A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security K Liang, L Fang, W Susilo, DS Wong 2013 5th International Conference on Intelligent Networking and …, 2013 | 322 | 2013 |
Searchable attribute-based mechanism with efficient data sharing for secure cloud storage K Liang, W Susilo IEEE Transactions on Information Forensics and Security 10 (9), 1981-1992, 2015 | 252 | 2015 |
BPAS: Blockchain-Assisted Privacy-Preserving Authentication System for Vehicular Ad Hoc Networks Q Feng, D He, S Zeadally, K Liang IEEE Transactions on Industrial Informatics 16 (6), 4146-4155, 2019 | 210 | 2019 |
Certificateless public key authenticated encryption with keyword search for industrial internet of things D He, M Ma, S Zeadally, N Kumar, K Liang IEEE Transactions on Industrial Informatics 14 (8), 3618-3627, 2017 | 202 | 2017 |
An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing K Liang, JK Liu, DS Wong, W Susilo Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014 | 202 | 2014 |
Auditable -Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing J Ning, Z Cao, X Dong, K Liang, H Ma, L Wei IEEE Transactions on Information Forensics and Security 13 (1), 94-105, 2017 | 200 | 2017 |
A blockchain-based location privacy-preserving crowdsensing system M Yang, T Zhu, K Liang, W Zhou, RH Deng Future Generation Computer Systems 94, 408-418, 2019 | 195 | 2019 |
An efficient access control scheme with outsourcing capability and attribute update for fog computing P Zhang, Z Chen, JK Liu, K Liang, H Liu Future Generation Computer Systems 78, 753-762, 2018 | 190 | 2018 |
A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing K Liang, MH Au, JK Liu, W Susilo, DS Wong, G Yang, Y Yu, A Yang Future Generation Computer Systems 52, 95-108, 2015 | 181 | 2015 |
Cost-effective authentic and anonymous data sharing with forward security X Huang, JK Liu, S Tang, Y Xiang, K Liang, L Xu, J Zhou IEEE Transactions on computers 64 (4), 971-983, 2014 | 167 | 2014 |
Attribute-based data sharing scheme revisited in cloud computing S Wang, K Liang, JK Liu, J Chen, J Yu, W Xie IEEE Transactions on Information Forensics and Security 11 (8), 1661-1673, 2016 | 161 | 2016 |
A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing K Liang, MH Au, JK Liu, W Susilo, DS Wong, G Yang, TVX Phuong, Q Xie IEEE Transactions on Information Forensics and Security 9 (10), 1667-1680, 2014 | 160 | 2014 |
Dissipative fault-tolerant control for nonlinear singular perturbed systems with Markov jumping parameters based on slow state feedback J Wang, K Liang, X Huang, Z Wang, H Shen Applied Mathematics and Computation 328, 247-262, 2018 | 159 | 2018 |
Searchain: Blockchain-based private keyword search in decentralized storage P Jiang, F Guo, K Liang, J Lai, Q Wen Future Generation Computer Systems 107, 781-792, 2020 | 136 | 2020 |
Extended proxy-assisted approach: Achieving revocable fine-grained encryption of cloud data Y Yang, JK Liu, K Liang, KKR Choo, J Zhou Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015 | 125 | 2015 |
Privacy-preserving ciphertext multi-sharing control for big data storage K Liang, W Susilo, JK Liu IEEE transactions on information forensics and security 10 (8), 1578-1589, 2015 | 122 | 2015 |
Two-factor data security protection mechanism for cloud storage system JK Liu, K Liang, W Susilo, J Liu, Y Xiang IEEE Transactions on Computers 65 (6), 1992-2004, 2015 | 116 | 2015 |
Passive attacks against searchable encryption J Ning, J Xu, K Liang, F Zhang, EC Chang IEEE Transactions on Information Forensics and Security 14 (3), 789-802, 2018 | 102 | 2018 |
Time-based direct revocable ciphertext-policy attribute-based encryption with short revocation list JK Liu, TH Yuen, P Zhang, K Liang Applied Cryptography and Network Security: 16th International Conference …, 2018 | 95 | 2018 |
Am I eclipsed? A smart detector of eclipse attacks for Ethereum G Xu, B Guo, C Su, X Zheng, K Liang, DS Wong, H Wang Computers & Security 88, 101604, 2020 | 89 | 2020 |