Qin Liu
Qin Liu
Assistant Professor of Hunan University, China
Verified email at hnu.edu.cn - Homepage
Cited by
Cited by
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
G Wang, Q Liu, J Wu
Proceedings of the 17th ACM conference on Computer and communications …, 2010
Reviews of evidence regarding interventions to reduce tobacco use and exposure to environmental tobacco smoke
DP Hopkins, PA Briss, CJ Ricard, CG Husten, VG Carande-Kulis, ...
American journal of preventive medicine 20 (2), 16-66, 2001
Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers
G Wang, Q Liu, J Wu, M Guo
computers & security 30 (5), 320-331, 2011
Time-based proxy re-encryption scheme for secure data sharing in a cloud environment
Q Liu, G Wang, J Wu
Information sciences 258, 355-370, 2014
Secure and privacy preserving keyword searching for cloud storage services
Q Liu, G Wang, J Wu
Journal of network and computer applications 35 (3), 927-933, 2012
An efficient privacy preserving keyword search scheme in cloud computing
Q Liu, G Wang, J Wu
2009 International Conference on Computational Science and Engineering 2 …, 2009
Enhanced location privacy preserving scheme in location-based services
T Peng, Q Liu, G Wang
IEEE Systems Journal 11 (1), 219-230, 2014
Efficient information retrieval for ranked queries in cost-effective cloud environments
Q Liu, CC Tan, J Wu, G Wang
2012 Proceedings IEEE INFOCOM, 2581-2585, 2012
Reliable re-encryption in unreliable clouds
Q Liu, CC Tan, J Wu, G Wang
2011 IEEE Global Telecommunications Conference-GLOBECOM 2011, 1-5, 2011
A secure self-destructing scheme for electronic data
G Wang, F Yue, Q Liu
Journal of Computer and System Sciences 79 (2), 279-290, 2013
Achieving fine‐grained access control for secure data sharing on cloud servers
G Wang, Q Liu, J Wu
Concurrency and Computation: Practice and Experience 23 (12), 1443-1464, 2011
Cooperative private searching in clouds
Q Liu, CC Tan, J Wu, G Wang
Journal of Parallel and Distributed Computing 72 (8), 1019-1031, 2012
Efficient sharing of secure cloud storage services
Q Liu, G Wang, J Wu
2010 10th IEEE International Conference on Computer and Information …, 2010
Consistency as a service: Auditing cloud consistency
Q Liu, G Wang, J Wu
IEEE Transactions on Network and Service Management 11 (1), 25-35, 2014
Towards differential query services in cost-efficient clouds
Q Liu, CC Tan, J Wu, G Wang
IEEE Transactions on parallel and Distributed Systems 25 (6), 1648-1658, 2013
Outsourcing privacy-preserving social networks to a cloud
G Wang, Q Liu, F Li, S Yang, J Wu
2013 Proceedings IEEE INFOCOM, 2886-2894, 2013
Effects of scion and rootstock genotypes on the anti-oxidant defense systems of grafted cucumber seedlings under NaCl stress
A Zhen, Z Bie, Y Huang, Z Liu, Q Li
Soil Science & Plant Nutrition 56 (2), 263-271, 2010
Clock-based proxy re-encryption scheme in unreliable clouds
Q Liu, G Wang, J Wu
2012 41st International Conference on Parallel Processing Workshops, 304-305, 2012
Security from the transparent computing aspect
G Wang, Q Liu, Y Xiang, J Chen
2014 International Conference on Computing, Networking and Communications …, 2014
Secure locking for untrusted clouds
CC Tan, Q Liu, J Wu
2011 IEEE 4th International Conference on Cloud Computing, 131-138, 2011
The system can't perform the operation now. Try again later.
Articles 1–20