Dongxi Liu
According to our database1, Dongxi Liu
Timeline
Legend:
Book In proceedings Article PhD thesis OtherLinks
On csauthors.net:
Bibliography
2018
A Reliable and Practical Approach to Kernel Attack Surface Reduction of Commodity OS.
CoRR, 2018
2017
Lightweight Mutual Authentication for IoT and Its Applications.
T-SUSC, 2017
Compact-LWE: Enabling Practically Lightweight Public Key Encryption for Leveled IoT Device Authentication.
IACR Cryptology ePrint Archive, 2017
Privacy Preserving Location Recommendations.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017
Fine-Grained Access Control for Personal Health Records in Cloud Computing.
Proceedings of the 85th IEEE Vehicular Technology Conference, 2017
2016
Secure Data-Centric Access Control for Smart Grid Services Based on Publish/Subscribe Systems.
ACM Trans. Internet Techn., 2016
Automated Policy Combination for Secure Data Sharing in Cross-Organizational Collaborations.
IEEE Access, 2016
Towards privacy-preserving classification in neural networks.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Efficiently computing reverse k furthest neighbors.
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016
Design and Evaluation of an Integrated Collaboration Platform for Secure Information Sharing.
Proceedings of the Cooperative Design, Visualization, and Engineering, 2016
Efficient Processing of Encrypted Data in Honest-but-Curious Clouds.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016
2015
Practical Fully Homomorphic Encryption without Noise Reduction.
IACR Cryptology ePrint Archive, 2015
Proofs of Encrypted Data Retrievability with Probabilistic and Homomorphic Message Authenticators.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Privacy-Preserving and Outsourced Multi-user K-Means Clustering.
Proceedings of the IEEE Conference on Collaboration and Internet Computing, 2015
Automated Policy Combination for Data Sharing across Multiple Organizations.
Proceedings of the 2015 IEEE International Conference on Services Computing, 2015
A Secure Integrated Platform for Rapdily Formed Multiorganisation Collaborations.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
Privacy-Preserving and Outsourced Multi-User k-Means Clustering.
CoRR, 2014
Privacy of outsourced k-means clustering.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
Secure Multiparty Data Sharing in the Cloud Using Hardware-Based TPM Devices.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014
User-Controlled Identity Provisioning for Secure Account Sharing.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014
2013
Nonlinear order preserving index for encrypted database query in service cloud environments.
Concurrency and Computation: Practice and Experience, 2013
A Performance Evaluation of Public Cloud Using TPC-C.
Proceedings of the Service-Oriented Computing - ICSOC 2012 Workshops, 2013
Verifying an Aircraft Proximity Characterization Method in Coq.
Proceedings of the Formal Methods and Software Engineering, 2013
2012
Hardware Security Device Facilitated Trusted Energy Services.
MONET, 2012
A New Cloud Architecture of Virtual Trusted Platform Modules.
IEICE Transactions, 2012
Servicization of Australian Privacy Act for Improving Business Compliance.
Proceedings of the 2012 IEEE 19th International Conference on Web Services, 2012
Query encrypted databases practically.
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Programmable Order-Preserving Secure Index for Encrypted Database Query.
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012
2011
Semantic based aspect-oriented programming for context-aware Web service composition.
Inf. Syst., 2011
A mobile and portable trusted computing platform.
EURASIP J. Wireless Comm. and Networking, 2011
Secure Multi-party Collaboration Systems in Supply Chain Management.
Proceedings of the LISS 2011 - Proceedings of the 1st International Conference on Logistics, Informatics and Service Science, Volume 3, Beijing, China, 8, 2011
Cloud#: A Specification Language for Modeling Cloud.
Proceedings of the IEEE International Conference on Cloud Computing, 2011
2010
End-to-End Service Support for Mashups.
IEEE Trans. Services Computing, 2010
XQuery meets Datalog: Data Relevance Query for workflow trustworthiness.
Proceedings of the Fourth IEEE International Conference on Research Challenges in Information Science, 2010
Policy-Based Attestation of Service Behavior for Establishing Rigorous Trust.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2010, 2010
User Authentication for Online Applications Using a USB-Based Trust Device.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2010
A Framework for Delivering Rigorously Trusted Services.
Proceedings of the IEEE International Conference on Web Services, 2010
Managing Web Services: An Application in Bioinformatics.
Proceedings of the Service-Oriented Computing - 8th International Conference, 2010
Trusted Computing Platform in Your Pocket.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010
A Cloud Architecture of Virtual Trusted Platform Modules.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010
Hardware security device facilitated trusted residential energy services.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010
2009
Semantic Weaving for Context-Aware Web Service Composition.
Proceedings of the Web Information Systems Engineering, 2009
Logic-based verification for Web services composition with TLA.
Proceedings of the IEEE International Conference on Service-Oriented Computing and Applications, 2009
2008
Secure and Conditional Resource Coordination for Successful Collaborations.
Proceedings of the Collaborative Computing: Networking, 2008
2007
A Web Service Architecture for Bidirectional XML Updating.
Proceedings of the Advances in Data and Web Management, 2007
Bidirectional interpretation of XQuery.
Proceedings of the 2007 ACM SIGPLAN Workshop on Partial Evaluation and Semantics-based Program Manipulation, 2007
Towards automatic model synchronization from model transformations.
Proceedings of the 22nd IEEE/ACM International Conference on Automated Software Engineering (ASE 2007), 2007
Bytecode Verification for Enhanced JVM Access Control.
Proceedings of the The Second International Conference on Availability, 2007
2005
An environment for maintaining computation dependency in XML documents.
Proceedings of the 2005 ACM Symposium on Document Engineering, 2005
2004
A Method to Obtain Signatures from Honeypots Data.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2004
Normalizing Traffic Pattern with Anonymity for Mission Critical Applications.
Proceedings of the Proceedings 37th Annual Simulation Symposium (ANSS-37 2004), 2004
2002
An Attack-Finding Algorithm for Security Protocols.
J. Comput. Sci. Technol., 2002
2001
An Intelligent Intruder Model for Security Protocol Analysis.
Proceedings of the Information and Communications Security, Third International Conference, 2001