Hui Cui

Orcid: 0000-0002-5820-2233

Affiliations:
  • Murdoch University, Discipline of Information Technology, Mathematics and Statistics, Perth, Australia
  • Data61, CSIRO, Australia
  • Royal Melbourne Institute of Technology University, RMIT, Computer Science and Software Engineering, Melbourne, Australia
  • Singapore Management University, Secure Mobile Centre, Singapore
  • University of Wollongong, School of Computing and Information Technology, Australia (PhD 2015)


According to our database1, Hui Cui authored at least 51 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Factors Affecting Trust and Acceptance for Blockchain Adoption in Digital Payment Systems: A Systematic Review.
Future Internet, March, 2024

UAV Control Method Combining Reptile Meta-Reinforcement Learning and Generative Adversarial Imitation Learning.
Future Internet, March, 2024

Secure Internet of Things in Cloud Computing via Puncturable Attribute-Based Encryption With User Revocation.
IEEE Internet Things J., January, 2024

Pay-Per-Proof: Decentralized Outsourced Multi-User PoR for Cloud Storage Payment Using Blockchain.
IEEE Trans. Cloud Comput., 2024

2023
Vehicloak: A Blockchain-Enabled Privacy-Preserving Payment Scheme for Location-Based Vehicular Services.
IEEE Trans. Mob. Comput., November, 2023

Revocable Policy-Based Chameleon Hash for Blockchain Rewriting.
Comput. J., October, 2023

Password-authenticated proofs of retrievability for multiple devices checking cloud data.
J. Inf. Secur. Appl., June, 2023

Token-Based Biometric Enhanced Key Derivation for Authentication Over Wireless Networks.
IEEE Trans. Netw. Sci. Eng., 2023

Multi-Keyword Searchable and Verifiable Attribute-Based Encryption Over Cloud Data.
IEEE Trans. Cloud Comput., 2023

Secure and Efficient Smart Healthcare System Based on Federated Learning.
Int. J. Intell. Syst., 2023

2021
Two-Factor Decryption: A Better Way to Protect Data Security and Privacy.
Comput. J., 2021

Improved Security Model for Public-Key Authenticated Encryption with Keyword Search.
Proceedings of the Provable and Practical Security, 2021

Forward-Secure Revocable Identity-Based Encryption.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

2020
Pay as You Decrypt: Decryption Outsourcing for Functional Encryption Using Blockchain.
IEEE Trans. Inf. Forensics Secur., 2020

Robust digital signature revisited.
Theor. Comput. Sci., 2020

Key regeneration-free ciphertext-policy attribute-based encryption and its application.
Inf. Sci., 2020

Server-aided revocable attribute-based encryption for cloud computing services.
Concurr. Comput. Pract. Exp., 2020

2019
A lightweight authentication scheme for vehicular ad hoc networks based on MSR.
Veh. Commun., 2019

An Attribute-Based Framework for Secure Communications in Vehicular Ad Hoc Networks.
IEEE/ACM Trans. Netw., 2019

Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud.
IEEE Trans. Big Data, 2019

DABKE: Secure deniable attribute-based key exchange framework.
J. Comput. Secur., 2019

(Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance.
Inf. Sci., 2019

HIBEChain: A Hierarchical Identity-based Blockchain System for Large-Scale IoT.
IACR Cryptol. ePrint Arch., 2019

A new privacy-preserving authentication protocol for anonymous web browsing.
Concurr. Comput. Pract. Exp., 2019

2018
Server-Aided Attribute-Based Signature With Revocation for Resource-Constrained Industrial-Internet-of-Things Devices.
IEEE Trans. Ind. Informatics, 2018

Efficient and Expressive Keyword Search Over Encrypted Data in Cloud.
IEEE Trans. Dependable Secur. Comput., 2018

Attribute-based cloud storage with secure provenance over encrypted data.
Future Gener. Comput. Syst., 2018

An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited.
Comput. Networks, 2018

Achieving Scalable Access Control Over Encrypted Data for Edge Computing Networks.
IEEE Access, 2018

2017
Attribute-Based Secure Messaging in the Public Cloud.
Proceedings of the A Systems Approach to Cyber Security, 2017

Fuzzy Public-Key Encryption Based on Biometric Data.
Proceedings of the Provable Security, 2017

A Practical Authentication Protocol for Anonymous Web Browsing.
Proceedings of the Information Security Practice and Experience, 2017

Server-Aided Revocable Attribute-Based Encryption Resilient to Decryption Key Exposure.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017

Attribute-Based Encryption with Expressive and Authorized Keyword Search.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Relations between robustness and RKA security under public-key encryption.
Theor. Comput. Sci., 2016

Escrow free attribute-based signature with self-revealability.
Inf. Sci., 2016

Revocable and Decentralized Attribute-Based Encryption.
Comput. J., 2016

Attribute-Based Encryption with Granular Revocation.
Proceedings of the Security and Privacy in Communication Networks, 2016

An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures.
Proceedings of the Provable Security, 2016

Server-Aided Revocable Attribute-Based Encryption.
Proceedings of the Computer Security - ESORICS 2016, 2016

2015
Proof of retrievability with public verifiability resilient against related-key attacks.
IET Inf. Secur., 2015

2014
Anonymous broadcast encryption with an untrusted gateway.
Int. J. Secur. Networks, 2014

Signcryption Secure Against Linear Related-Key Attacks.
Comput. J., 2014

Public-Key Encryption Resilient against Linear Related-Key Attacks Revisited.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Complete Robustness in Identity-Based Encryption.
Proceedings of the Provable Security - 8th International Conference, 2014

2013
Verifiable and Anonymous Encryption in Asymmetric Bilinear Maps.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Public-Key Encryption Resilient to Linear Related-Key Attacks.
Proceedings of the Security and Privacy in Communication Networks, 2013

Anonymous Signcryption against Linear Related-Key Attacks.
Proceedings of the Provable Security - 7th International Conference, 2013

2011
A Secure Anonymous Identity-based Key Agreement Protocol for Distributed Computer Networks.
J. Networks, 2011

2009
An Novel Anonymous Authenticated and Key Exchange Protocol.
J. Networks, 2009

Controlled Secret Leakage.
J. Comput., 2009


  Loading...