Dongxi Liu
Cited by
Cited by
Towards automatic model synchronization from model transformations
Y Xiong, D Liu, Z Hu, H Zhao, M Takeichi, H Mei
Proceedings of the twenty-second IEEE/ACM international conference on …, 2007
Programmable order-preserving secure index for encrypted database query
D Liu, S Wang
Cloud Computing (CLOUD), 2012 IEEE 5th International Conference on, 502-509, 2012
Lightweight Mutual Authentication for IoT and Its Applications
N Li, D Liu, S Nepal
IEEE Transactions on Sustainable Computing, 2017
Nonlinear order preserving index for encrypted database query in service cloud environments
D Liu, S Wang
Concurrency and Computation: Practice and Experience 25 (13), 1967-1984, 2013
Privacy of outsourced k-means clustering
D Liu, E Bertino, X Yi
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
Result Pattern Hiding Searchable Encryption for Conjunctive Queries
S Lai, S Patranabis, A Sakzad, JK Liu, D Mukhopadhyay, R Steinfeld, ...
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
Bidirectional interpretation of XQuery
D Liu, Z Hu, M Takeichi
Proceedings of the 2007 ACM SIGPLAN symposium on Partial evaluation and …, 2007
Semantic based aspect-oriented programming for context-aware Web service composition
L Li, D Liu, A Bouguettaya
Information Systems 36 (3), 551-564, 2011
Short lattice-based one-out-of-many proofs and applications to ring signatures
MF Esgin, R Steinfeld, A Sakzad, JK Liu, D Liu
International Conference on Applied Cryptography and Network Security, 67-88, 2019
Privacy-Preserving and Outsourced Multi-User k-Means Clustering
FY Rao, BK Samanthula, E Bertino, X Yi, D Liu
2015 IEEE Conference on Collaboration and Internet Computing (CIC), 80-89, 2015
Practical Fully Homomorphic Encryption without Noise Reduction.
D Liu
IACR Cryptology ePrint Archive 2015, 468, 2015
Homomorphic encryption for database querying
D Liu
US Patent 20,150,295,716, 2015
Lattice-based Zero-Knowledge Proofs: New Techniques for Shorter and Faster Constructions and Applications.
MF Esgin, R Steinfeld, JK Liu, D Liu
IACR Cryptology ePrint Archive 2019, 445, 2019
Monero Ring Attack: Recreating Zero Mixin Transaction Effect
DA Wijaya, J Liu, R Steinfeld, D Liu
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
Cloud#: A specification language for modeling cloud
D Liu, J Zic
Cloud Computing (CLOUD), 2011 IEEE International Conference on, 533-540, 2011
Privacy Preserving Location-Aware Personalized Web Service Recommendations
S Badsha, X Yi, I Khalil, D Liu, S Nepal, E Bertino, KY Lam
IEEE Transactions on Services Computing, 2018
A mobile and portable trusted computing platform
S Nepal, J Zic, D Liu, J Jang
EURASIP Journal on Wireless Communications and Networking 2011 (1), 1-19, 2011
A cloud architecture of virtual trusted platform modules
D Liu, J Lee, J Jang, S Nepal, J Zic
Embedded and Ubiquitous Computing (EUC), 2010 IEEE/IFIP 8th International …, 2010
Traceable Monero: Anonymous Cryptocurrency with Enhanced Accountability
Y Li, G Yang, W Susilo, Y Yu, MH Au, D Liu
IEEE Transactions on Dependable and Secure Computing, 2019
Unified Fine-grained Access Control for Personal Health Records in Cloud Computing
W Li, BM Liu, D Liu, RP Liu, P Wang, S Luo, W Ni
IEEE journal of biomedical and health informatics, 2018
The system can't perform the operation now. Try again later.
Articles 1–20