Weiran Liu

According to our database1, Weiran Liu authored at least 21 papers between 2011 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Efficient subtree-based encryption for fuzzy-entity data sharing.
Soft Comput., 2018

2017
Energy Efficiency Optimization for Communication of Air-Based Information Network with Guaranteed Timing Constraints.
Signal Processing Systems, 2017

Auditing Revocable Privacy-Preserving Access Control for EHRs in Clouds.
Comput. J., 2017

Provably Secure Self-Extractable Encryption.
Proceedings of the Provable Security, 2017

Efficient CCA2 Secure Revocable Multi-authority Large-Universe Attribute-Based Encryption.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Predicate Fully Homomorphic Encryption: Achieving Fine-Grained Access Control over Manipulable Ciphertext.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

2016
SAKE: scalable authenticated key exchange for mobile e-health networks.
Security and Communication Networks, 2016

Survey on key security technologies for space information networks.
J. Comm. Inform. Networks, 2016

Practical chosen-ciphertext secure Hierarchical Identity-Based Broadcast Encryption.
Int. J. Inf. Sec., 2016

Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing.
IACR Cryptology ePrint Archive, 2016

Batch Public Key Cryptosystem with batch multi-exponentiation.
Future Generation Comp. Syst., 2016

Secure and Anonymous Data Transmission System for Cluster Organised Space Information Network.
Proceedings of the 2016 IEEE International Conference on Smart Cloud, 2016

Online/Offline Public-Index Predicate Encryption for Fine-Grained Mobile Access Control.
Proceedings of the Computer Security - ESORICS 2016, 2016

Anonymous Role-Based Access Control on E-Health Records.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Identity-Based Group Encryption.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Optimization for Communication Energy Efficiency of Air-Based Information Network While Satisfying Timing Constraints.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Auditing and Revocation Enabled Role-Based Access Control over Outsourced Private EHRs.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Energy Optimization of Air-Based Information Network with Guaranteed Security Protection.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
Practical Direct Chosen Ciphertext Secure Key-Policy Attribute-Based Encryption with Public Ciphertext Test.
Proceedings of the Computer Security - ESORICS 2014, 2014

Hierarchical Identity-Based Broadcast Encryption.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2011
Tenzing A SQL Implementation On The MapReduce Framework.
PVLDB, 2011


  Loading...