Dr. Kaitai Liang
Dr. Kaitai Liang
Department of Computer Science, Surrey Centre for Cyber Security, University of Surrey
Verified email at surrey.ac.uk
TitleCited byYear
A Ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security
K Liang, L Fang, W Susilo, DS Wong
2013 5th International Conference on Intelligent Networking and …, 2013
2812013
An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing
K Liang, JK Liu, DS Wong, W Susilo
European Symposium on Research in Computer Security, 257-272, 2014
1182014
Cost-effective authentic and anonymous data sharing with forward security
X Huang, JK Liu, S Tang, Y Xiang, K Liang, L Xu, J Zhou
IEEE Transactions on computers 64 (4), 971-983, 2014
1082014
A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing
K Liang, MH Au, JK Liu, W Susilo, DS Wong, G Yang, TVX Phuong, Q Xie
IEEE Transactions on Information Forensics and Security 9 (10), 1667-1680, 2014
1042014
Searchable attribute-based mechanism with efficient data sharing for secure cloud storage
K Liang, W Susilo
IEEE Transactions on Information Forensics and Security 10 (9), 1981-1992, 2015
1012015
A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing
K Liang, MH Au, JK Liu, W Susilo, DS Wong, G Yang, Y Yu, A Yang
Future Generation Computer Systems 52, 95-108, 2015
892015
Extended proxy-assisted approach: achieving revocable fine-grained encryption of cloud data
Y Yang, JK Liu, K Liang, KKR Choo, J Zhou
European symposium on research in computer security, 146-166, 2015
832015
Attribute-based data sharing scheme revisited in cloud computing
S Wang, K Liang, JK Liu, J Chen, J Yu, W Xie
IEEE Transactions on Information Forensics and Security 11 (8), 1661-1673, 2016
762016
Privacy-preserving ciphertext multi-sharing control for big data storage
K Liang, W Susilo, JK Liu
IEEE transactions on information forensics and security 10 (8), 1578-1589, 2015
762015
Two-factor data security protection mechanism for cloud storage system
JK Liu, K Liang, W Susilo, J Liu, Y Xiang
IEEE Transactions on Computers 65 (6), 1992-2004, 2015
562015
Secure sharing and searching for real-time video data in mobile cloud
JK Liu, MH Au, W Susilo, K Liang, R Lu, B Srinivasan
IEEE Network 29 (2), 46-50, 2015
552015
An efficient access control scheme with outsourcing capability and attribute update for fog computing
P Zhang, Z Chen, JK Liu, K Liang, H Liu
Future Generation Computer Systems 78, 753-762, 2018
542018
Auditable -Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing
J Ning, Z Cao, X Dong, K Liang, H Ma, L Wei
IEEE Transactions on Information Forensics and Security 13 (1), 94-105, 2017
532017
A CCA-secure identity-based conditional proxy re-encryption without random oracles
K Liang, Z Liu, X Tan, DS Wong, C Tang
International Conference on Information Security and Cryptology, 231-246, 2012
472012
Privacy concerns for photo sharing in online social networks
K Liang, JK Liu, R Lu, DS Wong
IEEE Internet Computing 19 (2), 58-63, 2014
372014
Privacy-preserving and regular language search over encrypted cloud data
K Liang, X Huang, F Guo, JK Liu
IEEE Transactions on Information Forensics and Security 11 (10), 2365-2376, 2016
332016
Certificateless public key authenticated encryption with keyword search for industrial internet of things
D He, M Ma, S Zeadally, N Kumar, K Liang
IEEE Transactions on Industrial Informatics 14 (8), 3618-3627, 2017
302017
Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts
K Liang, CK Chu, X Tan, DS Wong, C Tang, J Zhou
Theoretical Computer Science 539, 87-105, 2014
282014
A conditional proxy broadcast re-encryption scheme supporting timed-release
K Liang, Q Huang, R Schlegel, DS Wong, C Tang
International Conference on Information Security Practice and Experience …, 2013
282013
Searchain: Blockchain-based private keyword search in decentralized storage
P Jiang, F Guo, K Liang, J Lai, Q Wen
Future Generation Computer Systems, 2017
272017
The system can't perform the operation now. Try again later.
Articles 1–20