University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Items where Author is "Liang, K"

Up a level
Export as [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 43.

Article

Zuo, Cong, Liang, Kaitai, Jiang, Zoe L, Shao, Jun and Fang, Junbin (2017) Cost-effective privacy-preserving vehicular urban sensing system Personal and Ubiquitous Computing, 21 (5). pp. 893-901.

Jiang, Peng, Guo, Fuchun, Liang, Kaitai, Lai, Jianchang and Wen, Qiaoyan (2017) Searchain: Blockchain-based Private Keyword Search in Decentralized Storage Future Generation Computer Systems.

Ning, Jianting, Cao, Zhenfu, Dong, Xiaolei, Liang, Kaitai, Ma, Hui and Wei, Lifei (2017) Auditable σ-Times Outsourced Attribute-Based Encryption for Access Control in Cloud Computing IEEE Transactions on Information Forensics and Security, 13 (1). pp. 94-105.

Zhou, Junwei, Duan, Hui, Liang, Kaitai, Yan, Qiao, Chen, Fei, Yu, F. Richard, Wu, Jieming and Chen, Jianyong (2017) Securing Outsourced Data in the Multi-Authority Cloud with Fine-Grained Access Control and Efficient Attribute Revocation The Computer Journal,, 60 (8). pp. 1210-1222.

Zhang, Peng, Chen, Zehong, Liu, Joseph K, Liang, Kaitai and Liu, Hongwei (2016) An efficient access control scheme with outsourcing capability and attribute update for fog computing Future Generation Computer Systems, 78 (2). pp. 753-762.

Phuong, Tran Viet Xuan, Yang, Guomin, Susilo, Willy and Liang, Kaitai (2016) Edit Distance Based Encryption and Its Application ACISP: Australasian Conference on Information Security and Privacy, 2. pp. 103-119.

Liang, Kaitai, Huang, Xinyi, Guo, Fuchun and Liu, Joseph K (2016) Privacy-Preserving and Regular Language Search Over Encrypted Cloud Data IEEE Trans. Information Forensics and Security, 11 (10). pp. 2365-2376.

Wang, Shulan, Liang, Kaitai, Liu, Joseph K, Chen, Jianyong, Yu, Jianping and Xie, Weixin (2016) Attribute-Based Data Sharing Scheme Revisited in Cloud Computing IEEE Trans. Information Forensics and Security, 11 (8). pp. 1661-1673.

Wei, Jiannan, Yang, Guomin, Mu, Yi and Liang, Kaitai (2015) Anonymous Proxy Signature with Hierarchical Traceability Computer Journal, 59 (4). pp. 559-569.

Liu, Joseph K, Liang, Kaitai, Susilo, Willy, Liu, Jianghua and Xiang, Yang (2015) Two-Factor Data Security Protection Mechanism for Cloud Storage System IEEE Transactions on Computers, 65 (6). pp. 1992-2004.

Liang, Kaitai, Susilo, Willy, Liu, Joseph K and Wong, Duncan S (2015) Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption Computer Journal Section D: Security in Computer Systems and Networks, 58 (10). pp. 2778-2792.

Shao, Jun, Lu, Rongxing, Lin, Xiaodong and Liang, Kaitai (2015) Secure bidirectional proxy re-encryption for cryptographic cloud storage Pervasive and Mobile Computing, 28. pp. 113-121.

Liang, Kaitai and Susilo, Willy (2015) Searchable Attribute-Based Mechanism With Efficient Data Sharing for Secure Cloud Storage IEEE Transactions on Information Forensics and Security, 10 (9). pp. 1981-1992.

Gritti, Clémentine, Susilo, Willy, Plantard, Thomas, Liang, Kaitai and Wong, Duncan S (2015) Broadcast encryption with dealership International Journal of Information Security, 15 (3). pp. 271-283.

Liang, Kaitai, Susilo, Willy and Liu, Joseph K (2015) Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage IEEE Transactions Information Forensics and Security, 10 (8). pp. 1578-1589.

Yang, Anjia, Liang, Kaitai, Zhuang, Yunhui, Wong, Duncan S and Jia, Xiaohua (2015) A new unpredictability-based radio frequency identification forward privacy model and a provably secure construction Security and Communication Networks, 8 (16). pp. 2836-2849.

Liu, Joseph K, Au, Man Ho, Susilo, Willy, Liang, Kaitai, Lu, Rongxing and Srinivasan, Bala (2015) Secure sharing and searching for real-time video data in mobile cloud IEEE Network, 29 (2). pp. 46-50.

Liang, Kaitai, Au, Man Ho, Liu, Joseph K and Susilo, Willy (2014) A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing Future Generation Computer Systems, 52. pp. 95-108.

Liang, Kaitai, Fang, Liming, Wong, Duncan S and Susilo, Willy (2014) A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds Concurrency and Computation: Practice and Experience, 27 (8). pp. 2004-2027.

Liang, Kaitai, Liu, Joseph K, Lu, Rongxing and Wong, Duncan S (2014) Privacy Concerns for Photo Sharing in Online Social Networks IEEE Internet Computing, 19 (2). pp. 58-63.

Liang, Kaitai, Au, Man Ho, Liu, Joseph K, Susilo, Willy, Wong, Duncan S, Yang, Guomin, Phuong, Tran Viet Xuan and Xie, Qi (2014) A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing IEEE Transactions on Information Forensics and Security, 9 (10). pp. 1667-1680.

Liang, Kaitai, Chu, Cheng-Kang, Tan, Xiao, Wong, Duncan S, Tang, Chunming and Zhou, Jianying (2014) Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts Theoretical Computer Science, 539. pp. 87-105.

Liang, Kaitai, Liu, Joseph K, Wong, Duncan S and Susilo, Willy (2014) An Efficient Cloud-based Revocable Identity-based Proxy Re-encryption Scheme for Public Clouds Data Sharing IACR Cryptology ePrint Archive 2014 (473).

Liang, K, Liu, Y, Liu, Q, Zhao, L, Yang, K and Sun, Z (2014) Enhanced IEEE 802.11 MAC Protocol for Precision Formation Flying-Based Distributed Spacecraft Wireless Personal Communications, 79 (1). pp. 375-388.

Huang, Xinyi, Liu, Joseph K, Tang, Shaohua, Xiang, Yang, Liang, Kaitai, Xu, Li and Zhou, Jianying (2014) Cost-Effective Authentic and Anonymous Data Sharing with Forward Security IEEE Transactions on Computers, 64 (4). pp. 971-983.

Gritti, Clémentine, Susilo, Willy, Plantard, Thomas, Liang, Kaitai and Wong, Duncan S (2014) Empowering Personal Health Records with Cloud Computing: How to encrypt with forthcoming fine-grained policies efficiently Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 5 (4). pp. 3-28.

Book Section

Meng, Ru, Zhou, Yanwei, Ning, Jianting, Liang, Kaitai, Han, Jinguang and Susilo, Willy (2017) An Efficient Key-Policy Attribute-Based Searchable Encryption in Prime-Order Groups (11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings) In: Provable Security. LNCS, 10592 (10592). Springer International Publishing AG. Part of Springer Nature, pp. 39-56. ISBN 978-3-319-68636-3

Conference or Workshop Item

Tian, Yangguang, Yang, Guomin, Mu, Yi, Liang, Kaitai and Yu, Yong (2016) One-Round Attribute-Based Key Exchange in the Multi-party Setting In: 10th International Conference, ProvSec 2016, November 10-11, 2016, Nanjing, China.

Lin, Chao, Zhu, Fei, Wu, Wei, Liang, Kaitai and Choo, Kim-Kwang Raymond (2016) A New Transitive Signature Scheme In: NSS 2017 International Conference on Network and System Security, 28-30 September, Taipei, Taiwan.

Au, Man Ho, Liang, Kaitai, Liu, Joseph K and Lu, Rongxing (2016) While Mobile Encounters with Clouds In: 10th International Conference on Network and System Security, Proceedings, 28-30 September, Taipei, Taiwan.

Liu, Weiran, Liu, Jianwei, Wu, Qianhong, Qin, Bo, Liang, Kaitai and Meadows, C. (2016) Online/Offline Public-Index Predicate Encryption for Fine-Grained Mobile Access Control In: European Symposium on Research in Computer Security ESORICS 2016: Computer Security – ESORICS 2016, September 26-30, 2016,, Heraklion, Greece.

Zhang, Peng, Chen, Zehong, Liang, Kaitai, Wang, C and Wang, Ting (2016) A Cloud-Based Access Control Scheme with User Revocation and Attribute Update In: 21st Australasian Conference on Information Security and Privacy, 4-6 July, Melbourne, VIC, Australia.

Liang, Kaitai, Miyaji, Atsuko and Su, Chunhua (2016) Secure and Traceable Framework for Data Circulation In: ACISP 2016 - 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, 4-6 July, Melbourne, VIC, Australia.

Lai, Shangqi, Liu, Joseph K, Choo, Kim-Kwang Raymond and Liang, Kaitai (2016) Secret Picture: An Efficient Tool for Mitigating Deletion Delay on OSN In: International Conference on Information and Communications Security, 9-11 December 2015, Beijing, China.

Liang, Kaitai, Su, Chunhua, Chen, Jiageng and Liu, Joseph K (2016) Efficient Multi-Function Data Sharing and Searching Mechanism for Cloud-Based Encrypted Data In: ASIA CCS '16: 11th ACM on Asia Conference on Computer and Communications Security, May 30 - June 03, 2016, Xi'an, China.

Luo, Chu, Fylakis, Angelos, Partala, Juha, Klakegg, Simon, Gonçalves, Jorge, Liang, Kaitai, Seppänen, Tapio and Kostakos, Vassilis (2016) A data hiding approach for sensitive smartphone data In: UbiComp2016 - 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, Sep. 12-16, Heidelberg, Germany.

Yang, Yanjiang, Liu, Joseph K, Liang, Kaitai, Choo, Kim-Kwang Raymond and Zhou, Jianying (2015) Computer Security -- ESORICS 2015 In: 20th European Symposium on Research in Computer Security, September 21-25, 2015, Vienna, Austria.

Liang, Kaitai, Au, Man Ho, Susilo, Willy, Wong, Duncan S, Yang, Guomin and Yu, Yong (2014) An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data Sharing In: International Conference on Information Security Practice and Experience, 5-8 May 2014, Fuzhou, China.

Liang, Kaitai, Fang, Liming, Susilo, Willy and Wong, Duncan S. (2013) A Ciphertext-Policy Attribute-Based Proxy Re-encryption with Chosen-Ciphertext Security In: 5th International Conference on Intelligent Networking and Collaborative Systems (INCoS), 2013, 9-11 Sept. 2013, Xi'an, China.

Liang, Kaitai, Huang, Qiong, Schlegel, Roman, Wong, Duncan S. and Tang, Chunming (2013) A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release In: ISPEC 2013: 9th International Conference on Information Security Practice and Experience, 12-24 May 2013, Lanzhou, China.

Liang, Kaitai, Fang, Liming, Susilo, Willy and Wong, Duncan S (2013) A Ciphertext-Policy Attribute-Based Proxy Re-encryption with Chosen-Ciphertext Security In: 5-th INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCoS-2013), SEPTEMBER 9 - 11, 2013, XI`AN, CHINA.

Liang, Kaitai, Huang, Qiong, Schlegel, Roman, Wong, Duncan S and Tang, Chunming (2013) A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release In: (ISPEC'13) 9th Information Security Practice & Experience Conference, 12-14 May 2013, Lanzhou, China.

Liang, Kaitai, Liu, Joseph K., Wong, Duncan S. and Susilo, Willy An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing In: 19th European Symposium on Research in Computer Security- ESORICS 2014, 7-11 Sept 2014., Wroclaw, Poland.

This list was generated on Fri Jun 22 23:47:42 2018 UTC.

Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800