Jianwei Liu

According to our database1, Jianwei Liu authored at least 43 papers between 2012 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
Efficient Scheduling of Weighted Coflows in Data Centers.
IEEE Trans. Parallel Distrib. Syst., 2019

On the obfuscatability of quantum point functions.
Quantum Information Processing, 2019

Achieving liability in anonymous communication: Auditing and tracing.
Computer Communications, 2019

Efficient CCA2 Secure Flexible and Publicly-Verifiable Fine-Grained Access Control in Fog Computing.
IEEE Access, 2019

Secure Stern Signatures in Quantum Random Oracle Model.
Proceedings of the Information Security - 22nd International Conference, 2019

2018
Efficient subtree-based encryption for fuzzy-entity data sharing.
Soft Comput., 2018

Lightweight and Manageable Digital Evidence Preservation System on Bitcoin.
J. Comput. Sci. Technol., 2018

Secure pay-TV for chained hotels.
Int. J. Inf. Sec., 2018

Privacy Preservation for Outsourced Medical Data With Flexible Access Control.
IEEE Access, 2018

Auditable Hierarchy-Private Public-Key Encryption.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

Linkable Group Signature for Auditing Anonymous Communication.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Secure joint Bitcoin trading with partially blind fuzzy signatures.
Soft Comput., 2017

A position-aware Merkle tree for dynamic cloud data integrity verification.
Soft Comput., 2017

Certificateless and identity-based authenticated asymmetric group key agreement.
Int. J. Inf. Sec., 2017

Auditing Revocable Privacy-Preserving Access Control for EHRs in Clouds.
Comput. J., 2017

Provably Secure Self-Extractable Encryption.
Proceedings of the Provable Security, 2017

Secure Role-Based Access Control over Outsourced EMRs Against Unwanted Leakage.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Efficient CCA2 Secure Revocable Multi-authority Large-Universe Attribute-Based Encryption.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Predicate Fully Homomorphic Encryption: Achieving Fine-Grained Access Control over Manipulable Ciphertext.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

2016
SAKE: scalable authenticated key exchange for mobile e-health networks.
Security and Communication Networks, 2016

Survey on key security technologies for space information networks.
J. Comm. Inform. Networks, 2016

Practical chosen-ciphertext secure Hierarchical Identity-Based Broadcast Encryption.
Int. J. Inf. Sec., 2016

Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing.
IACR Cryptology ePrint Archive, 2016

Identity-based proxy re-encryption version 2: Making mobile access easy in cloud.
Future Generation Comp. Syst., 2016

Batch Public Key Cryptosystem with batch multi-exponentiation.
Future Generation Comp. Syst., 2016

Efficient group key management for secure big data in predictable large-scale networks.
Concurrency and Computation: Practice and Experience, 2016

Distributed Bitcoin Account Management.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Online/Offline Public-Index Predicate Encryption for Fine-Grained Mobile Access Control.
Proceedings of the Computer Security - ESORICS 2016, 2016

Anonymous Role-Based Access Control on E-Health Records.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Accelerating Oblivious Transfer with Batch Multi-exponentiation.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Practical (fully) distributed signatures provably secure in the standard model.
Theor. Comput. Sci., 2015

Further ideal multipartite access structures from integer polymatroids.
SCIENCE CHINA Information Sciences, 2015

Batch Blind Signatures on Elliptic Curves.
Proceedings of the Information Security Practice and Experience, 2015

Auditing and Revocation Enabled Role-Based Access Control over Outsourced Private EHRs.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

2014
Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts.
Inf. Sci., 2014

Provably Secure Certificateless Authenticated Asymmetric Group Key Agreement.
Proceedings of the Information Security Practice and Experience, 2014

Practical Direct Chosen Ciphertext Secure Key-Policy Attribute-Based Encryption with Public Ciphertext Test.
Proceedings of the Computer Security - ESORICS 2014, 2014

Practical Distributed Signatures in the Standard Model.
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014

Hierarchical Identity-Based Broadcast Encryption.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
Simultaneous authentication and secrecy in identity-based data upload to cloud.
Cluster Computing, 2013

Light Weight Network Coding Based Key Distribution Scheme for MANETs.
Proceedings of the Network and System Security - 7th International Conference, 2013

A Generic Construction of Proxy Signatures from Certificateless Signatures.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

2012
A New Identity Based Signcryption Scheme in the Standard Model.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012


  Loading...