Follow
Dr. Kaitai Liang
Title
Cited by
Cited by
Year
A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security
K Liang, L Fang, W Susilo, DS Wong
2013 5th International Conference on Intelligent Networking and …, 2013
2962013
Searchable attribute-based mechanism with efficient data sharing for secure cloud storage
K Liang, W Susilo
IEEE Transactions on Information Forensics and Security 10 (9), 1981-1992, 2015
1922015
An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing
K Liang, JK Liu, DS Wong, W Susilo
European symposium on research in computer security, 257-272, 2014
1712014
Cost-effective authentic and anonymous data sharing with forward security
X Huang, JK Liu, S Tang, Y Xiang, K Liang, L Xu, J Zhou
IEEE Transactions on computers 64 (4), 971-983, 2014
1512014
Auditable -Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing
J Ning, Z Cao, X Dong, K Liang, H Ma, L Wei
IEEE Transactions on Information Forensics and Security 13 (1), 94-105, 2017
1482017
A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing
K Liang, MH Au, JK Liu, W Susilo, DS Wong, G Yang, Y Yu, A Yang
Future Generation Computer Systems 52, 95-108, 2015
1462015
An efficient access control scheme with outsourcing capability and attribute update for fog computing
P Zhang, Z Chen, JK Liu, K Liang, H Liu
Future Generation Computer Systems 78, 753-762, 2018
1452018
A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing
K Liang, MH Au, JK Liu, W Susilo, DS Wong, G Yang, TVX Phuong, Q Xie
IEEE Transactions on Information Forensics and Security 9 (10), 1667-1680, 2014
1442014
Dissipative fault-tolerant control for nonlinear singular perturbed systems with Markov jumping parameters based on slow state feedback
J Wang, K Liang, X Huang, Z Wang, H Shen
Applied Mathematics and Computation 328, 247-262, 2018
1422018
Attribute-based data sharing scheme revisited in cloud computing
S Wang, K Liang, JK Liu, J Chen, J Yu, W Xie
IEEE Transactions on Information Forensics and Security 11 (8), 1661-1673, 2016
1332016
A blockchain-based location privacy-preserving crowdsensing system
M Yang, T Zhu, K Liang, W Zhou, RH Deng
Future Generation Computer Systems 94, 408-418, 2019
1292019
BPAS: Blockchain-Assisted Privacy-Preserving Authentication System for Vehicular Ad Hoc Networks
Q Feng, D He, S Zeadally, K Liang
IEEE Transactions on Industrial Informatics 16 (6), 4146-4155, 2019
1282019
Certificateless public key authenticated encryption with keyword search for industrial internet of things
D He, M Ma, S Zeadally, N Kumar, K Liang
IEEE Transactions on Industrial Informatics 14 (8), 3618-3627, 2017
1262017
Extended proxy-assisted approach: Achieving revocable fine-grained encryption of cloud data
Y Yang, JK Liu, K Liang, KKR Choo, J Zhou
European symposium on research in computer security, 146-166, 2015
1192015
Privacy-preserving ciphertext multi-sharing control for big data storage
K Liang, W Susilo, JK Liu
IEEE transactions on information forensics and security 10 (8), 1578-1589, 2015
1102015
Two-factor data security protection mechanism for cloud storage system
JK Liu, K Liang, W Susilo, J Liu, Y Xiang
IEEE Transactions on Computers 65 (6), 1992-2004, 2015
1022015
Searchain: Blockchain-based private keyword search in decentralized storage
P Jiang, F Guo, K Liang, J Lai, Q Wen
Future Generation Computer Systems 107, 781-792, 2020
962020
Passive attacks against searchable encryption
J Ning, J Xu, K Liang, F Zhang, EC Chang
IEEE Transactions on Information Forensics and Security 14 (3), 789-802, 2018
742018
Secure sharing and searching for real-time video data in mobile cloud
JK Liu, MH Au, W Susilo, K Liang, R Lu, B Srinivasan
IEEE Network 29 (2), 46-50, 2015
742015
Time-based direct revocable ciphertext-policy attribute-based encryption with short revocation list
JK Liu, TH Yuen, P Zhang, K Liang
International Conference on Applied Cryptography and Network Security, 516-534, 2018
632018
The system can't perform the operation now. Try again later.
Articles 1–20