Joseph K. Liu
Joseph K. Liu
Associate Professor, Faculty of IT, Monash University
Verified email at - Homepage
TitleCited byYear
Linkable spontaneous anonymous group signature for ad hoc groups
JK Liu, VK Wei, DS Wong
Australasian Conference on Information Security and Privacy, 325-335, 2004
Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model
JK Liu, MH Au, W Susilo
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
Malicious KGC attacks in certificateless cryptography
MH Au, Y Mu, J Chen, DS Wong, JK Liu, G Yang
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
Toward efficient and privacy-preserving computing in big data era
R Lu, H Zhu, X Liu, JK Liu, J Shao
IEEE Network 28 (4), 46-50, 2014
A secure cloud computing based framework for big data information management of smart grid
J Baek, QH Vu, JK Liu, X Huang, Y Xiang
IEEE transactions on cloud computing 3 (2), 233-244, 2014
Secure sharing of personal health records in cloud computing: ciphertext-policy attribute-based signcryption
J Liu, X Huang, JK Liu
Future Generation Computer Systems 52, 67-76, 2015
Efficient online/offline identity-based signature for wireless sensor network
JK Liu, J Baek, J Zhou, Y Yang, JW Wong
International Journal of Information Security 9 (4), 287-296, 2010
An efficient file hierarchy attribute-based encryption scheme in cloud computing
S Wang, J Zhou, JK Liu, J Yu, J Chen, W Xie
IEEE Transactions on Information Forensics and Security 11 (6), 1265-1277, 2016
ID-based ring signature scheme secure in the standard model
MH Au, JK Liu, TH Yuen, DS Wong
International Workshop on Security, 1-16, 2006
Separable linkable threshold ring signatures
PP Tsang, VK Wei, TK Chan, MH Au, JK Liu, DS Wong
International Conference on Cryptology in India, 384-398, 2004
An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing
K Liang, JK Liu, DS Wong, W Susilo
European Symposium on Research in Computer Security, 257-272, 2014
Certificate-based signature schemes without pairings or random oracles
JK Liu, J Baek, W Susilo, J Zhou
International Conference on Information Security, 285-297, 2008
Cost-effective authentic and anonymous data sharing with forward security
X Huang, JK Liu, S Tang, Y Xiang, K Liang, L Xu, J Zhou
IEEE Transactions on computers 64 (4), 971-983, 2014
Ring signatures without random oracles
SSM Chow, VK Wei, JK Liu, TH Yuen
Proceedings of the 2006 ACM Symposium on Information, computer and …, 2006
Certificate based (linkable) ring signature
MH Au, JK Liu, W Susilo, TH Yuen
International Conference on Information Security Practice and Experience, 79-92, 2007
A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing
K Liang, MH Au, JK Liu, W Susilo, DS Wong, G Yang, TVX Phuong, Q Xie
IEEE Transactions on Information Forensics and Security 9 (10), 1667-1680, 2014
A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing
K Liang, MH Au, JK Liu, W Susilo, DS Wong, G Yang, Y Yu, A Yang
Future Generation Computer Systems 52, 95-108, 2015
Extended proxy-assisted approach: achieving revocable fine-grained encryption of cloud data
Y Yang, JK Liu, K Liang, KKR Choo, J Zhou
European symposium on research in computer security, 146-166, 2015
A new payment system for enhancing location privacy of electric vehicles
MH Au, JK Liu, J Fang, ZL Jiang, W Susilo, J Zhou
IEEE transactions on vehicular technology 63 (1), 3-18, 2013
Fine-grained two-factor access control for web-based cloud computing services
JK Liu, MH Au, X Huang, R Lu, J Li
IEEE Transactions on Information Forensics and Security 11 (3), 484-497, 2015
The system can't perform the operation now. Try again later.
Articles 1–20