Joseph K. Liu
Joseph K. Liu
Associate Professor, Faculty of IT, Monash University
Verified email at monash.edu - Homepage
Title
Cited by
Cited by
Year
Linkable spontaneous anonymous group signature for ad hoc groups
JK Liu, VK Wei, DS Wong
Australasian Conference on Information Security and Privacy, 325-335, 2004
3482004
Toward efficient and privacy-preserving computing in big data era
R Lu, H Zhu, X Liu, JK Liu, J Shao
IEEE Network 28 (4), 46-50, 2014
2622014
Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model
JK Liu, MH Au, W Susilo
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
2472007
Malicious KGC attacks in certificateless cryptography
MH Au, Y Mu, J Chen, DS Wong, JK Liu, G Yang
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
2442007
A secure cloud computing based framework for big data information management of smart grid
J Baek, QH Vu, JK Liu, X Huang, Y Xiang
IEEE transactions on cloud computing 3 (2), 233-244, 2014
2222014
Secure sharing of personal health records in cloud computing: ciphertext-policy attribute-based signcryption
J Liu, X Huang, JK Liu
Future Generation Computer Systems 52, 67-76, 2015
1502015
An efficient file hierarchy attribute-based encryption scheme in cloud computing
S Wang, J Zhou, JK Liu, J Yu, J Chen, W Xie
IEEE Transactions on Information Forensics and Security 11 (6), 1265-1277, 2016
1442016
An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing
K Liang, JK Liu, DS Wong, W Susilo
European symposium on research in computer security, 257-272, 2014
1362014
Efficient online/offline identity-based signature for wireless sensor network
JK Liu, J Baek, J Zhou, Y Yang, JW Wong
International Journal of Information Security 9 (4), 287-296, 2010
1362010
Cost-effective authentic and anonymous data sharing with forward security
X Huang, JK Liu, S Tang, Y Xiang, K Liang, L Xu, J Zhou
IEEE Transactions on computers 64 (4), 971-983, 2014
1172014
A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing
K Liang, MH Au, JK Liu, W Susilo, DS Wong, G Yang, TVX Phuong, Q Xie
IEEE Transactions on Information Forensics and Security 9 (10), 1667-1680, 2014
1152014
ID-based ring signature scheme secure in the standard model
MH Au, JK Liu, TH Yuen, DS Wong
International Workshop on Security, 1-16, 2006
1142006
Separable linkable threshold ring signatures
PP Tsang, VK Wei, TK Chan, MH Au, JK Liu, DS Wong
International Conference on Cryptology in India, 384-398, 2004
1122004
Certificate-based signature schemes without pairings or random oracles
JK Liu, J Baek, W Susilo, J Zhou
International Conference on Information Security, 285-297, 2008
1032008
Security concerns in popular cloud storage services
CK Chu, WT Zhu, J Han, JK Liu, J Xu, J Zhou
IEEE Pervasive Computing 12 (4), 50-57, 2013
1022013
A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing
K Liang, MH Au, JK Liu, W Susilo, DS Wong, G Yang, Y Yu, A Yang
Future Generation Computer Systems 52, 95-108, 2015
1002015
Ring signatures without random oracles
SSM Chow, VK Wei, JK Liu, TH Yuen
Proceedings of the 2006 ACM Symposium on Information, computer and …, 2006
982006
Certificate based (linkable) ring signature
MH Au, JK Liu, W Susilo, TH Yuen
International Conference on Information Security Practice and Experience, 79-92, 2007
972007
Fine-grained two-factor access control for web-based cloud computing services
JK Liu, MH Au, X Huang, R Lu, J Li
IEEE Transactions on Information Forensics and Security 11 (3), 484-497, 2015
952015
A new payment system for enhancing location privacy of electric vehicles
MH Au, JK Liu, J Fang, ZL Jiang, W Susilo, J Zhou
IEEE transactions on vehicular technology 63 (1), 3-18, 2013
93*2013
The system can't perform the operation now. Try again later.
Articles 1–20