Ximeng Liu

According to our database1, Ximeng Liu authored at least 73 papers between 2013 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system.
Inf. Sci., 2019

SUAA: A Secure User Authentication Scheme with Anonymity for the Single & Multi-server Environments.
Inf. Sci., 2019

2018
Security and Privacy Challenges for Internet-of-Things and Fog Computing.
Wireless Communications and Mobile Computing, 2018

Efficient and Privacy-Preserving Dynamic Spatial Query Scheme for Ride-Hailing Services.
IEEE Trans. Vehicular Technology, 2018

Lightweight Break-Glass Access Control System for Healthcare Internet-of-Things.
IEEE Trans. Industrial Informatics, 2018

Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers.
IEEE Trans. Dependable Sec. Comput., 2018

Improved Construction for Inner Product Functional Encryption.
Security and Communication Networks, 2018

EOABS: expressive outsourced attribute-based signature.
Peer-to-Peer Networking and Applications, 2018

DOAS: Efficient data owner authorized search over encrypted cloud data.
Peer-to-Peer Networking and Applications, 2018

VMKDO: Verifiable multi-keyword search over encrypted cloud data for dynamic data-owner.
Peer-to-Peer Networking and Applications, 2018

Dual-side privacy-preserving task matching for spatial crowdsourcing.
J. Network and Computer Applications, 2018

Blockchain based efficient and robust fair payment for outsourcing services in cloud computing.
Inf. Sci., 2018

Enabling verifiable multiple keywords search over encrypted cloud data.
Inf. Sci., 2018

Expressive query over outsourced encrypted data.
Inf. Sci., 2018

Anonymous Privacy-Preserving Task Matching in Crowdsourcing.
IEEE Internet of Things Journal, 2018

Practical Attribute-Based Multi-Keyword Search Scheme in Mobile Crowdsourcing.
IEEE Internet of Things Journal, 2018

Privacy-preserving fusion of IoT and big data for e-health.
Future Generation Comp. Syst., 2018

Hybrid privacy-preserving clinical decision support system in fog-cloud computing.
Future Generation Comp. Syst., 2018

Cross-domain dynamic anonymous authenticated group key management with symptom-matching for e-health social system.
Future Generation Comp. Syst., 2018

Simulation-based security of function-hiding inner product encryption.
SCIENCE CHINA Information Sciences, 2018

Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability.
SCIENCE CHINA Information Sciences, 2018

An Efficient and Privacy-Preserving Biometric Identification Scheme in Cloud Computing.
IEEE Access, 2018

A Lightweight Policy Preserving EHR Sharing Scheme in the Cloud.
IEEE Access, 2018

A Lightweight Cloud Sharing PHR System With Access Policy Updating.
IEEE Access, 2018

Consortium Blockchain-Based SIFT: Outsourcing Encrypted Feature Extraction in the D2D Network.
IEEE Access, 2018

PUSC: Privacy-Preserving User-Centric Skyline Computation Over Multiple Encrypted Domains.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Privacy-Preserving Biometric-Based Remote User Authentication with Leakage Resilience.
Proceedings of the Security and Privacy in Communication Networks, 2018

Efficient Attribute-Based Encryption with Blackbox Traceability.
Proceedings of the Provable Security, 2018

Achieve Efficient and Privacy-Preserving Medical Primary Diagnosis Based on kNN.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Attacking Network Isolation in Software-Defined Networks: New Attacks and Countermeasures.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Differentially Private Location Protection with Continuous Time Stamps for VANETs.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

PriBioAuth: Privacy-Preserving Biometric-Based Remote User Authentication.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

Privacy-Preserving Mining of Association Rule on Outsourced Cloud Data from Multiple Parties.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
An Efficient Privacy-Preserving Outsourced Computation over Public Data.
IEEE Trans. Services Computing, 2017

VCKSM: Verifiable conjunctive keyword search over mobile e-health cloud in shared multi-owner settings.
Pervasive and Mobile Computing, 2017

Provably secure attribute based signcryption with delegated computation and efficient key updating.
TIIS, 2017

A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks.
IEEE Internet of Things Journal, 2017

VKSE-MO: verifiable keyword search over encrypted data in multi-owner settings.
SCIENCE CHINA Information Sciences, 2017

Efficient Inner Product Encryption with Simulation-Based Security.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

FABSS: Attribute-Based Sanitizable Signature for Flexible Access Structure.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

2016
Privacy-Preserving Patient-Centric Clinical Decision Support System on Naïve Bayesian Classification.
IEEE J. Biomedical and Health Informatics, 2016

Privacy-Preserving Outsourced Calculation on Floating Point Numbers.
IEEE Trans. Information Forensics and Security, 2016

An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys.
IEEE Trans. Information Forensics and Security, 2016

A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains.
IEEE Trans. Computers, 2016

A Provably Secure Aggregate Signature Scheme for Healthcare Wireless Sensor Networks.
J. Medical Systems, 2016

m2-ABKS: Attribute-Based Multi-Keyword Search over Encrypted Personal Health Records in Multi-Owner Setting.
J. Medical Systems, 2016

A key-insulated CP-ABE with key exposure accountability for secure data sharing in the cloud.
TIIS, 2016

PTFA: a secure and privacy-preserving traffic flow analysis scheme for intelligent transportation system.
IJES, 2016

Efficient and privacy-preserving skyline computation framework across domains.
Future Generation Comp. Syst., 2016

Secure, efficient and revocable multi-authority access control system in cloud storage.
Computers & Security, 2016

2015
Provably secure unbounded multi-authority ciphertext-policy attribute-based encryption.
Security and Communication Networks, 2015

Large universe decentralized key-policy attribute-based encryption.
Security and Communication Networks, 2015

A full lifecycle privacy protection scheme for sensitive data in cloud computing.
Peer-to-Peer Networking and Applications, 2015

Attribute Based Multisignature Scheme for Wireless Communications.
Mobile Information Systems, 2015

2014
A Secure Data Self-Destructing Scheme in Cloud Computing.
IEEE Trans. Cloud Computing, 2014

Toward efficient and privacy-preserving computing in big data era.
IEEE Network, 2014

PRIAM: Privacy Preserving Identity and Access Management Scheme in Cloud.
TIIS, 2014

Efficient attribute based sequential aggregate signature for wireless sensor networks.
IJSNet, 2014

Ciphertext-Policy Hierarchical Attribute-based Encryption for Fine-Grained Access Control of Encryption Data.
I. J. Network Security, 2014

Threshold attribute-based encryption with attribute hierarchy for lattices in the standard model.
IET Information Security, 2014

Trustworthy Service Composition in Service-Oriented Mobile Social Networks.
Proceedings of the 2014 IEEE International Conference on Web Services, 2014

SPEMR: A new secure personal electronic medical record scheme with privilege separation.
Proceedings of the IEEE International Conference on Communications, 2014

Key-Policy Weighted Attribute based Encryption for fine-grained access control.
Proceedings of the IEEE International Conference on Communications, 2014

2013
Access control requirements for structured document in cloud computing.
IJGUC, 2013

V-MLR: A Multilevel Security Model for Virtualization.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

A Secure Document Self-Destruction Scheme with Identity Based Encryption.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Efficient Data Integrity Verification Using Attribute Based Multi-signature Scheme in Wireless Network.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Ciphertext-Policy Weighted Attribute Based Encryption for Fine-Grained Access Control.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Fully Secure Decentralized Key-Policy Attribute-Based Encryption.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Personal Health Records Integrity Verification Using Attribute Based Proxy Signature in Cloud Computing.
Proceedings of the Internet and Distributed Computing Systems, 2013

A Secure Document Self-Destruction Scheme: An ABE Approach.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

Attribute Based Multi-signature Scheme in the Standard Model.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

PRAM: privacy preserving access management scheme in cloud services.
Proceedings of the 2013 International Workshop on Security in Cloud Computing, 2013


  Loading...