buser, Rafael Dowsley, Muhammed F. Esgin, Clémentine Gritti, Shabnam Kasra Kermanshahi, Veronika Kuchta, Jason T. LeGrow, Joseph K. Liu, Raphaël C.-W. Phan, Amin Sakzad, Ron Steinfeld, Jiangshan Yu:
A Survey on Exotic Signatures for Post-quantum Blockchain: Challenges and Research Directions. ACM Comput. Surv. 55(12): 251:1-251:32 (2023) - [j96]Zoey Ziyi Li, Han Wang, Dragan Gasevic, Jiangshan Yu, Joseph K. Liu:
Enhancing Blockchain Adoption through Tailored Software Engineering: An Industrial-grounded Study in Education Credentialing. Distributed Ledger Technol. Res. Pract. 2(4): 1-24 (2023) - [j95]Yanli Ren, Zhuhuan Song, Shifeng Sun, Joseph K. Liu, Guorui Feng:
Outsourcing LDA-Based Face Recognition to an Untrusted Cloud. IEEE Trans. Dependable Secur. Comput. 20(3): 2058-2070 (2023) - [j94]Peng Zhang, Teng Huang, Xiaoqiang Sun, Wei Zhao, Hongwei Liu, Shangqi Lai, Joseph K. Liu:
Privacy-Preserving and Outsourced Multi-Party K-Means Clustering Based on Multi-Key Fully Homomorphic Encryption. IEEE Trans. Dependable Secur. Comput. 20(3): 2348-2359 (2023) - [j93]Pengfei Wu, Jianting Ning, Xinyi Huang, Joseph K. Liu:
Differentially Oblivious Two-Party Pattern Matching With Sublinear Round Complexity. IEEE Trans. Dependable Secur. Comput. 20(5): 4101-4117 (2023) - [j92]Mingyun Bian, Joseph K. Liu, Shifeng Sun, Xinpeng Zhang, Yanli Ren:
Verifiable Privacy-Enhanced Rotation Invariant LBP Feature Extraction in Fog Computing. IEEE Trans. Ind. Informatics 19(12): 11518-11530 (2023) - [j91]Viet Vo, Xingliang Yuan, Shi-Feng Sun, Joseph K. Liu, Surya Nepal, Cong Wang:
ShieldDB: An Encrypted Document Database With Padding Countermeasures. IEEE Trans. Knowl. Data Eng. 35(4): 4236-4252 (2023) - [c147]Xianrui Qin, Shimin Pan, Arash Mirzaei, Zhimei Sui, Oguzhan Ersoy, Amin Sakzad, Muhammed F. Esgin, Joseph K. Liu, Jiangshan Yu, Tsz Hon Yuen:
BlindHub: Bitcoin-Compatible Privacy-Preserving Payment Channel Hubs Supporting Variable Amounts. SP 2023: 2462-2480 - [c146]Jun Zhao, Jiangshan Yu, Xingliang Yuan, Joseph K. Liu, Cong Zuo:
Rethinking Practical Blockchain-Based Symmetric Searchable Encryption Services. TrustCom 2023: 307-317 - [c145]Peter Ince, Xiapu Luo, Jiangshan Yu, Joseph K. Liu, Xiaoning Du:
MATH - Finding and Fixing Exploits in Algorand. TrustCom 2023: 1572-1579 - [c144]Yanjun Zhang, Guangdong Bai, Mahawaga Arachchige Pathum Chamikara, Mengyao Ma, Liyue Shen, Jingwei Wang, Surya Nepal, Minhui Xue, Long Wang, Joseph K. Liu:
AgrEvader: Poisoning Membership Inference against Byzantine-robust Federated Learning. WWW 2023: 2371-2382 - [e9]Joseph K. Liu, Yang Xiang, Surya Nepal, Gene Tsudik:
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, ASIA CCS 2023, Melbourne, VIC, Australia, July 10-14, 2023. ACM 2023 [contents] - 2022
- [j90]Qingqing Gan, Joseph K. Liu, Xiaoming Wang, Xingliang Yuan, Shifeng Sun, Daxin Huang, Cong Zuo, Jianfeng Wang:
Verifiable searchable symmetric encryption for conjunctive keyword queries in cloud storage. Frontiers Comput. Sci. 16(6): 166820 (2022) - [j89]Jia Wen Seow, Mei Kuan Lim, Raphaël C.-W. Phan, Joseph K. Liu:
A comprehensive overview of Deepfake: Generation, detection, datasets, and opportunities. Neurocomputing 513: 351-371 (2022) - [j88]Shabnam Kasra Kermanshahi, Rafael Dowsley, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Surya Nepal, Xun Yi, Shangqi Lai:
Range search on encrypted spatial data with dynamic updates. J. Comput. Secur. 30(6): 829-849 (2022) - [j87]Cong Zuo, Shifeng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk, Lei Xu:
Forward and Backward Private DSSE for Range Queries. IEEE Trans. Dependable Secur. Comput. 19(1): 328-338 (2022) - [j86]Shifeng Sun, Cong Zuo, Joseph K. Liu, Amin Sakzad, Ron Steinfeld, Tsz Hon Yuen, Xingliang Yuan, Dawu Gu:
Non-Interactive Multi-Client Searchable Encryption: Realization and Implementation. IEEE Trans. Dependable Secur. Comput. 19(1): 452-467 (2022) - [j85]Yanxue Jia, Shifeng Sun, Yuncong Zhang, Qingzhao Zhang, Ning Ding, Zhiqiang Liu, Joseph K. Liu, Dawu Gu:
${\sf PBT}$PBT: A New Privacy-Preserving Payment Protocol for Blockchain Transactions. IEEE Trans. Dependable Secur. Comput. 19(1): 647-662 (2022) - [j84]Shabnam Kasra Kermanshahi, Shifeng Sun, Joseph K. Liu, Ron Steinfeld, Surya Nepal, Wang Fat Lau, Man Ho Allen Au:
Geometric Range Search on Encrypted Data With Forward/Backward Security. IEEE Trans. Dependable Secur. Comput. 19(1): 698-716 (2022) - [j83]Shangqi Lai, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Ron Steinfeld, Amin Sakzad, Dongxi Liu:
Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes. IEEE Trans. Dependable Secur. Comput. 19(4): 2609-2621 (2022) - [j82]Yunling Wang, Shifeng Sun, Jianfeng Wang, Joseph K. Liu, Xiaofeng Chen:
Achieving Searchable Encryption Scheme With Search Pattern Hidden. IEEE Trans. Serv. Comput. 15(2): 1012-1025 (2022) - [j81]Jianting Ning, Jiageng Chen, Kaitai Liang, Joseph K. Liu, Chunhua Su, Qianhong Wu:
Efficient Encrypted Data Search With Expressive Queries and Flexible Update. IEEE Trans. Serv. Comput. 15(3): 1619-1633 (2022) - [c143]Maxime Buser, Joseph K. Liu, Ron Steinfeld, Amin Sakzad:
Post-quantum ID-Based Ring Signatures from Symmetric-Key Primitives. ACNS 2022: 892-912 - [c142]Zhimei Sui, Joseph K. Liu, Jiangshan Yu, Man Ho Au, Jia Liu:
AuxChannel: Enabling Efficient Bi-Directional Channel for Scriptless Blockchains. AsiaCCS 2022: 138-152 - [c141]Zoey Ziyi Li, Joseph K. Liu, Jiangshan Yu, Dragan Gasevic:
Blockchain-based Solutions for Education Credentialing System: Comparison and Implications for Future Development. Blockchain 2022: 79-86 - [c140]Maxime Buser, Rafael Dowsley, Muhammed F. Esgin, Shabnam Kasra Kermanshahi, Veronika Kuchta, Joseph K. Liu, Raphaël C.-W. Phan, Zhenfei Zhang:
Post-Quantum Verifiable Random Function from Symmetric Primitives in PoS Blockchain. ESORICS (1) 2022: 25-45 - [c139]Zhimei Sui, Joseph K. Liu, Jiangshan Yu, Xianrui Qin:
MoNet: A Fast Payment Channel Network for Scriptless Cryptocurrency Monero. ICDCS 2022: 280-290 - [c138]Yanjun Shen, Bin Yu, Shangqi Lai, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Surya Nepal:
OblivSend: Secure and Ephemeral File Sharing Services with Oblivious Expiration Control. ISC 2022: 269-289 - [c137]Ru Ray Raymond Chao, Joseph K. Liu, Kai Su:
Blockchain Based Regulatory Technology Deployment for Real Estate Transaction. NSS 2022: 561-579 - [c136]Zoey Ziyi Li, Joseph K. Liu, Jiangshan Yu, Dragan Gasevic, Wayne Yang:
CVallet: A Blockchain-Oriented Application Development for Education and Recruitment. NSS 2022: 580-597 - [i58]Zhimei Sui, Joseph K. Liu, Jiangshan Yu, Man Ho Au, Jia Liu:
AuxChannel: Enabling Efficient Bi-Directional Channel for Scriptless Blockchains. IACR Cryptol. ePrint Arch. 2022: 117 (2022) - [i57]Maxime Buser, Joseph K. Liu, Ron Steinfeld, Amin Sakzad:
Post-Quantum ID-based Ring Signatures from Symmetric-key Primitives. IACR Cryptol. ePrint Arch. 2022: 416 (2022) - [i56]Zhimei Sui, Joseph K. Liu, Jiangshan Yu, Xianrui Qin:
MoNet: A Fast Payment Channel Network for Scriptless Cryptocurrency Monero. IACR Cryptol. ePrint Arch. 2022: 744 (2022) - [i55]Maxime Buser, Rafael Dowsley, Muhammed F. Esgin, Clémentine Gritti, Shabnam Kasra Kermanshahi, Veronika Kuchta, Jason T. LeGrow, Joseph K. Liu, Raphael C.-W. Phan, Amin Sakzad, Ron Steinfeld, Jiangshan Yu:
A Survey on Exotic Signatures for Post-Quantum Blockchain: Challenges & Research Directions. IACR Cryptol. ePrint Arch. 2022: 1151 (2022) - [i54]Xianrui Qin, Shimin Pan, Arash Mirzaei, Zhimei Sui, Oguzhan Ersoy, Amin Sakzad, Muhammed F. Esgin, Joseph K. Liu, Jiangshan Yu, Tsz Hon Yuen:
BlindHub: Bitcoin-Compatible Privacy-Preserving Payment Channel Hubs Supporting Variable Amounts. IACR Cryptol. ePrint Arch. 2022: 1735 (2022) - 2021
- [j80]Veronika Kuchta, Amin Sakzad, Ron Steinfeld, Joseph K. Liu:
Lattice-based zero-knowledge arguments for additive and multiplicative relations. Des. Codes Cryptogr. 89(5): 925-963 (2021) - [j79]Fan Zhang, Ziyuan Liang, Cong Zuo, Jun Shao, Jianting Ning, Jun Sun, Joseph K. Liu, Yibao Bao:
hPRESS: A Hardware-Enhanced Proxy Re-Encryption Scheme Using Secure Enclave. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 40(6): 1144-1157 (2021) - [j78]Shabnam Kasra Kermanshahi, Joseph K. Liu, Ron Steinfeld, Surya Nepal, Shangqi Lai, Randolph Loh, Cong Zuo:
Multi-Client Cloud-Based Symmetric Searchable Encryption. IEEE Trans. Dependable Secur. Comput. 18(5): 2419-2437 (2021) - [j77]Lei Xu, Shifeng Sun, Xingliang Yuan, Joseph K. Liu, Cong Zuo, Chungen Xu:
Enabling Authorized Encrypted Search for Multi-Authority Medical Databases. IEEE Trans. Emerg. Top. Comput. 9(1): 534-546 (2021) - [j76]Peng Jiang, Fuchun Guo, Willy Susilo, Man Ho Au, Xinyi Huang, Joseph K. Liu:
Efficient and Adaptive Procurement Protocol with Purchasing Privacy. IEEE Trans. Serv. Comput. 14(3): 683-694 (2021) - [c135]Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu:
Transparency or Anonymity Leak: Monero Mining Pools Data Publication. ACISP 2021: 433-450 - [c134]Viet Vo, Shangqi Lai, Xingliang Yuan, Surya Nepal, Joseph K. Liu:
Towards Efficient and Strong Backward Private Searchable Encryption with Secure Enclaves. ACNS (1) 2021: 50-75 - [c133]Runchao Han, Zhimei Sui, Jiangshan Yu, Joseph K. Liu, Shiping Chen:
Fact and Fiction: Challenging the Honest Majority Assumption of Permissionless Blockchains. AsiaCCS 2021: 817-831 - [c132]Shange Fu, Jiangshan Yu, Rafael Dowsley, Joseph K. Liu:
On the Shutdown Price of Blockchain Mining Machines. Blockchain 2021: 180-187 - [c131]Tsz Hon Yuen, Muhammed F. Esgin, Joseph K. Liu, Man Ho Au, Zhimin Ding:
DualRing: Generic Construction of Ring Signatures with Efficient Instantiations. CRYPTO (1) 2021: 251-281 - [c130]Shabnam Kasra Kermanshahi, Rafael Dowsley, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Surya Nepal, Xun Yi:
Geo-DRS: Geometric Dynamic Range Search on Spatial Data with Backward and Content Privacy. ESORICS (2) 2021: 24-43 - [c129]Haoran Yuan, Xiaofeng Chen, Guowen Xu, Jianting Ning, Joseph K. Liu, Robert H. Deng:
Efficient and Verifiable Proof of Replication with Fast Fault Localization. INFOCOM 2021: 1-10 - [c128]Yanjun Shen, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Surya Nepal:
OblivShare: Towards Privacy-Preserving File Sharing with Oblivious Expiration Control. ISPEC 2021: 126-146 - [c127]Joseph K. Liu, Man Ho Au, Tsz Hon Yuen, Cong Zuo, Jiawei Wang, Amin Sakzad, Xiapu Luo, Li Li, Kim-Kwang Raymond Choo:
Privacy-Preserving Contact Tracing Protocol for Mobile Devices: A Zero-Knowledge Proof Approach. ISPEC 2021: 327-344 - [c126]Shangqi Lai, Xingliang Yuan, Joseph K. Liu, Xun Yi, Qi Li, Dongxi Liu, Surya Nepal:
OblivSketch: Oblivious Network Measurement as a Cloud Service. NDSS 2021 - [c125]Shifeng Sun, Ron Steinfeld, Shangqi Lai, Xingliang Yuan, Amin Sakzad, Joseph K. Liu, Surya Nepal, Dawu Gu:
Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy. NDSS 2021 - [e8]Joseph K. Liu, Sokratis K. Katsikas, Weizhi Meng, Willy Susilo, Rolly Intan:
Information Security - 24th International Conference, ISC 2021, Virtual Event, November 10-12, 2021, Proceedings. Lecture Notes in Computer Science 13118, Springer 2021, ISBN 978-3-030-91355-7 [contents] - [i53]Maxime Buser, Rafael Dowsley, Muhammed F. Esgin, Shabnam Kasra Kermanshahi, Veronika Kuchta, Joseph K. Liu, Raphael C.-W. Phan, Zhenfei Zhang:
Post-Quantum Verifiable Random Function from Symmetric Primitives in PoS Blockchain. IACR Cryptol. ePrint Arch. 2021: 302 (2021) - [i52]Tsz Hon Yuen, Muhammed F. Esgin, Joseph K. Liu, Man Ho Au, Zhimin Ding:
DualRing: Generic Construction of Ring Signatures with Efficient Instantiations. IACR Cryptol. ePrint Arch. 2021: 1213 (2021) - [i51]Veronika Kuchta, Joseph K. Liu:
Non-Slanderability of Linkable Spontaneous Anonymous Group Signature (LSAG). IACR Cryptol. ePrint Arch. 2021: 1406 (2021) - [i50]Cong Zuo, Shangqi Lai, Xingliang Yuan, Joseph K. Liu, Jun Shao, Huaxiong Wang:
Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy. IACR Cryptol. ePrint Arch. 2021: 1585 (2021) - 2020
- [j75]Shangqi Lai, Xingliang Yuan, Amin Sakzad, Mahsa Salehi, Joseph K. Liu, Dongxi Liu:
Enabling Efficient Privacy-Assured Outlier Detection Over Encrypted Incremental Data Sets. IEEE Internet Things J. 7(4): 2651-2662 (2020) - [j74]Lei Xu, Chungen Xu, Joseph K. Liu, Cong Zuo, Peng Zhang:
Building a dynamic searchable encrypted medical database for multi-client. Inf. Sci. 527: 394-405 (2020) - [j73]Kai He, Jun Guo, Jian Weng, Jiasi Weng, Joseph K. Liu, Xun Yi:
Attribute-Based Hybrid Boolean Keyword Search over Outsourced Encrypted Data. IEEE Trans. Dependable Secur. Comput. 17(6): 1207-1217 (2020) - [j72]Xiaoqiang Sun, Peng Zhang, Joseph K. Liu, Jianping Yu, Weixin Xie:
Private Machine Learning Classification Based on Fully Homomorphic Encryption. IEEE Trans. Emerg. Top. Comput. 8(2): 352-364 (2020) - [j71]Xiao Yang, Wang Fat Lau, Qingqing Ye, Man Ho Au, Joseph K. Liu, Jacob Cheng:
Practical Escrow Protocol for Bitcoin. IEEE Trans. Inf. Forensics Secur. 15: 3023-3034 (2020) - [j70]Xiaoyu Zhang, Xiaofeng Chen, Joseph K. Liu, Yang Xiang:
DeepPAR and DeepDPA: Privacy Preserving and Asynchronous Deep Learning for Industrial IoT. IEEE Trans. Ind. Informatics 16(3): 2081-2090 (2020) - [c124]Viet Vo, Shangqi Lai, Xingliang Yuan, Shifeng Sun, Surya Nepal, Joseph K. Liu:
Accelerating Forward and Backward Private Searchable Encryption Using Trusted Execution. ACNS (2) 2020: 83-103 - [c123]Tsz Hon Yuen, Shifeng Sun, Joseph K. Liu, Man Ho Au, Muhammed F. Esgin, Qingzhao Zhang, Dawu Gu:
RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security. Financial Cryptography 2020: 464-483 - [c122]Shifeng Sun, Amin Sakzad, Ron Steinfeld, Joseph K. Liu, Dawu Gu:
Public-Key Puncturable Encryption: Modular and Compact Constructions. Public Key Cryptography (1) 2020: 309-338 - [c121]Veronika Kuchta, Amin Sakzad, Ron Steinfeld, Joseph K. Liu:
Efficient Lattice-Based Polynomial Evaluation and Batch ZK Arguments. SAC 2020: 3-33 - [e7]Joseph K. Liu, Hui Cui:
Information Security and Privacy - 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings. Lecture Notes in Computer Science 12248, Springer 2020, ISBN 978-3-030-55303-6 [contents] - [i49]Shangqi Lai, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Ron Steinfeld, Amin Sakzad, Dongxi Liu:
Towards Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes. CoRR abs/2001.01848 (2020) - [i48]Viet Vo, Shangqi Lai, Xingliang Yuan, Shifeng Sun, Surya Nepal, Joseph K. Liu:
Accelerating Forward and Backward Private Searchable Encryption Using Trusted Execution. CoRR abs/2001.03743 (2020) - [i47]Viet Vo, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Surya Nepal, Cong Wang:
ShieldDB: An Encrypted Document Database with Padding Countermeasures. CoRR abs/2003.06103 (2020) - [i46]Shangqi Lai, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Ron Steinfeld, Amin Sakzad, Dongxi Liu:
Towards Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes. IACR Cryptol. ePrint Arch. 2020: 20 (2020) - [i45]Shifeng Sun, Amin Sakzad, Ron Steinfeld, Joseph K. Liu, Dawu Gu:
Public-Key Puncturable Encryption: Modular and Compact Constructions. IACR Cryptol. ePrint Arch. 2020: 126 (2020) - [i44]Joseph K. Liu, Man Ho Au, Tsz Hon Yuen, Cong Zuo, Jiawei Wang, Amin Sakzad, Xiapu Luo, Li Li:
Privacy-Preserving COVID-19 Contact Tracing App: A Zero-Knowledge Proof Approach. IACR Cryptol. ePrint Arch. 2020: 528 (2020) - [i43]Cong Zuo, Shifeng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk, Guiyi Wei:
Forward and Backward Private Dynamic Searchable Symmetric Encryption for Conjunctive Queries. IACR Cryptol. ePrint Arch. 2020: 1357 (2020) - [i42]Shange Fu, Jiangshan Yu, Rafael Dowsley, Joseph K. Liu:
Analysing Mining Machine Shutdown Price. IACR Cryptol. ePrint Arch. 2020: 1574 (2020)
2010 – 2019
- 2019
- [j69]Bin Yu, Joseph K. Liu, Surya Nepal, Jiangshan Yu, Paul Rimba:
Proof-of-QoS: QoS based blockchain consensus protocol. Comput. Secur. 87 (2019) - [j68]Xun Yi, Zahir Tari, Feng Hao, Liqun Chen, Joseph K. Liu, Xuechao Yang, Kwok-Yan Lam, Ibrahim Khalil, Albert Y. Zomaya:
Efficient threshold password-authenticated secret sharing protocols for cloud computing. J. Parallel Distributed Comput. 128: 57-70 (2019) - [j67]Yunling Wang, Jianfeng Wang, Shifeng Sun, Joseph K. Liu, Willy Susilo, Joonsang Baek, Ilsun You, Xiaofeng Chen:
Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption. J. Univers. Comput. Sci. 25(3): 222-244 (2019) - [j66]Xiao Zhang, Shengli Liu, Dawu Gu, Joseph K. Liu:
A generic construction of tightly secure signatures in the multi-user setting. Theor. Comput. Sci. 775: 32-52 (2019) - [c120]Wilson Abel Alberto Torres, Veronika Kuchta, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Jacob Cheng:
Lattice RingCT V2.0 with Multiple Input and Multiple Output Wallets. ACISP 2019: 156-175 - [c119]Shuyang Tang, Sherman S. M. Chow, Zhiqiang Liu, Joseph K. Liu:
Fast-to-Finalize Nakamoto-Like Consensus. ACISP 2019: 271-288 - [c118]Lin Zhong, Huili Wang, Jan Xie, Bo Qin, Joseph K. Liu, Qianhong Wu:
A Flexible Instant Payment System Based on Blockchain. ACISP 2019: 289-306 - [c117]Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu:
Risk of Asynchronous Protocol Update: Attacks to Monero Protocols. ACISP 2019: 307-321 - [c116]Muhammed F. Esgin, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Dongxi Liu:
Short Lattice-Based One-out-of-Many Proofs and Applications to Ring Signatures. ACNS 2019: 67-88 - [c115]Shifeng Sun, Dawu Gu, Man Ho Au, Shuai Han, Yu Yu, Joseph K. Liu:
Strong Leakage and Tamper-Resilient PKE from Refined Hash Proof System. ACNS 2019: 486-506 - [c114]Joseph K. Liu:
A Blockchain-Enabled Society. BSCI 2019: 1 - [c113]Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu, Fengkie Junis, Dony Ariadi Suwarsono:
Designing Smart Contract for Electronic Document Taxation. CANS 2019: 199-213 - [c112]Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu, Limerlina:
Senarai: A Sustainable Public Blockchain-Based Permanent Storage Protocol. CANS 2019: 235-246 - [c111]Shangqi Lai, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Yuhong Liu, Dongxi Liu:
GraphSE²: An Encrypted Graph Database for Privacy-Preserving Social Search. AsiaCCS 2019: 41-54 - [c110]Muhammed F. Esgin, Raymond K. Zhao, Ron Steinfeld, Joseph K. Liu, Dongxi Liu:
MatRiCT: Efficient, Scalable and Post-Quantum Blockchain Confidential Transactions Protocol. CCS 2019: 567-584 - [c109]Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu, Jiangshan Yu:
On The Unforkability of Monero. AsiaCCS 2019: 621-632 - [c108]Xinyu Zhang, Joseph K. Liu, Ron Steinfeld, Veronika Kuchta, Jiangshan Yu:
Revocable and Linkable Ring Signature. Inscrypt 2019: 3-27 - [c107]Jun Zhao, Jiangshan Yu, Joseph K. Liu:
Consolidating Hash Power in Blockchain Shards with a Forest. Inscrypt 2019: 309-322 - [c106]Muhammed F. Esgin, Ron Steinfeld, Joseph K. Liu, Dongxi Liu:
Lattice-Based Zero-Knowledge Proofs: New Techniques for Shorter and Faster Constructions and Applications. CRYPTO (1) 2019: 115-146 - [c105]Maxime Buser, Joseph K. Liu, Ron Steinfeld, Amin Sakzad, Shifeng Sun:
DGM: A Dynamic and Revocable Group Merkle Signature. ESORICS (1) 2019: 194-214 - [c104]Cong Zuo, Shifeng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk:
Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy. ESORICS (2) 2019: 283-303 - [c103]Shabnam Kasra Kermanshahi, Joseph K. Liu, Ron Steinfeld, Surya Nepal:
Generic Multi-keyword Ranked Search on Encrypted Cloud Data. ESORICS (2) 2019: 322-343 - [p1]Joseph K. Liu:
Ring Signature. Advances in Cyber Security 2019: 93-114 - [e6]Joseph K. Liu, Xinyi Huang:
Network and System Security - 13th International Conference, NSS 2019, Sapporo, Japan, December 15-18, 2019, Proceedings. Lecture Notes in Computer Science 11928, Springer 2019, ISBN 978-3-030-36937-8 [contents] - [i41]Shangqi Lai, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Yuhong Liu, Dongxi Liu:
GraphSE2: An Encrypted Graph Database for Privacy-Preserving Social Search. CoRR abs/1905.04501 (2019) - [i40]Cong Zuo, Shifeng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk:
Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward/Backward Privacy. CoRR abs/1905.08561 (2019) - [i39]Hanqing Liu, Na Ruan, Joseph K. Liu:
Catfish Effect Between Internal and External Attackers: Being Semi-honest is Helpful. CoRR abs/1907.03720 (2019) - [i38]Purathani Praitheeshan, Lei Pan, Jiangshan Yu, Joseph K. Liu, Robin Doss:
Security Analysis Methods on Ethereum Smart Contract Vulnerabilities: A Survey. CoRR abs/1908.08605 (2019) - [i37]Shangqi Lai, Xingliang Yuan, Amin Sakzad, Mahsa Salehi, Joseph K. Liu, Dongxi Liu:
Enabling Efficient Privacy-Assured Outlier Detection over Encrypted Incremental Datasets. CoRR abs/1911.05927 (2019) - [i36]Muhammed F. Esgin, Ron Steinfeld, Joseph K. Liu, Dongxi Liu:
Lattice-based Zero-Knowledge Proofs: New Techniques for Shorter and Faster Constructions and Applications. IACR Cryptol. ePrint Arch. 2019: 445 (2019) - [i35]Tsz Hon Yuen, Shifeng Sun, Joseph K. Liu, Man Ho Au, Muhammed F. Esgin, Qingzhao Zhang, Dawu Gu:
RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security. IACR Cryptol. ePrint Arch. 2019: 508 (2019) - [i34]Wilson Abel Alberto Torres, Veronika Kuchta, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Jacob Cheng:
Lattice RingCT v2.0 with Multiple Input and Output Wallets. IACR Cryptol. ePrint Arch. 2019: 569 (2019) - [i33]Runchao Han, Zhimei Sui, Jiangshan Yu, Joseph K. Liu, Shiping Chen:
Sucker punch makes you richer: Rethinking Proof-of-Work security model. IACR Cryptol. ePrint Arch. 2019: 752 (2019) - [i32]Cong Zuo, Shifeng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk:
Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy. IACR Cryptol. ePrint Arch. 2019: 1055 (2019) - [i31]Cong Zuo, Shifeng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk, Lei Xu:
Forward and Backward Private DSSE for Range Queries. IACR Cryptol. ePrint Arch. 2019: 1240 (2019) - [i30]Muhammed F. Esgin, Raymond K. Zhao, Ron Steinfeld, Joseph K. Liu, Dongxi Liu:
MatRiCT: Efficient, Scalable and Post-Quantum Blockchain Confidential Transactions Protocol. IACR Cryptol. ePrint Arch. 2019: 1287 (2019) - 2018
- [j65]Bin Yu, Jarod Wright, Surya Nepal, Liming Zhu, Joseph K. Liu, Rajiv Ranjan:
IoTChain: Establishing Trust in the Internet of Things Ecosystem Using Blockchain. IEEE Cloud Comput. 5(4): 12-23 (2018) - [j64]Peng Zhang, Joseph K. Liu, F. Richard Yu, Mehdi Sookhak, Man Ho Au, Xiapu Luo:
A Survey on Access Control in Fog Computing. IEEE Commun. Mag. 56(2): 144-149 (2018) - [j63]Ziyuan Hu, Shengli Liu, Kefei Chen, Joseph K. Liu:
Revocable Identity-Based Encryption and Server-Aided Revocable IBE from the Computational Diffie-Hellman Assumption. Cryptogr. 2(4): 33 (2018) - [j62]Peng Zhang, Zehong Chen, Joseph K. Liu, Kaitai Liang, Hongwei Liu:
An efficient access control scheme with outsourcing capability and attribute update for fog computing. Future Gener. Comput. Syst. 78: 753-762 (2018) - [j61]Man Ho Au, Kaitai Liang, Joseph K. Liu, Rongxing Lu, Jianting Ning:
Privacy-preserving personal data operation on mobile cloud - Chances and challenges over advanced persistent threat. Future Gener. Comput. Syst. 79: 337-349 (2018) - [j60]Zehong Chen, Fangguo Zhang, Peng Zhang, Joseph K. Liu, Jiwu Huang, Hanbang Zhao, Jian Shen:
Verifiable keyword search for secure big data-based mobile healthcare networks with fine-grained authorization control. Future Gener. Comput. Syst. 87: 712-724 (2018) - [j59]Yang Li, Xiaoling Tao, Wei Wu, Joseph K. Liu:
GO-CP-ABE: group-oriented ciphertext-policy attribute-based encryption. Int. J. Embed. Syst. 10(1): 62-70 (2018) - [j58]Huige Wang, Kefei Chen, Joseph K. Liu, Ziyuan Hu, Yu Long:
Access control encryption with efficient verifiable sanitized decryption. Inf. Sci. 465: 72-85 (2018) - [j57]Jinguang Han, Ye Yang, Joseph K. Liu, Jiguo Li, Kaitai Liang, Jian Shen:
Expressive attribute-based keyword search with constant-size ciphertext. Soft Comput. 22(15): 5163-5177 (2018) - [j56]Cong Zuo, Jun Shao, Joseph K. Liu, Guiyi Wei, Yun Ling:
Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage. IEEE Trans. Inf. Forensics Secur. 13(1): 186-196 (2018) - [j55]Hui Cui, Robert H. Deng, Joseph K. Liu, Xun Yi, Yingjiu Li:
Server-Aided Attribute-Based Signature With Revocation for Resource-Constrained Industrial-Internet-of-Things Devices. IEEE Trans. Ind. Informatics 14(8): 3724-3732 (2018) - [j54]Ding Wang, Jian Shen, Joseph K. Liu, Kim-Kwang Raymond Choo:
Rethinking Authentication on Smart Mobile Devices. Wirel. Commun. Mob. Comput. 2018: 7079037:1-7079037:4 (2018) - [c102]Ziyuan Hu, Shengli Liu, Kefei Chen, Joseph K. Liu:
Revocable Identity-Based Encryption from the Computational Diffie-Hellman Problem. ACISP 2018: 265-283 - [c101]Wilson Abel Alberto Torres, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Veronika Kuchta, Nandita Bhattacharjee, Man Ho Au, Jacob Cheng:
Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT v1.0). ACISP 2018: 558-576 - [c100]Joseph K. Liu, Tsz Hon Yuen, Peng Zhang, Kaitai Liang:
Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List. ACNS 2018: 516-534 - [c99]Shangqi Lai, Sikhar Patranabis, Amin Sakzad, Joseph K. Liu, Debdeep Mukhopadhyay, Ron Steinfeld, Shifeng Sun, Dongxi Liu, Cong Zuo:
Result Pattern Hiding Searchable Encryption for Conjunctive Queries. CCS 2018: 745-762 - [c98]Shifeng Sun, Xingliang Yuan, Joseph K. Liu, Ron Steinfeld, Amin Sakzad, Viet Vo, Surya Nepal:
Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption. CCS 2018: 763-780 - [c97]Runchao Han, Jiangshan Yu, Joseph K. Liu, Peng Zhang:
Evaluating CryptoNote-Style Blockchains. Inscrypt 2018: 29-48 - [c96]Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu, Tsz Hon Yuen:
Anonymity Reduction Attacks to Monero. Inscrypt 2018: 86-100 - [c95]Zhimei Sui, Shangqi Lai, Cong Zuo, Xingliang Yuan, Joseph K. Liu, Haifeng Qian:
An Encrypted Database with Enforced Access Control and Blockchain Validation. Inscrypt 2018: 260-273 - [c94]Randolph Loh, Cong Zuo, Joseph K. Liu, Shifeng Sun:
A Multi-client DSSE Scheme Supporting Range Queries. Inscrypt 2018: 289-307 - [c93]Mark Huasong Meng, Guangdong Bai, Joseph K. Liu, Xiapu Luo, Yu Wang:
Analyzing Use of High Privileges on Android: An Empirical Case Study of Screenshot and Screen Recording Applications. Inscrypt 2018: 349-369 - [c92]Jianfeng Wang, Xiaofeng Chen, Shifeng Sun, Joseph K. Liu, Man Ho Au, Zhi-Hui Zhan:
Towards Efficient Verifiable Conjunctive Keyword Search for Large Encrypted Database. ESORICS (2) 2018: 83-100 - [c91]Cong Zuo, Shifeng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk:
Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) Security. ESORICS (2) 2018: 228-246 - [c90]Siyi Lv, Yanyu Huang, Bo Li, Yu Wei, Zheli Liu, Joseph K. Liu, Dong Hoon Lee:
Forward Secure Searchable Encryption Using Key-Based Blocks Chain Technique. ICA3PP (4) 2018: 85-97 - [c89]Hao Ren, Peng Zhang, Qingchun Shentu, Joseph K. Liu, Tsz Hon Yuen:
Compact Ring Signature in the Standard Model for Blockchain. ISPEC 2018: 50-65 - [c88]Huige Wang, Kefei Chen, Joseph K. Liu, Ziyuan Hu:
Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits. ISPEC 2018: 119-140 - [c87]Bin Yu, Joseph K. Liu, Amin Sakzad, Surya Nepal, Ron Steinfeld, Paul Rimba, Man Ho Au:
Platform-Independent Secure Blockchain-Based Voting System. ISC 2018: 369-386 - [c86]Peter Ince, Joseph K. Liu, Peng Zhang:
Adding Confidential Transactions to Cryptocurrency IOTA with Bulletproofs. NSS 2018: 32-45 - [c85]Weizhi Meng, Jianfeng Wang, Xianmin Wang, Joseph K. Liu, Zuoxia Yu, Jin Li, Yongjun Zhao, Sherman S. M. Chow:
Position Paper on Blockchain Technology: Smart Contract and Applications. NSS 2018: 474-483 - [c84]Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu:
Monero Ring Attack: Recreating Zero Mixin Transaction Effect. TrustCom/BigDataSE 2018: 1196-1201 - [c83]Xiaoning Liu, Xingliang Yuan, Joseph K. Liu:
Towards Privacy-Preserving Forensic Analysis for Time-Series Medical Data. TrustCom/BigDataSE 2018: 1664-1668 - [i29]Joseph K. Liu, Tsz Hon Yuen, Peng Zhang, Kaitai Liang:
Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List. IACR Cryptol. ePrint Arch. 2018: 330 (2018) - [i28]Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu:
Monero Ring Attack: Recreating Zero Mixin Transaction Effect. IACR Cryptol. ePrint Arch. 2018: 348 (2018) - [i27]Wilson Abel Alberto Torres, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Veronika Kuchta, Nandita Bhattacharjee, Man Ho Au, Jacob Cheng:
Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT v1.0). IACR Cryptol. ePrint Arch. 2018: 379 (2018) - [i26]Bin Yu, Joseph K. Liu, Amin Sakzad, Surya Nepal, Paul Rimba, Ron Steinfeld, Man Ho Au:
Platform-independent Secure Blockchain-Based Voting System. IACR Cryptol. ePrint Arch. 2018: 657 (2018) - [i25]Muhammed F. Esgin, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Dongxi Liu:
Short Lattice-based One-out-of-Many Proofs and Applications to Ring Signatures. IACR Cryptol. ePrint Arch. 2018: 773 (2018) - [i24]Shangqi Lai, Sikhar Patranabis, Amin Sakzad, Joseph K. Liu, Debdeep Mukhopadhyay, Ron Steinfeld, Shifeng Sun, Dongxi Liu, Cong Zuo:
Result Pattern Hiding Searchable Encryption for Conjunctive Queries. IACR Cryptol. ePrint Arch. 2018: 1168 (2018) - 2017
- [j53]Man Ho Au, Joseph K. Liu, Zhenfei Zhang, Willy Susilo, Jin Li:
Anonymous Announcement System (AAS) for Electric Vehicle in VANETs. Comput. J. 60(4): 588-599 (2017) - [j52]Xinyi Huang, Joseph K. Liu, Javier López:
Editorial: Special issue on security data science and cyber threat management. Comput. Secur. 69: 1-2 (2017) - [j51]Yiteng Feng, Guomin Yang, Joseph K. Liu:
A new public remote integrity checking scheme with user and data privacy. Int. J. Appl. Cryptogr. 3(3): 196-209 (2017) - [j50]Man Ho Au, Tsz Hon Yuen, Joseph K. Liu, Willy Susilo, Xinyi Huang, Yang Xiang, Zoe Lin Jiang:
A general framework for secure sharing of personal health records in cloud system. J. Comput. Syst. Sci. 90: 46-62 (2017) - [j49]Joseph K. Liu, Kim-Kwang Raymond Choo, Xinyi Huang, Man Ho Au:
Special issue on security and privacy for smart cities. Pers. Ubiquitous Comput. 21(5): 775 (2017) - [j48]Joseph K. Liu, Kim-Kwang Raymond Choo, Xinyi Huang, Man Ho Au:
Erratum to: Special issue on security and privacy for smart cities. Pers. Ubiquitous Comput. 21(5): 777 (2017) - [j47]Wei Wu, Shun Hu, Xu Yang, Joseph K. Liu, Man Ho Au:
Towards secure and cost-effective fuzzy access control in mobile cloud computing. Soft Comput. 21(10): 2643-2649 (2017) - [c82]Xiaoyang Wu, Ron Steinfeld, Joseph K. Liu, Carsten Rudolph:
An implementation of access-control protocol for IoT home scenario. ICIS 2017: 31-37 - [c81]Hui Cui, Robert H. Deng, Joseph K. Liu, Yingjiu Li:
Attribute-Based Encryption with Expressive and Authorized Keyword Search. ACISP (1) 2017: 106-126 - [c80]Yanjiang Yang, Joseph K. Liu, Zhuo Wei, Xinyi Huang:
Towards Revocable Fine-Grained Encryption of Cloud Data: Reducing Trust upon Cloud. ACISP (1) 2017: 127-144 - [c79]Shabnam Kasra Kermanshahi, Joseph K. Liu, Ron Steinfeld:
Multi-user Cloud-Based Secure Keyword Search. ACISP (1) 2017: 227-247 - [c78]Shifeng Sun, Man Ho Au, Joseph K. Liu, Tsz Hon Yuen:
RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero. ESORICS (2) 2017: 456-474 - [c77]Lei Xu, Chungen Xu, Joseph K. Liu, Cong Zuo, Peng Zhang:
A Multi-client Dynamic Searchable Symmetric Encryption System with Physical Deletion. ICICS 2017: 516-528 - [c76]Yunling Wang, Jianfeng Wang, Shifeng Sun, Joseph K. Liu, Willy Susilo, Xiaofeng Chen:
Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption. ProvSec 2017: 24-38 - [c75]Dimaz Ankaa Wijaya, Joseph K. Liu, Dony Ariadi Suwarsono, Peng Zhang:
A New Blockchain-Based Value-Added Tax System. ProvSec 2017: 471-486 - [c74]Peng Zhang, Xiafei Zhang, Xiaoqiang Sun, Joseph K. Liu, Jianping Yu, Zoe Lin Jiang:
Anonymous Anti-Sybil Attack Protocol for Mobile Healthcare Networks Analytics. TrustCom/BigDataSE/ICESS 2017: 668-674 - [e5]Joseph K. Liu, Pierangela Samarati:
Information Security Practice and Experience - 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings. Lecture Notes in Computer Science 10701, Springer 2017, ISBN 978-3-319-72358-7 [contents] - [i23]Shifeng Sun, Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Dawu Gu:
RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero. IACR Cryptol. ePrint Arch. 2017: 921 (2017) - [i22]Zheli Liu, Siyi Lv, Yu Wei, Jin Li, Joseph K. Liu, Yang Xiang:
FFSSE: Flexible Forward Secure Searchable Encryption with Efficient Performance. IACR Cryptol. ePrint Arch. 2017: 1105 (2017) - 2016
- [j46]Joseph K. Liu, Sze Ling Yeo, Wun-She Yap, Sherman S. M. Chow, Duncan S. Wong, Willy Susilo:
Faulty Instantiations of Threshold Ring Signature from Threshold Proof-of-Knowledge Protocol. Comput. J. 59(7): 945-954 (2016) - [j45]Joseph K. Liu, Willy Susilo, Tsz Hon Yuen, Man Ho Au, Jun-bin Fang, Zoe Lin Jiang, Jianying Zhou:
Efficient Privacy-Preserving Charging Station Reservation System for Electric Vehicles. Comput. J. 59(7): 1040-1053 (2016) - [j44]Shifeng Sun, Joseph K. Liu, Yu Yu, Baodong Qin, Dawu Gu:
RKA-Secure Public Key Encryptions Against Efficiently Invertible Functions. Comput. J. 59(11): 1637-1658 (2016) - [j43]Xu Yang, Xinyi Huang, Joseph K. Liu:
Efficient handover authentication with user anonymity and untraceability for Mobile Cloud Computing. Future Gener. Comput. Syst. 62: 190-195 (2016) - [j42]Sherman S. M. Chow, Urs Hengartner, Joseph K. Liu, Kui Ren:
Special Issue on Security and Privacy in Mobile Clouds. Pervasive Mob. Comput. 28: 100-101 (2016) - [j41]Joseph K. Liu, Kaitai Liang, Willy Susilo, Jianghua Liu, Yang Xiang:
Two-Factor Data Security Protection Mechanism for Cloud Storage System. IEEE Trans. Computers 65(6): 1992-2004 (2016) - [j40]Kai He, Jian Weng, Robert H. Deng, Joseph K. Liu:
On the security of two identity-based conditional proxy re-encryption schemes. Theor. Comput. Sci. 652: 18-27 (2016) - [j39]Joseph K. Liu, Man Ho Au, Xinyi Huang, Rongxing Lu, Jin Li:
Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services. IEEE Trans. Inf. Forensics Secur. 11(3): 484-497 (2016) - [j38]Shulan Wang, Junwei Zhou, Joseph K. Liu, Jianping Yu, Jianyong Chen, Weixin Xie:
An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing. IEEE Trans. Inf. Forensics Secur. 11(6): 1265-1277 (2016) - [j37]Shulan Wang, Kaitai Liang, Joseph K. Liu, Jianyong Chen, Jianping Yu, Weixin Xie:
Attribute-Based Data Sharing Scheme Revisited in Cloud Computing. IEEE Trans. Inf. Forensics Secur. 11(8): 1661-1673 (2016) - [j36]Kaitai Liang, Xinyi Huang, Fuchun Guo, Joseph K. Liu:
Privacy-Preserving and Regular Language Search Over Encrypted Cloud Data. IEEE Trans. Inf. Forensics Secur. 11(10): 2365-2376 (2016) - [j35]Jiangtao Li, Lei Zhang, Joseph K. Liu, Haifeng Qian, Zheming Dong:
Privacy-Preserving Public Auditing Protocol for Low-Performance End Devices in Cloud. IEEE Trans. Inf. Forensics Secur. 11(11): 2572-2583 (2016) - [c73]Kaitai Liang, Chunhua Su, Jiageng Chen, Joseph K. Liu:
Efficient Multi-Function Data Sharing and Searching Mechanism for Cloud-Based Encrypted Data. AsiaCCS 2016: 83-94 - [c72]Yanjiang Yang, Haibing Lu, Joseph K. Liu, Jian Weng, Youcheng Zhang, Jianying Zhou:
Credential Wrapping: From Anonymous Password Authentication to Anonymous Biometric Authentication. AsiaCCS 2016: 141-151 - [c71]Kai He, Jian Weng, Jia-Nan Liu, Joseph K. Liu, Wei Liu, Robert H. Deng:
Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security. AsiaCCS 2016: 247-255 - [c70]Shifeng Sun, Dawu Gu, Joseph K. Liu, Udaya Parampalli, Tsz Hon Yuen:
Efficient Construction of Completely Non-Malleable CCA Secure Public Key Encryption. AsiaCCS 2016: 901-906 - [c69]Shifeng Sun, Joseph K. Liu, Amin Sakzad, Ron Steinfeld, Tsz Hon Yuen:
An Efficient Non-interactive Multi-client Searchable Encryption with Support for Boolean Queries. ESORICS (1) 2016: 154-172 - [c68]Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Shifeng Sun, Xinyi Huang:
Anonymizing Bitcoin Transaction. ISPEC 2016: 271-283 - [c67]Man Ho Au, Kaitai Liang, Joseph K. Liu, Rongxing Lu:
While Mobile Encounters with Clouds. NSS 2016: 3-18 - [c66]Kai He, Jian Weng, Joseph K. Liu, Wanlei Zhou, Jia-Nan Liu:
Efficient Fine-Grained Access Control for Secure Personal Health Records in Cloud Computing. NSS 2016: 65-79 - [c65]Yili Ren, Xiling Luo, Qianhong Wu, Joseph K. Liu, Peng Zhang:
Towards Certificate-Based Group Encryption. ProvSec 2016: 296-305 - [c64]Xu Yang, Ting-Ting Lee, Joseph K. Liu, Xinyi Huang:
Trust Enhancement over Range Search for Encrypted Data. Trustcom/BigDataSE/ISPA 2016: 66-73 - [c63]Cong Zuo, James Macindoe, Siyin Yang, Ron Steinfeld, Joseph K. Liu:
Trusted Boolean Search on Cloud Using Searchable Symmetric Encryption. Trustcom/BigDataSE/ISPA 2016: 113-120 - [c62]Xu Yang, Yuexin Zhang, Joseph K. Liu, YaLi Zeng:
A Trust and Privacy Preserving Handover Authentication Protocol for Wireless Networks. Trustcom/BigDataSE/ISPA 2016: 138-143 - [e4]Joseph K. Liu, Ron Steinfeld:
Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I. Lecture Notes in Computer Science 9722, Springer 2016, ISBN 978-3-319-40252-9 [contents] - [e3]Joseph K. Liu, Ron Steinfeld:
Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part II. Lecture Notes in Computer Science 9723, Springer 2016, ISBN 978-3-319-40366-3 [contents] - [i21]Shifeng Sun, Joseph K. Liu, Amin Sakzad, Ron Steinfeld, Tsz Hon Yuen:
An Efficient Non-Interactive Multi-client Searchable Encryption with Support for Boolean Queries. IACR Cryptol. ePrint Arch. 2016: 1038 (2016) - 2015
- [j34]Ying-Kai Tang, Sherman S. M. Chow, Joseph K. Liu:
Comments on 'Efficient Revocable Certificateless Encryption Secure in the Standard Model'. Comput. J. 58(4): 779-781 (2015) - [j33]Kaitai Liang, Willy Susilo, Joseph K. Liu, Duncan S. Wong:
Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption. Comput. J. 58(10): 2778-2792 (2015) - [j32]Jianghua Liu, Xinyi Huang, Joseph K. Liu:
Secure sharing of Personal Health Records in cloud computing: Ciphertext-Policy Attribute-Based Signcryption. Future Gener. Comput. Syst. 52: 67-76 (2015) - [j31]Tao Jiang, Xiaofeng Chen, Jin Li, Duncan S. Wong, Jianfeng Ma, Joseph K. Liu:
Towards secure and reliable cloud storage against data re-outsourcing. Future Gener. Comput. Syst. 52: 86-94 (2015) - [j30]Kaitai Liang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang, Yong Yu, Anjia Yang:
A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing. Future Gener. Comput. Syst. 52: 95-108 (2015) - [j29]Mengting Li, Xinyi Huang, Joseph K. Liu, Li Xu, Wei Wu:
Cooperative attribute-based access control for enterprise computing system. Int. J. Embed. Syst. 7(3/4): 191-202 (2015) - [j28]Kaitai Liang, Joseph K. Liu, Rongxing Lu, Duncan S. Wong:
Privacy Concerns for Photo Sharing in Online Social Networks. IEEE Internet Comput. 19(2): 58-63 (2015) - [j27]Shuquan Hou, Xinyi Huang, Joseph K. Liu, Jin Li, Li Xu:
Universal designated verifier transitive signatures for graph-based big data. Inf. Sci. 318: 144-156 (2015) - [j26]Xiaoding Wang, Li Xu, Shuming Zhou, Joseph K. Liu:
A Resolving Set based Algorithm for Fault Identification in Wireless Mesh Networks. J. Univers. Comput. Sci. 21(3): 384-405 (2015) - [j25]Joseph K. Liu, Man Ho Au, Willy Susilo, Kaitai Liang, Rongxing Lu, Bala Srinivasan:
Secure sharing and searching for real-time video data in mobile cloud. IEEE Netw. 29(2): 46-50 (2015) - [j24]Wun-She Yap, Joseph K. Liu, Syh-Yuan Tan, Bok-Min Goi:
On the security of a lightweight authentication and encryption scheme for mobile ad hoc network. Secur. Commun. Networks 8(17): 3094-3098 (2015) - [j23]Xinyi Huang, Joseph K. Liu, Shaohua Tang, Yang Xiang, Kaitai Liang, Li Xu, Jianying Zhou:
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security. IEEE Trans. Computers 64(4): 971-983 (2015) - [j22]Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Xinyi Huang, Willy Susilo, Jianying Zhou:
k-Times Attribute-Based Anonymous Access Control for Cloud Computing. IEEE Trans. Computers 64(9): 2595-2608 (2015) - [j21]Joonsang Baek, Quang Hieu Vu, Joseph K. Liu, Xinyi Huang, Yang Xiang:
A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid. IEEE Trans. Cloud Comput. 3(2): 233-244 (2015) - [j20]Joseph K. Liu, Cheng-Kang Chu, Sherman S. M. Chow, Xinyi Huang, Man Ho Au, Jianying Zhou:
Time-Bound Anonymous Authentication for Roaming Networks. IEEE Trans. Inf. Forensics Secur. 10(1): 178-189 (2015) - [j19]Kaitai Liang, Willy Susilo, Joseph K. Liu:
Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage. IEEE Trans. Inf. Forensics Secur. 10(8): 1578-1589 (2015) - [c61]Yiteng Feng, Yi Mu, Guomin Yang, Joseph K. Liu:
A New Public Remote Integrity Checking Scheme with User Privacy. ACISP 2015: 377-394 - [c60]Hua Deng, Qianhong Wu, Bo Qin, Willy Susilo, Joseph K. Liu, Wenchang Shi:
Asymmetric Cross-cryptosystem Re-encryption Applicable to Efficient and Secure Mobile Access to Outsourced Data. AsiaCCS 2015: 393-404 - [c59]Yanjiang Yang, Joseph K. Liu, Kaitai Liang, Kim-Kwang Raymond Choo, Jianying Zhou:
Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data. ESORICS (2) 2015: 146-166 - [c58]Xun Yi, Feng Hao, Liqun Chen, Joseph K. Liu:
Practical Threshold Password-Authenticated Secret Sharing Protocol. ESORICS (1) 2015: 347-365 - [c57]Shangqi Lai, Joseph K. Liu, Kim-Kwang Raymond Choo, Kaitai Liang:
Secret Picture: An Efficient Tool for Mitigating Deletion Delay on OSN. ICICS 2015: 467-477 - [c56]Xu Yang, Joseph K. Liu, Wei Wu, Man Ho Au, Willy Susilo:
PEVTS: Privacy-Preserving Electric Vehicles Test-Bedding Scheme. ICPADS 2015: 282-289 - [c55]Yanjiang Yang, Jiqiang Lu, Kim-Kwang Raymond Choo, Joseph K. Liu:
On Lightweight Security Enforcement in Cyber-Physical Systems. LightSec 2015: 97-112 - [c54]Xu Yang, Wei Wu, Joseph K. Liu, Xiaofeng Chen:
Lightweight Anonymous Authentication for Ad Hoc Group: A Ring Signature Approach. ProvSec 2015: 215-226 - 2014
- [j18]Joseph K. Liu, Tsz Hon Yuen, Man Ho Au, Willy Susilo:
Improvements on an authentication scheme for vehicular sensor networks. Expert Syst. Appl. 41(5): 2559-2564 (2014) - [j17]Chuan Yao, Li Xu, Xinyi Huang, Joseph K. Liu:
A secure remote data integrity checking cloud storage system from threshold encryption. J. Ambient Intell. Humaniz. Comput. 5(6): 857-865 (2014) - [j16]Rongxing Lu, Hui Zhu, Ximeng Liu, Joseph K. Liu, Jun Shao:
Toward efficient and privacy-preserving computing in big data era. IEEE Netw. 28(4): 46-50 (2014) - [j15]Fatos Xhafa, Jianfeng Wang, Xiaofeng Chen, Joseph K. Liu, Jin Li, Paul Krause:
An efficient PHR service system supporting fuzzy keyword search and fine-grained access control. Soft Comput. 18(9): 1795-1802 (2014) - [j14]Kaitai Liang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang, Tran Viet Xuan Phuong, Qi Xie:
A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing. IEEE Trans. Inf. Forensics Secur. 9(10): 1667-1680 (2014) - [j13]Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou:
Linkable Ring Signature with Unconditional Anonymity. IEEE Trans. Knowl. Data Eng. 26(1): 157-165 (2014) - [j12]Man Ho Au, Joseph K. Liu, Jun-bin Fang, Zoe Lin Jiang, Willy Susilo, Jianying Zhou:
A New Payment System for Enhancing Location Privacy of Electric Vehicles. IEEE Trans. Veh. Technol. 63(1): 3-18 (2014) - [c53]Tsz Hon Yuen, Ye Zhang, Siu-Ming Yiu, Joseph K. Liu:
Identity-Based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks. ESORICS (1) 2014: 130-147 - [c52]Joseph K. Liu, Man Ho Au, Xinyi Huang, Willy Susilo, Jianying Zhou, Yong Yu:
New Insight to Preserve Online Survey Accuracy and Privacy in Big Data Era. ESORICS (2) 2014: 182-199 - [c51]Kaitai Liang, Joseph K. Liu, Duncan S. Wong, Willy Susilo:
An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing. ESORICS (1) 2014: 257-272 - [c50]Yuechen Chen, Zoe Lin Jiang, Siu-Ming Yiu, Joseph K. Liu, Man Ho Au, Xuan Wang:
Fully Secure Ciphertext-Policy Attribute Based Encryption with Security Mediator. ICICS 2014: 274-289 - [c49]Tao Jiang, Xiaofeng Chen, Jin Li, Duncan S. Wong, Jianfeng Ma, Joseph K. Liu:
TIMER: Secure and Reliable Cloud Storage against Data Re-outsourcing. ISPEC 2014: 346-358 - [c48]Mengting Li, Xinyi Huang, Joseph K. Liu, Li Xu:
GO-ABE: Group-Oriented Attribute-Based Encryption. NSS 2014: 260-270 - [e2]Sherman S. M. Chow, Joseph K. Liu, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings. Lecture Notes in Computer Science 8782, Springer 2014, ISBN 978-3-319-12474-2 [contents] - 2013
- [j11]Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou:
Efficient Linkable and/or Threshold Ring Signature Without Random Oracles. Comput. J. 56(4): 407-421 (2013) - [j10]Sze Ling Yeo, Wun-She Yap, Joseph K. Liu, Matt Henricksen:
Comments on "Analysis and Improvement of a Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions". IEEE Commun. Lett. 17(8): 1521-1523 (2013) - [j9]Cheng-Kang Chu, Wen Tao Zhu, Jin Han, Joseph K. Liu, Jia Xu, Jianying Zhou:
Security Concerns in Popular Cloud Storage Services. IEEE Pervasive Comput. 12(4): 50-57 (2013) - [j8]Man Ho Au, Joseph K. Liu, Willy Susilo, Tsz Hon Yuen:
Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction. Theor. Comput. Sci. 469: 1-14 (2013) - [j7]Man Ho Au, Joseph K. Liu, Willy Susilo, Jianying Zhou:
Realizing Fully Secure Unrestricted ID-Based Ring Signature in the Standard Model Based on HIBE. IEEE Trans. Inf. Forensics Secur. 8(12): 1909-1922 (2013) - [c47]Cheng-Kang Chu, Joseph K. Liu, Jun Wen Wong, Yunlei Zhao, Jianying Zhou:
Privacy-preserving smart metering with regional statistics and personal enquiry services. AsiaCCS 2013: 369-380 - [c46]Yang Wang, Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Willy Susilo:
Threshold-Oriented Optimistic Fair Exchange. NSS 2013: 424-438 - [c45]Tsz Hon Yuen, Cong Zhang, Sherman S. M. Chow, Joseph K. Liu:
Towards Anonymous Ciphertext Indistinguishability with Identity Leakage. ProvSec 2013: 139-153 - 2012
- [c44]Cheng-Kang Chu, Joseph K. Liu, Xinyi Huang, Jianying Zhou:
Verifier-local revocation group signatures with time-bound keys. AsiaCCS 2012: 26-27 - [c43]Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou:
Enhancing Location Privacy for Electric Vehicles (at the Right time). ESORICS 2012: 397-414 - [c42]Tsz Hon Yuen, Joseph K. Liu, Xinyi Huang, Man Ho Au, Willy Susilo, Jianying Zhou:
Forward Secure Attribute-Based Signatures. ICICS 2012: 167-177 - [c41]Yunmei Zhang, Joseph K. Liu, Xinyi Huang, Man Ho Au, Willy Susilo:
Efficient Escrow-Free Identity-Based Signature. ProvSec 2012: 161-174 - [i20]Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou:
Enhancing Location Privacy for Electric Vehicles (at the right time). IACR Cryptol. ePrint Arch. 2012: 342 (2012) - 2011
- [c40]Joseph K. Liu, Cheng-Kang Chu, Jianying Zhou:
Identity-Based Server-Aided Decryption. ACISP 2011: 337-352 - [c39]Sherman S. M. Chow, Joseph K. Liu, Jianying Zhou:
Identity-based online/offline key encapsulation and encryption. AsiaCCS 2011: 52-60 - [c38]Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou:
Threshold ring signature without random oracles. AsiaCCS 2011: 261-267 - [c37]Joseph K. Liu, Tsz Hon Yuen, Jianying Zhou:
Forward Secure Ring Signature without Random Oracles. ICICS 2011: 1-14 - [c36]Joseph K. Liu, Feng Bao, Jianying Zhou:
Short and Efficient Certificate-Based Signature. Networking Workshops 2011: 167-178 - [i19]Joseph K. Liu, Feng Bao, Jianying Zhou:
Short and Efficient Certificate-Based Signature. IACR Cryptol. ePrint Arch. 2011: 192 (2011) - [i18]Joseph K. Liu, Tsz Hon Yuen, Jianying Zhou:
Forward Secure Ring Signature without Random Oracles. IACR Cryptol. ePrint Arch. 2011: 472 (2011) - 2010
- [j6]Joseph K. Liu, Joonsang Baek, Jianying Zhou, Yanjiang Yang, Jun Wen Wong:
Efficient online/offline identity-based signature for wireless sensor network. Int. J. Inf. Sec. 9(4): 287-296 (2010) - [c35]Cheng-Kang Chu, Joseph K. Liu, Jianying Zhou, Feng Bao, Robert H. Deng:
Practical ID-based encryption for wireless sensor network. AsiaCCS 2010: 337-340 - [c34]Joseph K. Liu, Joonsang Baek, Jianying Zhou:
Online/Offline Identity-Based Signcryption Revisited. Inscrypt 2010: 36-51 - [c33]Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou:
Short Generic Transformation to Strongly Unforgeable Signature in the Standard Model. ESORICS 2010: 168-181 - [c32]Patrick P. Tsang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong:
A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract). ProvSec 2010: 166-183 - [i17]Cheng-Kang Chu, Joseph K. Liu, Jianying Zhou, Feng Bao, Robert H. Deng:
Practical ID-based Encryption for Wireless Sensor Network. IACR Cryptol. ePrint Arch. 2010: 2 (2010) - [i16]Joseph K. Liu, Joonsang Baek, Jianying Zhou, Yanjiang Yang, Jun Wen Wong:
Efficient Online/Offline Identity-Based Signature for Wireless Sensor Network. IACR Cryptol. ePrint Arch. 2010: 3 (2010) - [i15]Sherman S. M. Chow, Joseph K. Liu, Jianying Zhou:
Identity-Based Online/Offline Key Encapsulation and Encryption. IACR Cryptol. ePrint Arch. 2010: 194 (2010) - [i14]Joseph K. Liu, Joonsang Baek, Jianying Zhou:
Online/Offline Identity-Based Signcryption Revisited. IACR Cryptol. ePrint Arch. 2010: 274 (2010)
2000 – 2009
- 2009
- [c31]Joonsang Baek, Willy Susilo, Joseph K. Liu, Jianying Zhou:
A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack. ACNS 2009: 143-155 - [c30]Joseph K. Liu, Jianying Zhou:
An Efficient Identity-Based Online/Offline Encryption Scheme. ACNS 2009: 156-167 - [c29]Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou:
Online/Offline Ring Signature Scheme. ICICS 2009: 80-90 - [c28]Joseph K. Liu, Joonsang Baek, Jianying Zhou:
Certificate-based sequential aggregate signature. WISEC 2009: 21-28 - 2008
- [j5]Joseph K. Liu, Duncan S. Wong:
Solutions to Key Exposure Problem in Ring Signature. Int. J. Netw. Secur. 6(2): 170-180 (2008) - [j4]Yong Ho Hwang, Joseph K. Liu, Sherman S. M. Chow:
Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model. J. Univers. Comput. Sci. 14(3): 463-480 (2008) - [c27]Man Ho Au, Qiong Huang, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang:
Traceable and Retrievable Identity-Based Encryption. ACNS 2008: 94-110 - [c26]Tsz Hon Yuen, Willy Susilo, Joseph K. Liu, Yi Mu:
Sanitizable Signatures Revisited. CANS 2008: 80-97 - [c25]Joseph K. Liu, Joonsang Baek, Willy Susilo, Jianying Zhou:
Certificate-Based Signature Schemes without Pairings or Random Oracles. ISC 2008: 285-297 - [c24]Sherman S. M. Chow, Joseph K. Liu, Duncan S. Wong:
Robust Receipt-Free Election System with Ballot Secrecy and Verifiability. NDSS 2008 - [c23]Joseph K. Liu, Jianying Zhou:
Efficient Certificate-Based Encryption in the Standard Model. SCN 2008: 144-155 - [i13]Joseph K. Liu, Joonsang Baek, Willy Susilo, Jianying Zhou:
Certificate-Based Signature Schemes without Pairings or Random Oracles. IACR Cryptol. ePrint Arch. 2008: 275 (2008) - [i12]Joonsang Baek, Willy Susilo, Joseph K. Liu, Jianying Zhou:
A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack. IACR Cryptol. ePrint Arch. 2008: 449 (2008) - 2007
- [j3]Joseph K. Liu, Duncan S. Wong:
A More Efficient Instantiation of Witness-Indistinguishable Signature. Int. J. Netw. Secur. 5(2): 199-204 (2007) - [j2]Dennis Y. W. Liu, Joseph K. Liu, Yi Mu, Willy Susilo, Duncan S. Wong:
Revocable Ring Signature. J. Comput. Sci. Technol. 22(6): 785-794 (2007) - [c22]Tsz Hon Yuen, Man Ho Au, Joseph K. Liu, Willy Susilo:
(Convertible) Undeniable Signatures Without Random Oracles. ICICS 2007: 83-97 - [c21]Man Ho Au, Joseph K. Liu, Willy Susilo, Tsz Hon Yuen:
Certificate Based (Linkable) Ring Signature. ISPEC 2007: 79-92 - [e1]Willy Susilo, Joseph K. Liu, Yi Mu:
Provable Security, First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007, Proceedings. Lecture Notes in Computer Science 4784, Springer 2007, ISBN 978-3-540-75669-9 [contents] - [i11]Yong Ho Hwang, Joseph K. Liu, Sherman S. M. Chow:
Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model. IACR Cryptol. ePrint Arch. 2007: 262 (2007) - [i10]Tsz Hon Yuen, Man Ho Au, Joseph K. Liu, Willy Susilo:
(Convertible) Undeniable Signatures without Random Oracles. IACR Cryptol. ePrint Arch. 2007: 386 (2007) - 2006
- [j1]Joseph K. Liu, Duncan S. Wong:
Enhanced Security Models and a Generic Construction Approach for Linkable Ring Signature. Int. J. Found. Comput. Sci. 17(6): 1403-1422 (2006) - [c20]Sherman S. M. Chow, Victor K.-W. Wei, Joseph K. Liu, Tsz Hon Yuen:
Ring signatures without random oracles. AsiaCCS 2006: 297-302 - [c19]Yuen-Yan Chan, Sebastian Fleissner, Joseph K. Liu, Jin Li:
Single Sign-On and Key Establishment for Ubiquitous Smart Environments. ICCSA (4) 2006: 406-415 - [c18]Man Ho Au, Joseph K. Liu, Willy Susilo, Tsz Hon Yuen:
Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature. INDOCRYPT 2006: 364-378 - [c17]Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Duncan S. Wong:
ID-Based Ring Signature Scheme Secure in the Standard Model. IWSEC 2006: 1-16 - [c16]Joseph K. Liu, Willy Susilo, Duncan S. Wong:
Ring Signature with Designated Linkability. IWSEC 2006: 104-119 - [i9]Man Ho Au, Jing Chen, Joseph K. Liu, Yi Mu, Duncan S. Wong, Guomin Yang:
Malicious KGC Attacks in Certificateless Cryptography. IACR Cryptol. ePrint Arch. 2006: 255 (2006) - [i8]Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Duncan S. Wong:
Practical Hierarchical Identity Based Encryption and Signature schemes Without Random Oracles. IACR Cryptol. ePrint Arch. 2006: 368 (2006) - [i7]Joseph K. Liu, Man Ho Au, Willy Susilo:
Self-Generated-Certificate Public Key Cryptography and Certificateless Signature / Encryption Scheme in the Standard Model. IACR Cryptol. ePrint Arch. 2006: 373 (2006) - 2005
- [c15]Sherman S. M. Chow, Zhengjun Cao, Joseph K. Liu:
Security Analysis of Three Cryptographic Schemes from Other Cryptographic Schemes. CISC 2005: 290-301 - [c14]Joseph K. Liu, Patrick P. Tsang, Duncan S. Wong:
Efficient Verifiable Ring Encryption for Ad Hoc Groups. ESAS 2005: 1-13 - [c13]Joseph K. Liu, Patrick P. Tsang, Duncan S. Wong:
Recoverable and Untraceable E-Cash. EuroPKI 2005: 206-214 - [c12]Joseph K. Liu, Duncan S. Wong:
Linkable Ring Signatures: Security Models and New Schemes. ICCSA (2) 2005: 614-623 - [c11]Joseph K. Liu, Patrick P. Tsang, Duncan S. Wong, Robert W. Zhu:
Universal Custodian-Hiding Verifiable Encryption for Discrete Logarithms. ICISC 2005: 389-409 - [c10]Joseph K. Liu, Duncan S. Wong:
A Restricted Multi-show Credential System and Its Application on E-Voting. ISPEC 2005: 268-279 - [c9]Joseph K. Liu, Sandy H. Wong, Duncan S. Wong:
Transferable E-Cash Revisit. SEC 2005: 171-188 - [i6]Sherman S. M. Chow, Joseph K. Liu, Victor K. Wei, Tsz Hon Yuen:
Ring Signatures without Random Oracles. IACR Cryptol. ePrint Arch. 2005: 317 (2005) - [i5]Patrick P. Tsang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong:
A Suite of Non-Pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity. IACR Cryptol. ePrint Arch. 2005: 326 (2005) - [i4]Joseph K. Liu, Duncan S. Wong:
Solutions to Key Exposure Problem in Ring Signature. IACR Cryptol. ePrint Arch. 2005: 427 (2005) - 2004
- [c8]Joseph K. Liu, Victor K. Wei, Duncan S. Wong:
Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (Extended Abstract). ACISP 2004: 325-335 - [c7]Tony K. Chan, Karyin Fung, Joseph K. Liu, Victor K. Wei:
Blind Spontaneous Anonymous Group Signatures for Ad Hoc Groups. ESAS 2004: 82-94 - [c6]Joseph K. Liu, Duncan S. Wong:
On the Security Models of (Threshold) Ring Signature Schemes. ICISC 2004: 204-217 - [c5]Patrick P. Tsang, Victor K. Wei, Tony K. Chan, Man Ho Au, Joseph K. Liu, Duncan S. Wong:
Separable Linkable Threshold Ring Signatures. INDOCRYPT 2004: 384-398 - [c4]Joseph K. Liu, Victor K. Wei, Duncan S. Wong:
Custodian-Hiding Verifiable Encryption. WISA 2004: 51-64 - [i3]Joseph K. Liu, Victor K. Wei, Duncan S. Wong:
Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups. IACR Cryptol. ePrint Arch. 2004: 27 (2004) - [i2]Joseph K. Liu, Victor K. Wei, Duncan S. Wong:
Custodian-Hiding Verifiable Encryption. IACR Cryptol. ePrint Arch. 2004: 28 (2004) - [i1]Patrick P. Tsang, Victor K. Wei, Tony K. Chan, Man Ho Au, Joseph K. Liu, Duncan S. Wong:
Separable Linkable Threshold Ring Signatures. IACR Cryptol. ePrint Arch. 2004: 267 (2004) - 2003
- [c3]Yuen-Yan Chan, Chi-Hong Leung, Joseph K. Liu:
Evaluation on Security and Privacy of Web-Based Learning Systems. ICALT 2003: 308-309 - [c2]Duncan S. Wong, Karyin Fung, Joseph K. Liu, Victor K. Wei:
On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST. ICICS 2003: 34-46 - [c1]Joseph K. Liu, Victor K. Wei, Duncan S. Wong:
A Separable Threshold Ring Signature Scheme. ICISC 2003: 12-26
Coauthor Index
aka: Man Ho Allen Au
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint