Liming Fang

According to our database1, Liming Fang authored at least 43 papers between 2007 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2020
A blockchain based decentralized data security mechanism for the Internet of Things.
J. Parallel Distributed Comput., 2020

A physiological and behavioral feature authentication scheme for medical cloud based on fuzzy-rough core vector machine.
Inf. Sci., 2020

A Novel Energy-Efficient and Privacy-Preserving Data Aggregation for WSNs.
IEEE Access, 2020

2019
Y-DWMS: A Digital Watermark Management System Based on Smart Contracts.
Sensors, 2019

Tell the Device Password: Smart Device Wi-Fi Connection Based on Audio Waves.
Sensors, 2019

A Fine-Grained User-Divided Privacy-Preserving Access Control Protocol in Smart Watch.
Sensors, 2019

Conditional proxy broadcast re-encryption with fine grain policy for cloud data sharing.
IJES, 2019

2018
A Secure Multimedia Data Sharing Scheme for Wireless Network.
Security and Communication Networks, 2018

A proxy broadcast re-encryption for cloud data sharing.
Multim. Tools Appl., 2018

A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system.
Des. Codes Cryptogr., 2018

Privacy preserving cloud data sharing system with flexible control.
Comput. Electr. Eng., 2018

2017
Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model.
IEEE Trans. Information Forensics and Security, 2017

Identity-based conditional proxy re-encryption with fine grain policy.
Comput. Stand. Interfaces, 2017

2016
A Key-Policy Attribute-Based Proxy Re-Encryption Without Random Oracles.
Comput. J., 2016

2015
标准模型下增强的无需安全信道的带关键词搜索的公钥加密 (Secure Channel Free Searchable Encryption in Standard Model).
计算机科学, 2015

A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds.
Concurr. Comput. Pract. Exp., 2015

Reliable access control for multi-authority in cloud storage.
Proceedings of the International Carnahan Conference on Security Technology, 2015

Outsourced data tagging via authority and delegable auditing for cloud storage.
Proceedings of the International Carnahan Conference on Security Technology, 2015

Privacy-preserving proof of storage in large group.
Proceedings of the International Carnahan Conference on Security Technology, 2015

Data protection based on multifunction digital watermark in wireless sensor network.
Proceedings of the International Carnahan Conference on Security Technology, 2015

2014
Attributed Based Provable Data Possession in Public Cloud Storage.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Oriented Group Provable Data Possession in Public Cloud.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Security Analysis of Delegable and Proxy Provable Data Possession in Public Cloud Storage.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Analysis of Delegable and Proxy Provable Data Possession for Cloud Storage.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Leakage Resilient Provable Data Possession in Public Cloud Storage.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

2013
Public key encryption with keyword search secure against keyword guessing attacks without random oracle.
Inf. Sci., 2013

A Ciphertext-Policy Attribute-Based Proxy Re-Encryption with Chosen-Ciphertext Security.
IACR Cryptol. ePrint Arch., 2013

Fuzzy conditional proxy re-encryption.
Sci. China Inf. Sci., 2013

2012
Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search.
Theor. Comput. Sci., 2012

Hierarchical conditional proxy re-encryption.
Comput. Stand. Interfaces, 2012

2011
Interactive conditional proxy re-encryption with fine grain policy.
J. Syst. Softw., 2011

2010
Decryptable Public Key Encryption with Keyword Search Schemes.
J. Digit. Content Technol. its Appl., 2010

Chosen Public Key and Ciphertext Secure Proxy Re-encryption Schemes.
J. Digit. Content Technol. its Appl., 2010

An efficient unlinkable secret handshake protocol without ROM.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

Improved unidirectional chosen-ciphertext secure proxy re-encryption.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

2009
Anonymous Conditional Proxy Re-encryption without Random Oracle.
Proceedings of the Provable Security, Third International Conference, 2009

A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

2008
Formal Proof of Relative Strengths of Security between ECK2007 Model and other Proof Models for Key Agreement Protocols.
IACR Cryptol. ePrint Arch., 2008

Full Security: Fuzzy Identity Based Encryption.
IACR Cryptol. ePrint Arch., 2008

Chosen-Ciphertext Secure Fuzzy Identity-Based Key Encapsulation without ROM.
IACR Cryptol. ePrint Arch., 2008

Weighted Margin Multi-Class Core Vector Machines.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

Chosen-Ciphertext Secure Multi-Authority Fuzzy Identity-Based Key Encapsulation without ROM.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2007
Identity-Based Key Issuing Protocol for Ad Hoc Networks.
Proceedings of the Computational Intelligence and Security, International Conference, 2007


  Loading...