Dongxi Liu

According to our database1, Dongxi Liu
  • authored at least 54 papers between 2001 and 2018.
  • has a "Dijkstra number"2 of four.



In proceedings 
PhD thesis 




Monero Ring Attack: Recreating Zero Mixin Transaction Effect.
IACR Cryptology ePrint Archive, 2018

A Reliable and Practical Approach to Kernel Attack Surface Reduction of Commodity OS.
CoRR, 2018

Lightweight Mutual Authentication for IoT and Its Applications.
T-SUSC, 2017

Compact-LWE: Enabling Practically Lightweight Public Key Encryption for Leveled IoT Device Authentication.
IACR Cryptology ePrint Archive, 2017

Privacy Preserving Location Recommendations.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017

Fine-Grained Access Control for Personal Health Records in Cloud Computing.
Proceedings of the 85th IEEE Vehicular Technology Conference, 2017

Secure Data-Centric Access Control for Smart Grid Services Based on Publish/Subscribe Systems.
ACM Trans. Internet Techn., 2016

Automated Policy Combination for Secure Data Sharing in Cross-Organizational Collaborations.
IEEE Access, 2016

Towards privacy-preserving classification in neural networks.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Efficiently computing reverse k furthest neighbors.
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016

Design and Evaluation of an Integrated Collaboration Platform for Secure Information Sharing.
Proceedings of the Cooperative Design, Visualization, and Engineering, 2016

Efficient Processing of Encrypted Data in Honest-but-Curious Clouds.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

Practical Fully Homomorphic Encryption without Noise Reduction.
IACR Cryptology ePrint Archive, 2015

Proofs of Encrypted Data Retrievability with Probabilistic and Homomorphic Message Authenticators.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Privacy-Preserving and Outsourced Multi-user K-Means Clustering.
Proceedings of the IEEE Conference on Collaboration and Internet Computing, 2015

Automated Policy Combination for Data Sharing across Multiple Organizations.
Proceedings of the 2015 IEEE International Conference on Services Computing, 2015

A Secure Integrated Platform for Rapdily Formed Multiorganisation Collaborations.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

Privacy-Preserving and Outsourced Multi-User k-Means Clustering.
CoRR, 2014

Privacy of outsourced k-means clustering.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

Secure Multiparty Data Sharing in the Cloud Using Hardware-Based TPM Devices.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

User-Controlled Identity Provisioning for Secure Account Sharing.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

Nonlinear order preserving index for encrypted database query in service cloud environments.
Concurrency and Computation: Practice and Experience, 2013

A Performance Evaluation of Public Cloud Using TPC-C.
Proceedings of the Service-Oriented Computing - ICSOC 2012 Workshops, 2013

Verifying an Aircraft Proximity Characterization Method in Coq.
Proceedings of the Formal Methods and Software Engineering, 2013

Hardware Security Device Facilitated Trusted Energy Services.
MONET, 2012

A New Cloud Architecture of Virtual Trusted Platform Modules.
IEICE Transactions, 2012

Servicization of Australian Privacy Act for Improving Business Compliance.
Proceedings of the 2012 IEEE 19th International Conference on Web Services, 2012

Query encrypted databases practically.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Programmable Order-Preserving Secure Index for Encrypted Database Query.
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012

Semantic based aspect-oriented programming for context-aware Web service composition.
Inf. Syst., 2011

A mobile and portable trusted computing platform.
EURASIP J. Wireless Comm. and Networking, 2011

Secure Multi-party Collaboration Systems in Supply Chain Management.
Proceedings of the LISS 2011 - Proceedings of the 1st International Conference on Logistics, Informatics and Service Science, Volume 3, Beijing, China, 8, 2011

Cloud#: A Specification Language for Modeling Cloud.
Proceedings of the IEEE International Conference on Cloud Computing, 2011

End-to-End Service Support for Mashups.
IEEE Trans. Services Computing, 2010

XQuery meets Datalog: Data Relevance Query for workflow trustworthiness.
Proceedings of the Fourth IEEE International Conference on Research Challenges in Information Science, 2010

Policy-Based Attestation of Service Behavior for Establishing Rigorous Trust.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2010, 2010

User Authentication for Online Applications Using a USB-Based Trust Device.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2010

A Framework for Delivering Rigorously Trusted Services.
Proceedings of the IEEE International Conference on Web Services, 2010

Managing Web Services: An Application in Bioinformatics.
Proceedings of the Service-Oriented Computing - 8th International Conference, 2010

Trusted Computing Platform in Your Pocket.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

A Cloud Architecture of Virtual Trusted Platform Modules.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

Hardware security device facilitated trusted residential energy services.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

Semantic Weaving for Context-Aware Web Service Composition.
Proceedings of the Web Information Systems Engineering, 2009

Logic-based verification for Web services composition with TLA.
Proceedings of the IEEE International Conference on Service-Oriented Computing and Applications, 2009

Secure and Conditional Resource Coordination for Successful Collaborations.
Proceedings of the Collaborative Computing: Networking, 2008

A Web Service Architecture for Bidirectional XML Updating.
Proceedings of the Advances in Data and Web Management, 2007

Bidirectional interpretation of XQuery.
Proceedings of the 2007 ACM SIGPLAN Workshop on Partial Evaluation and Semantics-based Program Manipulation, 2007

Towards automatic model synchronization from model transformations.
Proceedings of the 22nd IEEE/ACM International Conference on Automated Software Engineering (ASE 2007), 2007

Bytecode Verification for Enhanced JVM Access Control.
Proceedings of the The Second International Conference on Availability, 2007

An environment for maintaining computation dependency in XML documents.
Proceedings of the 2005 ACM Symposium on Document Engineering, 2005

A Method to Obtain Signatures from Honeypots Data.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2004

Normalizing Traffic Pattern with Anonymity for Mission Critical Applications.
Proceedings of the Proceedings 37th Annual Simulation Symposium (ANSS-37 2004), 2004

An Attack-Finding Algorithm for Security Protocols.
J. Comput. Sci. Technol., 2002

An Intelligent Intruder Model for Security Protocol Analysis.
Proceedings of the Information and Communications Security, Third International Conference, 2001