Kaitai Liang

According to our database1, Kaitai Liang
  • authored at least 49 papers between 2012 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Auditable σ-Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing.
IEEE Trans. Information Forensics and Security, 2018

An efficient access control scheme with outsourcing capability and attribute update for fog computing.
Future Generation Comp. Syst., 2018

2017
Cost-effective privacy-preserving vehicular urban sensing system.
Personal and Ubiquitous Computing, 2017

Securing Outsourced Data in the Multi-Authority Cloud with Fine-Grained Access Control and Efficient Attribute Revocation.
Comput. J., 2017

An Efficient Key-Policy Attribute-Based Searchable Encryption in Prime-Order Groups.
Proceedings of the Provable Security, 2017

Hierarchical Conditional Proxy Re-Encryption: A New Insight of Fine-Grained Secure Data Sharing.
Proceedings of the Information Security Practice and Experience, 2017

A Modified Segmentation Approach for Overlapping Elliptical Objects with Various Sizes.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

DABEHR: Decentralized Attribute-Based Electronic Health Record System with Constant-Size Storage Complexity.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

Attribute based Encryption: Traitor Tracing, Revocation and Fully Security on Prime Order Groups.
Proceedings of the CLOSER 2017, 2017

2016
Attribute-Based Data Sharing Scheme Revisited in Cloud Computing.
IEEE Trans. Information Forensics and Security, 2016

Privacy-Preserving and Regular Language Search Over Encrypted Cloud Data.
IEEE Trans. Information Forensics and Security, 2016

Two-Factor Data Security Protection Mechanism for Cloud Storage System.
IEEE Trans. Computers, 2016

Secure bidirectional proxy re-encryption for cryptographic cloud storage.
Pervasive and Mobile Computing, 2016

Broadcast encryption with dealership.
Int. J. Inf. Sec., 2016

Attribute Based Encryption: Traitor Tracing, Revocation and Fully Security on Prime Order Groups.
IACR Cryptology ePrint Archive, 2016

Privacy-Preserving Genetic Relatedness Test.
CoRR, 2016

Anonymous Proxy Signature with Hierarchical Traceability.
Comput. J., 2016

One-Round Attribute-Based Key Exchange in the Multi-party Setting.
Proceedings of the Provable Security, 2016

A New Transitive Signature Scheme.
Proceedings of the Network and System Security - 10th International Conference, 2016

While Mobile Encounters with Clouds.
Proceedings of the Network and System Security - 10th International Conference, 2016

A data hiding approach for sensitive smartphone data.
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2016

Online/Offline Public-Index Predicate Encryption for Fine-Grained Mobile Access Control.
Proceedings of the Computer Security - ESORICS 2016, 2016

Efficient Multi-Function Data Sharing and Searching Mechanism for Cloud-Based Encrypted Data.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

A Cloud-Based Access Control Scheme with User Revocation and Attribute Update.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Edit Distance Based Encryption and Its Application.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Secure and Traceable Framework for Data Circulation.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage.
IEEE Trans. Information Forensics and Security, 2015

Searchable Attribute-Based Mechanism With Efficient Data Sharing for Secure Cloud Storage.
IEEE Trans. Information Forensics and Security, 2015

Cost-Effective Authentic and Anonymous Data Sharing with Forward Security.
IEEE Trans. Computers, 2015

A new unpredictability-based radio frequency identification forward privacy model and a provably secure construction.
Security and Communication Networks, 2015

Secure sharing and searching for real-time video data in mobile cloud.
IEEE Network, 2015

Privacy Concerns for Photo Sharing in Online Social Networks.
IEEE Internet Computing, 2015

A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing.
Future Generation Comp. Syst., 2015

A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds.
Concurrency and Computation: Practice and Experience, 2015

Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption.
Comput. J., 2015

Secret Picture: An Efficient Tool for Mitigating Deletion Delay on OSN.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data.
Proceedings of the Computer Security - ESORICS 2015, 2015

2014
A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing.
IEEE Trans. Information Forensics and Security, 2014

Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts.
Theor. Comput. Sci., 2014

Empowering Personal Health Records with Cloud Computing: How to encrypt with forthcoming fine-grained policies efficiently.
JoWUA, 2014

An Efficient Cloud-based Revocable Identity-based Proxy Re-encryption Scheme for Public Clouds Data Sharing.
IACR Cryptology ePrint Archive, 2014

RCCA-Secure Multi-use Bidirectional Proxy Re-encryption with Master Secret Security.
Proceedings of the Provable Security - 8th International Conference, 2014

An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data Sharing.
Proceedings of the Information Security Practice and Experience, 2014

An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing.
Proceedings of the Computer Security - ESORICS 2014, 2014

2013
A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release.
IACR Cryptology ePrint Archive, 2013

A Ciphertext-Policy Attribute-Based Proxy Re-Encryption with Chosen-Ciphertext Security.
IACR Cryptology ePrint Archive, 2013

A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release.
Proceedings of the Information Security Practice and Experience, 2013

A Ciphertext-Policy Attribute-Based Proxy Re-encryption with Chosen-Ciphertext Security.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

2012
A CCA-Secure Identity-Based Conditional Proxy Re-Encryption without Random Oracles.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012


  Loading...