University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Items where Author is "Liang, K"

Up a level
Export as [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 43.

Article

Zuo, Cong, Liang, Kaitai, Jiang, Zoe L, Shao, Jun and Fang, Junbin (2017) Cost-effective privacy-preserving vehicular urban sensing system Personal and Ubiquitous Computing, 21 (5). pp. 893-901.

Jiang, Peng, Guo, Fuchun, Liang, Kaitai, Lai, Jianchang and Wen, Qiaoyan (2017) Searchain: Blockchain-based Private Keyword Search in Decentralized Storage Future Generation Computer Systems.

Ning, Jianting, Cao, Zhenfu, Dong, Xiaolei, Liang, Kaitai, Ma, Hui and Wei, Lifei (2017) Auditable σ-Times Outsourced Attribute-Based Encryption for Access Control in Cloud Computing IEEE Transactions on Information Forensics and Security (99).

Zhou, Junwei, Duan, Hui, Liang, Kaitai, Yan, Qiao, Chen, Fei, Yu, F. Richard, Wu, Jieming and Chen, Jianyong (2017) Securing Outsourced Data in the Multi-Authority Cloud with Fine-Grained Access Control and Efficient Attribute Revocation The Computer Journal,, 60 (8). pp. 1210-1222.

Zhang, Peng, Chen, Zehong, Liu, Joseph K, Liang, Kaitai and Liu, Hongwei (2016) An efficient access control scheme with outsourcing capability and attribute update for fog computing Future Generation Computer Systems, 78 (2). pp. 753-762.

Phuong, Tran Viet Xuan, Yang, Guomin, Susilo, Willy and Liang, Kaitai (2016) Edit Distance Based Encryption and Its Application ACISP: Australasian Conference on Information Security and Privacy, 2. pp. 103-119.

Liang, Kaitai, Huang, Xinyi, Guo, Fuchun and Liu, Joseph K (2016) Privacy-Preserving and Regular Language Search Over Encrypted Cloud Data IEEE Trans. Information Forensics and Security, 11 (10). pp. 2365-2376.

Wang, Shulan, Liang, Kaitai, Liu, Joseph K, Chen, Jianyong, Yu, Jianping and Xie, Weixin (2016) Attribute-Based Data Sharing Scheme Revisited in Cloud Computing IEEE Trans. Information Forensics and Security, 11 (8). pp. 1661-1673.

Wei, Jiannan, Yang, Guomin, Mu, Yi and Liang, Kaitai (2015) Anonymous Proxy Signature with Hierarchical Traceability Computer Journal, 59 (4). pp. 559-569.

Liu, Joseph K, Liang, Kaitai, Susilo, Willy, Liu, Jianghua and Xiang, Yang (2015) Two-Factor Data Security Protection Mechanism for Cloud Storage System IEEE Transactions on Computers, 65 (6). pp. 1992-2004.

Liang, Kaitai, Susilo, Willy, Liu, Joseph K and Wong, Duncan S (2015) Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption Computer Journal Section D: Security in Computer Systems and Networks, 58 (10). pp. 2778-2792.

Shao, Jun, Lu, Rongxing, Lin, Xiaodong and Liang, Kaitai (2015) Secure bidirectional proxy re-encryption for cryptographic cloud storage Pervasive and Mobile Computing, 28. pp. 113-121.

Liang, Kaitai and Susilo, Willy (2015) Searchable Attribute-Based Mechanism With Efficient Data Sharing for Secure Cloud Storage IEEE Transactions on Information Forensics and Security, 10 (9). pp. 1981-1992.

Gritti, Clémentine, Susilo, Willy, Plantard, Thomas, Liang, Kaitai and Wong, Duncan S (2015) Broadcast encryption with dealership International Journal of Information Security, 15 (3). pp. 271-283.

Liang, Kaitai, Susilo, Willy and Liu, Joseph K (2015) Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage IEEE Transactions Information Forensics and Security, 10 (8). pp. 1578-1589.

Yang, Anjia, Liang, Kaitai, Zhuang, Yunhui, Wong, Duncan S and Jia, Xiaohua (2015) A new unpredictability-based radio frequency identification forward privacy model and a provably secure construction Security and Communication Networks, 8 (16). pp. 2836-2849.

Liu, Joseph K, Au, Man Ho, Susilo, Willy, Liang, Kaitai, Lu, Rongxing and Srinivasan, Bala (2015) Secure sharing and searching for real-time video data in mobile cloud IEEE Network, 29 (2). pp. 46-50.

Liang, Kaitai, Au, Man Ho, Liu, Joseph K and Susilo, Willy (2014) A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing Future Generation Computer Systems, 52. pp. 95-108.

Liang, Kaitai, Fang, Liming, Wong, Duncan S and Susilo, Willy (2014) A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds Concurrency and Computation: Practice and Experience, 27 (8). pp. 2004-2027.

Liang, Kaitai, Liu, Joseph K, Lu, Rongxing and Wong, Duncan S (2014) Privacy Concerns for Photo Sharing in Online Social Networks IEEE Internet Computing, 19 (2). pp. 58-63.

Liang, Kaitai, Au, Man Ho, Liu, Joseph K, Susilo, Willy, Wong, Duncan S, Yang, Guomin, Phuong, Tran Viet Xuan and Xie, Qi (2014) A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing IEEE Transactions on Information Forensics and Security, 9 (10). pp. 1667-1680.

Liang, Kaitai, Chu, Cheng-Kang, Tan, Xiao, Wong, Duncan S, Tang, Chunming and Zhou, Jianying (2014) Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts Theoretical Computer Science, 539. pp. 87-105.

Liang, Kaitai, Liu, Joseph K, Wong, Duncan S and Susilo, Willy (2014) An Efficient Cloud-based Revocable Identity-based Proxy Re-encryption Scheme for Public Clouds Data Sharing IACR Cryptology ePrint Archive 2014 (473).

Liang, K, Liu, Y, Liu, Q, Zhao, L, Yang, K and Sun, Z (2014) Enhanced IEEE 802.11 MAC Protocol for Precision Formation Flying-Based Distributed Spacecraft Wireless Personal Communications, 79 (1). pp. 375-388.

Huang, Xinyi, Liu, Joseph K, Tang, Shaohua, Xiang, Yang, Liang, Kaitai, Xu, Li and Zhou, Jianying (2014) Cost-Effective Authentic and Anonymous Data Sharing with Forward Security IEEE Transactions on Computers, 64 (4). pp. 971-983.

Gritti, Clémentine, Susilo, Willy, Plantard, Thomas, Liang, Kaitai and Wong, Duncan S (2014) Empowering Personal Health Records with Cloud Computing: How to encrypt with forthcoming fine-grained policies efficiently Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 5 (4). pp. 3-28.

Book Section

Meng, Ru, Zhou, Yanwei, Ning, Jianting, Liang, Kaitai, Han, Jinguang and Susilo, Willy (2017) An Efficient Key-Policy Attribute-Based Searchable Encryption in Prime-Order Groups (11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings) In: Provable Security. Springer International Publishing AG. Part of Springer Nature, pp. 39-56. ISBN 978-3-319-68636-3

Conference or Workshop Item

Tian, Yangguang, Yang, Guomin, Mu, Yi, Liang, Kaitai and Yu, Yong (2016) One-Round Attribute-Based Key Exchange in the Multi-party Setting In: 10th International Conference, ProvSec 2016, November 10-11, 2016, Nanjing, China.

Lin, Chao, Zhu, Fei, Wu, Wei, Liang, Kaitai and Choo, Kim-Kwang Raymond (2016) A New Transitive Signature Scheme In: NSS 2017 International Conference on Network and System Security, 28-30 September, Taipei, Taiwan.

Au, Man Ho, Liang, Kaitai, Liu, Joseph K and Lu, Rongxing (2016) While Mobile Encounters with Clouds In: 10th International Conference on Network and System Security, Proceedings, 28-30 September, Taipei, Taiwan.

Liu, Weiran, Liu, Jianwei, Wu, Qianhong, Qin, Bo, Liang, Kaitai and Meadows, C. (2016) Online/Offline Public-Index Predicate Encryption for Fine-Grained Mobile Access Control In: European Symposium on Research in Computer Security ESORICS 2016: Computer Security – ESORICS 2016, September 26-30, 2016,, Heraklion, Greece.

Zhang, Peng, Chen, Zehong, Liang, Kaitai, Wang, C and Wang, Ting (2016) A Cloud-Based Access Control Scheme with User Revocation and Attribute Update In: 21st Australasian Conference on Information Security and Privacy, 4-6 July, Melbourne, VIC, Australia.

Liang, Kaitai, Miyaji, Atsuko and Su, Chunhua (2016) Secure and Traceable Framework for Data Circulation In: ACISP 2016 - 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, 4-6 July, Melbourne, VIC, Australia.

Lai, Shangqi, Liu, Joseph K, Choo, Kim-Kwang Raymond and Liang, Kaitai (2016) Secret Picture: An Efficient Tool for Mitigating Deletion Delay on OSN In: International Conference on Information and Communications Security, 9-11 December 2015, Beijing, China.

Liang, Kaitai, Su, Chunhua, Chen, Jiageng and Liu, Joseph K (2016) Efficient Multi-Function Data Sharing and Searching Mechanism for Cloud-Based Encrypted Data In: ASIA CCS '16: 11th ACM on Asia Conference on Computer and Communications Security, May 30 - June 03, 2016, Xi'an, China.

Luo, Chu, Fylakis, Angelos, Partala, Juha, Klakegg, Simon, Gonçalves, Jorge, Liang, Kaitai, Seppänen, Tapio and Kostakos, Vassilis (2016) A data hiding approach for sensitive smartphone data In: UbiComp2016 - 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, Sep. 12-16, Heidelberg, Germany.

Yang, Yanjiang, Liu, Joseph K, Liang, Kaitai, Choo, Kim-Kwang Raymond and Zhou, Jianying (2015) Computer Security -- ESORICS 2015 In: 20th European Symposium on Research in Computer Security, September 21-25, 2015, Vienna, Austria.

Liang, Kaitai, Au, Man Ho, Susilo, Willy, Wong, Duncan S, Yang, Guomin and Yu, Yong (2014) An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data Sharing In: International Conference on Information Security Practice and Experience, 5-8 May 2014, Fuzhou, China.

Liang, Kaitai, Fang, Liming, Susilo, Willy and Wong, Duncan S. (2013) A Ciphertext-Policy Attribute-Based Proxy Re-encryption with Chosen-Ciphertext Security In: 5th International Conference on Intelligent Networking and Collaborative Systems (INCoS), 2013, 9-11 Sept. 2013, Xi'an, China.

Liang, Kaitai, Huang, Qiong, Schlegel, Roman, Wong, Duncan S. and Tang, Chunming (2013) A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release In: ISPEC 2013: 9th International Conference on Information Security Practice and Experience, 12-24 May 2013, Lanzhou, China.

Liang, Kaitai, Fang, Liming, Susilo, Willy and Wong, Duncan S (2013) A Ciphertext-Policy Attribute-Based Proxy Re-encryption with Chosen-Ciphertext Security In: 5-th INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCoS-2013), SEPTEMBER 9 - 11, 2013, XI`AN, CHINA.

Liang, Kaitai, Huang, Qiong, Schlegel, Roman, Wong, Duncan S and Tang, Chunming (2013) A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release In: (ISPEC'13) 9th Information Security Practice & Experience Conference, 12-14 May 2013, Lanzhou, China.

Liang, Kaitai, Liu, Joseph K., Wong, Duncan S. and Susilo, Willy An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing In: 19th European Symposium on Research in Computer Security- ESORICS 2014, 7-11 Sept 2014., Wroclaw, Poland.

This list was generated on Fri Nov 24 04:40:22 2017 UTC.

Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800