Joseph K. Liu

According to our database1, Joseph K. Liu
  • authored at least 162 papers between 2003 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage.
IEEE Trans. Information Forensics and Security, 2018

An efficient access control scheme with outsourcing capability and attribute update for fog computing.
Future Generation Comp. Syst., 2018

2017
Towards secure and cost-effective fuzzy access control in mobile cloud computing.
Soft Comput., 2017

Erratum to: Special issue on security and privacy for smart cities.
Personal and Ubiquitous Computing, 2017

Special issue on security and privacy for smart cities.
Personal and Ubiquitous Computing, 2017

A general framework for secure sharing of personal health records in cloud system.
J. Comput. Syst. Sci., 2017

A new public remote integrity checking scheme with user and data privacy.
IJACT, 2017

Editorial: Special issue on security data science and cyber threat management.
Computers & Security, 2017

Anonymous Announcement System (AAS) for Electric Vehicle in VANETs.
Comput. J., 2017

Anonymous Anti-Sybil Attack Protocol for Mobile Healthcare Networks Analytics.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

A New Blockchain-Based Value-Added Tax System.
Proceedings of the Provable Security, 2017

Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption.
Proceedings of the Provable Security, 2017

RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero.
Proceedings of the Computer Security - ESORICS 2017, 2017

Towards Revocable Fine-Grained Encryption of Cloud Data: Reducing Trust upon Cloud.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

Multi-user Cloud-Based Secure Keyword Search.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

Attribute-Based Encryption with Expressive and Authorized Keyword Search.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

An implementation of access-control protocol for IoT home scenario.
Proceedings of the 16th IEEE/ACIS International Conference on Computer and Information Science, 2017

2016
An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing.
IEEE Trans. Information Forensics and Security, 2016

Attribute-Based Data Sharing Scheme Revisited in Cloud Computing.
IEEE Trans. Information Forensics and Security, 2016

Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services.
IEEE Trans. Information Forensics and Security, 2016

Privacy-Preserving and Regular Language Search Over Encrypted Cloud Data.
IEEE Trans. Information Forensics and Security, 2016

Privacy-Preserving Public Auditing Protocol for Low-Performance End Devices in Cloud.
IEEE Trans. Information Forensics and Security, 2016

On the security of two identity-based conditional proxy re-encryption schemes.
Theor. Comput. Sci., 2016

Two-Factor Data Security Protection Mechanism for Cloud Storage System.
IEEE Trans. Computers, 2016

Special Issue on Security and Privacy in Mobile Clouds.
Pervasive and Mobile Computing, 2016

An Efficient Non-Interactive Multi-client Searchable Encryption with Support for Boolean Queries.
IACR Cryptology ePrint Archive, 2016

Efficient handover authentication with user anonymity and untraceability for Mobile Cloud Computing.
Future Generation Comp. Syst., 2016

RKA-Secure Public Key Encryptions Against Efficiently Invertible Functions.
Comput. J., 2016

Faulty Instantiations of Threshold Ring Signature from Threshold Proof-of-Knowledge Protocol.
Comput. J., 2016

Efficient Privacy-Preserving Charging Station Reservation System for Electric Vehicles.
Comput. J., 2016

Trusted Boolean Search on Cloud Using Searchable Symmetric Encryption.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

A Trust and Privacy Preserving Handover Authentication Protocol for Wireless Networks.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Trust Enhancement over Range Search for Encrypted Data.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Towards Certificate-Based Group Encryption.
Proceedings of the Provable Security, 2016

Efficient Fine-Grained Access Control for Secure Personal Health Records in Cloud Computing.
Proceedings of the Network and System Security - 10th International Conference, 2016

While Mobile Encounters with Clouds.
Proceedings of the Network and System Security - 10th International Conference, 2016

Anonymizing Bitcoin Transaction.
Proceedings of the Information Security Practice and Experience, 2016

An Efficient Non-interactive Multi-client Searchable Encryption with Support for Boolean Queries.
Proceedings of the Computer Security - ESORICS 2016, 2016

Credential Wrapping: From Anonymous Password Authentication to Anonymous Biometric Authentication.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Efficient Construction of Completely Non-Malleable CCA Secure Public Key Encryption.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Efficient Multi-Function Data Sharing and Searching Mechanism for Cloud-Based Encrypted Data.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Time-Bound Anonymous Authentication for Roaming Networks.
IEEE Trans. Information Forensics and Security, 2015

Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage.
IEEE Trans. Information Forensics and Security, 2015

A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid.
IEEE Trans. Cloud Computing, 2015

k-Times Attribute-Based Anonymous Access Control for Cloud Computing.
IEEE Trans. Computers, 2015

Cost-Effective Authentic and Anonymous Data Sharing with Forward Security.
IEEE Trans. Computers, 2015

On the security of a lightweight authentication and encryption scheme for mobile ad hoc network.
Security and Communication Networks, 2015

Secure sharing and searching for real-time video data in mobile cloud.
IEEE Network, 2015

A Resolving Set based Algorithm for Fault Identification in Wireless Mesh Networks.
J. UCS, 2015

Universal designated verifier transitive signatures for graph-based big data.
Inf. Sci., 2015

Privacy Concerns for Photo Sharing in Online Social Networks.
IEEE Internet Computing, 2015

Cooperative attribute-based access control for enterprise computing system.
IJES, 2015

Secure sharing of Personal Health Records in cloud computing: Ciphertext-Policy Attribute-Based Signcryption.
Future Generation Comp. Syst., 2015

A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing.
Future Generation Comp. Syst., 2015

Towards secure and reliable cloud storage against data re-outsourcing.
Future Generation Comp. Syst., 2015

Comments on 'Efficient Revocable Certificateless Encryption Secure in the Standard Model'.
Comput. J., 2015

Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption.
Comput. J., 2015

Lightweight Anonymous Authentication for Ad Hoc Group: A Ring Signature Approach.
Proceedings of the Provable Security, 2015

On Lightweight Security Enforcement in Cyber-Physical Systems.
Proceedings of the Lightweight Cryptography for Security and Privacy, 2015

PEVTS: Privacy-Preserving Electric Vehicles Test-Bedding Scheme.
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015

Secret Picture: An Efficient Tool for Mitigating Deletion Delay on OSN.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

Practical Threshold Password-Authenticated Secret Sharing Protocol.
Proceedings of the Computer Security - ESORICS 2015, 2015

Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data.
Proceedings of the Computer Security - ESORICS 2015, 2015

Asymmetric Cross-cryptosystem Re-encryption Applicable to Efficient and Secure Mobile Access to Outsourced Data.
Proceedings of the 10th ACM Symposium on Information, 2015

A New Public Remote Integrity Checking Scheme with User Privacy.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

2014
A New Payment System for Enhancing Location Privacy of Electric Vehicles.
IEEE Trans. Vehicular Technology, 2014

Linkable Ring Signature with Unconditional Anonymity.
IEEE Trans. Knowl. Data Eng., 2014

A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing.
IEEE Trans. Information Forensics and Security, 2014

An efficient PHR service system supporting fuzzy keyword search and fine-grained access control.
Soft Comput., 2014

Toward efficient and privacy-preserving computing in big data era.
IEEE Network, 2014

A secure remote data integrity checking cloud storage system from threshold encryption.
J. Ambient Intelligence and Humanized Computing, 2014

An Efficient Cloud-based Revocable Identity-based Proxy Re-encryption Scheme for Public Clouds Data Sharing.
IACR Cryptology ePrint Archive, 2014

Improvements on an authentication scheme for vehicular sensor networks.
Expert Syst. Appl., 2014

GO-ABE: Group-Oriented Attribute-Based Encryption.
Proceedings of the Network and System Security - 8th International Conference, 2014

TIMER: Secure and Reliable Cloud Storage against Data Re-outsourcing.
Proceedings of the Information Security Practice and Experience, 2014

Fully Secure Ciphertext-Policy Attribute Based Encryption with Security Mediator.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

Identity-Based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks.
Proceedings of the Computer Security - ESORICS 2014, 2014

New Insight to Preserve Online Survey Accuracy and Privacy in Big Data Era.
Proceedings of the Computer Security - ESORICS 2014, 2014

An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing.
Proceedings of the Computer Security - ESORICS 2014, 2014

2013
Realizing Fully Secure Unrestricted ID-Based Ring Signature in the Standard Model Based on HIBE.
IEEE Trans. Information Forensics and Security, 2013

Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction.
Theor. Comput. Sci., 2013

Security Concerns in Popular Cloud Storage Services.
IEEE Pervasive Computing, 2013

Comments on "Analysis and Improvement of a Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions".
IEEE Communications Letters, 2013

Efficient Linkable and/or Threshold Ring Signature Without Random Oracles.
Comput. J., 2013

Towards Anonymous Ciphertext Indistinguishability with Identity Leakage.
Proceedings of the Provable Security - 7th International Conference, 2013

Threshold-Oriented Optimistic Fair Exchange.
Proceedings of the Network and System Security - 7th International Conference, 2013

Privacy-preserving smart metering with regional statistics and personal enquiry services.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Enhancing Location Privacy for Electric Vehicles (at the right time).
IACR Cryptology ePrint Archive, 2012

Efficient Escrow-Free Identity-Based Signature.
Proceedings of the Provable Security - 6th International Conference, 2012

Forward Secure Attribute-Based Signatures.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Enhancing Location Privacy for Electric Vehicles (at the Right time).
Proceedings of the Computer Security - ESORICS 2012, 2012

Verifier-local revocation group signatures with time-bound keys.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
Forward Secure Ring Signature without Random Oracles.
IACR Cryptology ePrint Archive, 2011

Short and Efficient Certificate-Based Signature.
IACR Cryptology ePrint Archive, 2011

Short and Efficient Certificate-Based Signature.
Proceedings of the NETWORKING 2011 Workshops - International IFIP TC 6 Workshops, PE-CRN, 2011

Forward Secure Ring Signature without Random Oracles.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

Threshold ring signature without random oracles.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Identity-based online/offline key encapsulation and encryption.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Identity-Based Server-Aided Decryption.
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2010
Efficient online/offline identity-based signature for wireless sensor network.
Int. J. Inf. Sec., 2010

Efficient Online/Offline Identity-Based Signature for Wireless Sensor Network.
IACR Cryptology ePrint Archive, 2010

Online/Offline Identity-Based Signcryption Revisited.
IACR Cryptology ePrint Archive, 2010

Practical ID-based Encryption for Wireless Sensor Network.
IACR Cryptology ePrint Archive, 2010

Identity-Based Online/Offline Key Encapsulation and Encryption.
IACR Cryptology ePrint Archive, 2010

A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract).
Proceedings of the Provable Security - 4th International Conference, 2010

Short Generic Transformation to Strongly Unforgeable Signature in the Standard Model.
Proceedings of the Computer Security, 2010

Online/Offline Identity-Based Signcryption Revisited.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

Practical ID-based encryption for wireless sensor network.
Proceedings of the 5th ACM Symposium on Information, 2010

2009
Certificate-based sequential aggregate signature.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

Online/Offline Ring Signature Scheme.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

An Efficient Identity-Based Online/Offline Encryption Scheme.
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009

A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack.
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009

2008
Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model.
J. UCS, 2008

Solutions to Key Exposure Problem in Ring Signature.
I. J. Network Security, 2008

Certificate-Based Signature Schemes without Pairings or Random Oracles.
IACR Cryptology ePrint Archive, 2008

A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack.
IACR Cryptology ePrint Archive, 2008

Efficient Certificate-Based Encryption in the Standard Model.
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008

Robust Receipt-Free Election System with Ballot Secrecy and Verifiability.
Proceedings of the Network and Distributed System Security Symposium, 2008

Certificate-Based Signature Schemes without Pairings or Random Oracles.
Proceedings of the Information Security, 11th International Conference, 2008

Sanitizable Signatures Revisited.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

Traceable and Retrievable Identity-Based Encryption.
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008

2007
Revocable Ring Signature.
J. Comput. Sci. Technol., 2007

A More Efficient Instantiation of Witness-Indistinguishable Signature.
I. J. Network Security, 2007

(Convertible) Undeniable Signatures without Random Oracles.
IACR Cryptology ePrint Archive, 2007

Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model.
IACR Cryptology ePrint Archive, 2007

Efficient Hierarchical Identity Based Signature in the Standard Model.
IACR Cryptology ePrint Archive, 2007

Certificate Based (Linkable) Ring Signature.
Proceedings of the Information Security Practice and Experience, 2007

(Convertible) Undeniable Signatures Without Random Oracles.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

2006
Enhanced Security Models and a Generic Construction Approach for Linkable Ring Signature.
Int. J. Found. Comput. Sci., 2006

Self-Generated-Certificate Public Key Cryptography and Certificateless Signature / Encryption Scheme in the Standard Model.
IACR Cryptology ePrint Archive, 2006

Self-Generated-Certificate Public Key Cryptosystem.
IACR Cryptology ePrint Archive, 2006

Practical Hierarchical Identity Based Encryption and Signature schemes Without Random Oracles.
IACR Cryptology ePrint Archive, 2006

ID-Based Ring Signature Scheme secure in the Standard Model.
IACR Cryptology ePrint Archive, 2006

Malicious KGC Attacks in Certificateless Cryptography.
IACR Cryptology ePrint Archive, 2006

Ring Signature with Designated Linkability.
Proceedings of the Advances in Information and Computer Security, 2006

ID-Based Ring Signature Scheme Secure in the Standard Model.
Proceedings of the Advances in Information and Computer Security, 2006

Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature.
Proceedings of the Progress in Cryptology, 2006

Single Sign-On and Key Establishment for Ubiquitous Smart Environments.
Proceedings of the Computational Science and Its Applications, 2006

Ring signatures without random oracles.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

2005
A Suite of Non-Pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity.
IACR Cryptology ePrint Archive, 2005

Solutions to Key Exposure Problem in Ring Signature.
IACR Cryptology ePrint Archive, 2005

Ring Signatures without Random Oracles.
IACR Cryptology ePrint Archive, 2005

Transferable E-Cash Revisit.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

A Restricted Multi-show Credential System and Its Application on E-Voting.
Proceedings of the Information Security Practice and Experience, 2005

Universal Custodian-Hiding Verifiable Encryption for Discrete Logarithms.
Proceedings of the Information Security and Cryptology, 2005

Linkable Ring Signatures: Security Models and New Schemes.
Proceedings of the Computational Science and Its Applications, 2005

Recoverable and Untraceable E-Cash.
Proceedings of the Public Key Infrastructure, 2005

Efficient Verifiable Ring Encryption for Ad Hoc Groups.
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2005

Security Analysis of Three Cryptographic Schemes from Other Cryptographic Schemes.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005

2004
Separable Linkable Threshold Ring Signatures.
IACR Cryptology ePrint Archive, 2004

Cryptanalyzing Bresson, et al.'s Spontaneous Anonymous Threshold Signature for Ad Hoc Groups and Patching via Updating Cramer, et al.'s Threshold Proof-of-Knowledge.
IACR Cryptology ePrint Archive, 2004

Custodian-Hiding Verifiable Encryption.
IACR Cryptology ePrint Archive, 2004

Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups.
IACR Cryptology ePrint Archive, 2004

Custodian-Hiding Verifiable Encryption.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

Separable Linkable Threshold Ring Signatures.
Proceedings of the Progress in Cryptology, 2004

On the Security Models of (Threshold) Ring Signature Schemes.
Proceedings of the Information Security and Cryptology, 2004

Blind Spontaneous Anonymous Group Signatures for Ad Hoc Groups.
Proceedings of the Security in Ad-hoc and Sensor Networks, First European Workshop, 2004

Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (Extended Abstract).
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

2003
A Separable Threshold Ring Signature Scheme.
Proceedings of the Information Security and Cryptology, 2003

On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

Evaluation on Security and Privacy of Web-Based Learning Systems.
Proceedings of the 2003 IEEE International Conference on Advanced Learning Technologies, 2003


  Loading...