Browsing by Author Liu, Joseph K.

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 20 of 46  next >
TitleAuthor(s)Issue Date
 
A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing
Journal:IEEE Transactions on Information Forensics and Security
2014
 
2017
 
A new payment system for enhancing location privacy of electric vehicles
Journal:IEEE Transactions on Vehicular Technology
2014
 
2015
A suite of non-pairing ID-based threshold ring signature schemes with different levels of anonymity (extended abstract)
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2010
 
A Survey on Access Control in Fog Computing
Journal:IEEE Communications Magazine
2018
An efficient non-interactive multi-client searchable encryption with support for boolean queries
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2016
Certificate based (linkable) ring signature
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2007
Constant-size id-based linkable and revocable-iff-linked ring signature
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2006
(Convertible) undeniable signatures without random oracles
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2007
 
Efficient and Adaptive Procurement Protocol with Purchasing Privacy
Journal:IEEE Transactions on Services Computing
2018
Efficient construction of completely non-malleable CCA secure public key encryption
Proceeding/Conference:ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security
2016
Efficient escrow-free identity-based signature
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2012
 
2016
Enhancing location privacy for electric vehicles (at the right time)
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2012
 
2017
 
Fine-grained two-factor access control for web-based cloud computing services
Journal:IEEE Transactions on Information Forensics and Security
2016
Fully secure ciphertext-policy attribute based encryption with security mediator
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2015
ID-based ring signature scheme secure in the standard model
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2006
 
2014