
Kaitai Liang
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j56]Yuanbo Cui
, Fei Gao
, Yijie Shi, Wei Yin
, Emmanouil Panaousis
, Kaitai Liang
:
An Efficient Attribute-Based Multi-Keyword Search Scheme in Encrypted Keyword Generation. IEEE Access 8: 99024-99036 (2020) - [j55]Yang Chen, Wenmin Li, Fei Gao, Kaitai Liang, Hua Zhang, Qiaoyan Wen:
Practical Attribute-Based Conjunctive Keyword Search Scheme. Comput. J. 63(8): 1203-1215 (2020) - [j54]Xi Jun Lin, Lin Sun, Haipeng Qu, Kaitai Liang:
Leakage-free ID-Based Signature, Revisited. Comput. J. 63(8): 1263-1270 (2020) - [j53]Guangquan Xu, Bingjiang Guo, Chunhua Su, Xi Zheng
, Kaitai Liang, Duncan S. Wong, Hao Wang
:
Am I eclipsed? A smart detector of eclipse attacks for Ethereum. Comput. Secur. 88 (2020) - [j52]Yi Zhao, Jianting Ning, Kaitai Liang, Yanqi Zhao, Liqun Chen, Bo Yang:
Privacy preserving search services against online attack. Comput. Secur. 95: 101836 (2020) - [j51]Peng Jiang, Fuchun Guo, Kaitai Liang
, Jianchang Lai, Qiaoyan Wen:
Searchain: Blockchain-based private keyword search in decentralized storage. Future Gener. Comput. Syst. 107: 781-792 (2020) - [j50]Jiahui Chen
, Jie Ling, Jianting Ning, Emmanouil Panaousis
, George Loukas
, Kaitai Liang, Jiageng Chen
:
Post quantum proxy signature scheme based on the multivariate public key cryptographic signature. Int. J. Distributed Sens. Networks 16(4) (2020) - [j49]Guangquan Xu
, Wei Wang, Litao Jiao, Xiaotong Li, Kaitai Liang
, James Xi Zheng
, Wenjuan Lian, Hequn Xian, Honghao Gao
:
SoProtector: Safeguard Privacy for Native SO Files in Evolving Mobile IoT Applications. IEEE Internet Things J. 7(4): 2539-2552 (2020) - [j48]Guangquan Xu, Wenjuan Zhou, Arun Kumar Sangaiah, Yao Zhang, Xi Zheng
, Qiang Tang, Naixue Xiong, Kaitai Liang, Xiaokang Zhou:
A Security-Enhanced Certificateless Aggregate Signature Authentication Protocol for InVANETs. IEEE Netw. 34(2): 22-29 (2020) - [j47]Meikang Qiu
, Hongning Dai
, Arun Kumar Sangaiah
, Kaitai Liang
, Xi Zheng
:
Guest Editorial: Special Section on Emerging Privacy and Security Issues Brought by Artificial Intelligence in Industrial Informatics. IEEE Trans. Ind. Informatics 16(3): 2029-2030 (2020) - [j46]Qi Feng, Debiao He
, Sherali Zeadally
, Kaitai Liang
:
BPAS: Blockchain-Assisted Privacy-Preserving Authentication System for Vehicular Ad Hoc Networks. IEEE Trans. Ind. Informatics 16(6): 4146-4155 (2020) - [j45]Guangquan Xu, Bingyan Liu, Litao Jiao, Xiaotong Li, Meiqi Feng, Kaitai Liang, Lei Ma, Xi Zheng
:
Trust2Privacy: A Novel Fuzzy Trust-to-Privacy Mechanism for Mobile Social Networks. IEEE Wirel. Commun. 27(3): 72-78 (2020) - [c26]Junwei Zhou, Junjiong Li, Emmanouil Panaousis
, Kaitai Liang:
Deep Binarized Convolutional Neural Network Inferences over Encrypted Data. CSCloud/EdgeCom 2020: 160-167 - [e2]Liqun Chen
, Ninghui Li, Kaitai Liang
, Steve A. Schneider
:
Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part I. Lecture Notes in Computer Science 12308, Springer 2020, ISBN 978-3-030-58950-9 [contents] - [e1]Liqun Chen
, Ninghui Li, Kaitai Liang
, Steve A. Schneider
:
Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part II. Lecture Notes in Computer Science 12309, Springer 2020, ISBN 978-3-030-59012-3 [contents] - [i8]Hangyu Zhu, Rui Wang, Yaochu Jin, Kaitai Liang, Jianting Ning:
Distributed Additive Encryption and Quantization for Privacy Preserving Federated Deep Learning. CoRR abs/2011.12623 (2020)
2010 – 2019
- 2019
- [j44]Zhenhu Ning, Guangquan Xu
, Naixue Xiong
, Yongli Yang, Changxiang Shen, Emmanouil Panaousis
, Hao Wang
, Kaitai Liang
:
TAW: Cost-Effective Threshold Authentication With Weights for Internet of Things. IEEE Access 7: 30112-30125 (2019) - [j43]Kai He
, Yijun Mao, Jianting Ning, Kaitai Liang
, Xinyi Huang, Emmanouil Panaousis, George Loukas
:
A New Encrypted Data Switching Protocol: Bridging IBE and ABE Without Loss of Data Confidentiality. IEEE Access 7: 50658-50668 (2019) - [j42]Shanchen Pang, Qian Gao
, Ting Liu, Hua He, Guangquan Xu, Kaitai Liang
:
A Behavior Based Trustworthy Service Composition Discovery Approach in Cloud Environment. IEEE Access 7: 56492-56503 (2019) - [j41]Guangquan Xu, Yao Zhang
, Litao Jiao, Emmanouil Panaousis
, Kaitai Liang
, Hao Wang
, Xiaotong Li:
DT-CP: A Double-TTPs-Based Contract-Signing Protocol With Lower Computational Cost. IEEE Access 7: 174740-174749 (2019) - [j40]Yang Chen, Wenmin Li, Fei Gao, Wei Yin, Kaitai Liang, Hua Zhang, Qiaoyan Wen:
Efficient Attribute-Based Data Sharing Scheme with Hidden Access Structures. Comput. J. 62(12): 1748-1760 (2019) - [j39]Mengmeng Yang, Tianqing Zhu
, Kaitai Liang, Wanlei Zhou, Robert H. Deng
:
A blockchain-based location privacy-preserving crowdsensing system. Future Gener. Comput. Syst. 94: 408-418 (2019) - [j38]Lichen Cheng, Jiqiang Liu, Chunhua Su, Kaitai Liang, Guangquan Xu, Wei Wang:
Polynomial-based modifiable blockchain structure for removing fraud transactions. Future Gener. Comput. Syst. 99: 154-163 (2019) - [j37]Zhidan Li, Wenmin Li, Qiaoyan Wen, Jiageng Chen, Wei Yin, Kaitai Liang:
An efficient blind filter: Location privacy protection and the access control in FinTech. Future Gener. Comput. Syst. 100: 797-810 (2019) - [j36]Linzhi Jiang
, Liqun Chen
, Thanassis Giannetsos
, Bo Luo
, Kaitai Liang
, Jinguang Han
:
Toward Practical Privacy-Preserving Processing Over Encrypted Data in IoT: An Assistive Healthcare Use Case. IEEE Internet Things J. 6(6): 10177-10190 (2019) - [j35]Jinguang Han
, Liqun Chen, Willy Susilo
, Xinyi Huang, Aniello Castiglione
, Kaitai Liang:
Fine-grained information flow control using attributes. Inf. Sci. 484: 167-182 (2019) - [j34]Meijuan Huang, Bo Yang, Yi Zhao, Kaitai Liang, Liang Xue, Xiaoyi Yang:
CCA-Secure Deterministic Identity-Based Encryption Scheme. J. Univers. Comput. Sci. 25(3): 245-269 (2019) - [j33]Yi Zhao
, Kaitai Liang, Bo Yang
, Liqun Chen:
CCA Secure Public Key Encryption against After-the-Fact Leakage without NIZK Proofs. Secur. Commun. Networks 2019: 8357241:1-8357241:8 (2019) - [j32]Qi Feng, Debiao He
, Sherali Zeadally
, Neeraj Kumar
, Kaitai Liang
:
Ideal Lattice-Based Anonymous Authentication Protocol for Mobile Devices. IEEE Syst. J. 13(3): 2775-2785 (2019) - [j31]Xiuhua Lu
, Qiaoyan Wen, Wei Yin, Kaitai Liang, Zhengping Jin, Emmanouil Panaousis
, Jiageng Chen:
Quantum-Resistant Identity-Based Signature with Message Recovery and Proxy Delegation. Symmetry 11(2): 272 (2019) - [j30]Jianting Ning
, Jia Xu, Kaitai Liang
, Fan Zhang
, Ee-Chien Chang
:
Passive Attacks Against Searchable Encryption. IEEE Trans. Inf. Forensics Secur. 14(3): 789-802 (2019) - [j29]Xiaoming Li, Guangquan Xu, Xi Zheng
, Kaitai Liang, Emmanouil Panaousis
, Tao Li, Wei Wang, Chao Shen:
Using Sparse Representation to Detect Anomalies in Complex WSNs. ACM Trans. Intell. Syst. Technol. 10(6): 64:1-64:18 (2019) - [c25]Nikos Koutroumpouchos, Christoforos Ntantogian, Sofia-Anna Menesidou, Kaitai Liang, Panagiotis Gouvas, Christos Xenakis, Thanassis Giannetsos:
Secure Edge Computing with Lightweight Control-Flow Property-based Attestation. NetSoft 2019: 84-92 - [c24]Bingqing Ren, Jiageng Chen, Shihao Zhou, Xiushu Jin, Zhe Xia, Kaitai Liang:
Cryptanalysis of Raindrop and FBC. NSS 2019: 536-551 - [i7]Zhidan Li, Wenmin Li, Fei Gao, Wei Yin, Hua Zhang, Qiaoyan Wen, Kaitai Liang:
Towards Privacy-Preserving and Efficient Attribute-Based Multi-Keyword Search. IACR Cryptol. ePrint Arch. 2019: 1314 (2019) - 2018
- [j28]Wei Yin
, Qiaoyan Wen, Kaitai Liang
, Zhenfei Zhang, Liqun Chen, Hanbing Yan, Hua Zhang
:
Delegation of Decryption Rights With Revocability From Learning With Errors. IEEE Access 6: 61163-61175 (2018) - [j27]Peng Zhang, Zehong Chen, Joseph K. Liu, Kaitai Liang
, Hongwei Liu:
An efficient access control scheme with outsourcing capability and attribute update for fog computing. Future Gener. Comput. Syst. 78: 753-762 (2018) - [j26]Man Ho Au
, Kaitai Liang
, Joseph K. Liu, Rongxing Lu, Jianting Ning:
Privacy-preserving personal data operation on mobile cloud - Chances and challenges over advanced persistent threat. Future Gener. Comput. Syst. 79: 337-349 (2018) - [j25]Xiuhua Lu
, Wei Yin, Qiaoyan Wen, Kaitai Liang, Liqun Chen, Jiageng Chen:
Message Integration Authentication in the Internet-of-Things via Lattice-Based Batch Signatures. Sensors 18(11): 4056 (2018) - [j24]Jinguang Han
, Ye Yang, Joseph K. Liu, Jiguo Li, Kaitai Liang
, Jian Shen:
Expressive attribute-based keyword search with constant-size ciphertext. Soft Comput. 22(15): 5163-5177 (2018) - [j23]Jianting Ning
, Zhenfu Cao, Xiaolei Dong, Kaitai Liang
, Hui Ma, Lifei Wei:
Auditable σ-Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing. IEEE Trans. Inf. Forensics Secur. 13(1): 94-105 (2018) - [j22]Debiao He
, Mimi Ma
, Sherali Zeadally
, Neeraj Kumar
, Kaitai Liang
:
Certificateless Public Key Authenticated Encryption With Keyword Search for Industrial Internet of Things. IEEE Trans. Ind. Informatics 14(8): 3618-3627 (2018) - [c23]Joseph K. Liu, Tsz Hon Yuen
, Peng Zhang, Kaitai Liang
:
Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List. ACNS 2018: 516-534 - [i6]Joseph K. Liu, Tsz Hon Yuen, Peng Zhang, Kaitai Liang:
Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List. IACR Cryptol. ePrint Arch. 2018: 330 (2018) - [i5]Wei Yin, Qiaoyan Wen, Kaitai Liang, Zhenfei Zhang, Liqun Chen, Hanbing Yan, Hua Zhang:
Delegation of Decryption Rights with Revocability from Learning with Errors. IACR Cryptol. ePrint Arch. 2018: 777 (2018) - 2017
- [j21]Junwei Zhou, Hui Duan, Kaitai Liang
, Qiao Yan, Fei Chen, F. Richard Yu
, Jieming Wu, Jianyong Chen:
Securing Outsourced Data in the Multi-Authority Cloud with Fine-Grained Access Control and Efficient Attribute Revocation. Comput. J. 60(8): 1210-1222 (2017) - [j20]Yangguang Tian, Guomin Yang
, Yi Mu, Shiwei Zhang, Kaitai Liang
, Yong Yu:
One-Round Attribute-Based Key Exchange in the Multi-Party Setting. Int. J. Found. Comput. Sci. 28(6): 725-742 (2017) - [j19]Cong Zuo, Kaitai Liang
, Zoe Lin Jiang, Jun Shao, Jun-bin Fang:
Cost-effective privacy-preserving vehicular urban sensing system. Pers. Ubiquitous Comput. 21(5): 893-901 (2017) - [c22]Xiaoyi Li, Kaitai Liang, Zhen Liu, Duncan S. Wong:
Attribute based Encryption: Traitor Tracing, Revocation and Fully Security on Prime Order Groups. CLOSER 2017: 281-292 - [c21]Guanghui Zhao, Xingyan Zi, Kaitai Liang
, Panyi Yun, Junwei Zhou:
A Modified Segmentation Approach for Overlapping Elliptical Objects with Various Sizes. GPC 2017: 222-236 - [c20]Ye Li, Kaitai Liang
, Chunhua Su, Wei Wu:
DABEHR: Decentralized Attribute-Based Electronic Health Record System with Constant-Size Storage Complexity. GPC 2017: 611-626 - [c19]Kai He, Xueqiao Liu, Huaqiang Yuan, Wenhong Wei, Kaitai Liang
:
Hierarchical Conditional Proxy Re-Encryption: A New Insight of Fine-Grained Secure Data Sharing. ISPEC 2017: 118-135 - [c18]Ru Meng, Yanwei Zhou, Jianting Ning, Kaitai Liang
, Jinguang Han
, Willy Susilo:
An Efficient Key-Policy Attribute-Based Searchable Encryption in Prime-Order Groups. ProvSec 2017: 39-56 - 2016
- [j18]Jiannan Wei, Guomin Yang
, Yi Mu, Kaitai Liang
:
Anonymous Proxy Signature with Hierarchical Traceability. Comput. J. 59(4): 559-569 (2016) - [j17]Clémentine Gritti, Willy Susilo, Thomas Plantard
, Kaitai Liang
, Duncan S. Wong:
Broadcast encryption with dealership. Int. J. Inf. Sec. 15(3): 271-283 (2016) - [j16]Jun Shao, Rongxing Lu, Xiaodong Lin, Kaitai Liang
:
Secure bidirectional proxy re-encryption for cryptographic cloud storage. Pervasive Mob. Comput. 28: 113-121 (2016) - [j15]Joseph K. Liu, Kaitai Liang
, Willy Susilo, Jianghua Liu, Yang Xiang:
Two-Factor Data Security Protection Mechanism for Cloud Storage System. IEEE Trans. Computers 65(6): 1992-2004 (2016) - [j14]Shulan Wang, Kaitai Liang
, Joseph K. Liu, Jianyong Chen, Jianping Yu, Weixin Xie:
Attribute-Based Data Sharing Scheme Revisited in Cloud Computing. IEEE Trans. Inf. Forensics Secur. 11(8): 1661-1673 (2016) - [j13]Kaitai Liang
, Xinyi Huang
, Fuchun Guo, Joseph K. Liu:
Privacy-Preserving and Regular Language Search Over Encrypted Cloud Data. IEEE Trans. Inf. Forensics Secur. 11(10): 2365-2376 (2016) - [c17]Tran Viet Xuan Phuong, Guomin Yang
, Willy Susilo, Kaitai Liang
:
Edit Distance Based Encryption and Its Application. ACISP (2) 2016: 103-119 - [c16]Kaitai Liang
, Atsuko Miyaji, Chunhua Su:
Secure and Traceable Framework for Data Circulation. ACISP (1) 2016: 376-388 - [c15]Peng Zhang, Zehong Chen, Kaitai Liang
, Shulan Wang, Ting Wang:
A Cloud-Based Access Control Scheme with User Revocation and Attribute Update. ACISP (1) 2016: 525-540 - [c14]Kaitai Liang
, Chunhua Su, Jiageng Chen, Joseph K. Liu:
Efficient Multi-Function Data Sharing and Searching Mechanism for Cloud-Based Encrypted Data. AsiaCCS 2016: 83-94 - [c13]Weiran Liu, Jianwei Liu, Qianhong Wu, Bo Qin, Kaitai Liang
:
Online/Offline Public-Index Predicate Encryption for Fine-Grained Mobile Access Control. ESORICS (2) 2016: 588-605 - [c12]Chu Luo
, Angelos Fylakis, Juha Partala, Simon Klakegg, Jorge Gonçalves, Kaitai Liang
, Tapio Seppänen, Vassilis Kostakos
:
A data hiding approach for sensitive smartphone data. UbiComp 2016: 557-468 - [c11]Man Ho Au
, Kaitai Liang
, Joseph K. Liu, Rongxing Lu:
While Mobile Encounters with Clouds. NSS 2016: 3-18 - [c10]Chao Lin, Fei Zhu, Wei Wu, Kaitai Liang
, Kim-Kwang Raymond Choo
:
A New Transitive Signature Scheme. NSS 2016: 156-167 - [c9]Yangguang Tian, Guomin Yang
, Yi Mu, Kaitai Liang
, Yong Yu:
One-Round Attribute-Based Key Exchange in the Multi-party Setting. ProvSec 2016: 227-243 - [i4]Emiliano De Cristofaro, Kaitai Liang, Yuruo Zhang:
Privacy-Preserving Genetic Relatedness Test. CoRR abs/1611.03006 (2016) - [i3]Xiaoyi Li, Kaitai Liang, Zhen Liu, Duncan S. Wong:
Attribute Based Encryption: Traitor Tracing, Revocation and Fully Security on Prime Order Groups. IACR Cryptol. ePrint Arch. 2016: 1140 (2016) - 2015
- [j12]Kaitai Liang
, Willy Susilo, Joseph K. Liu
, Duncan S. Wong:
Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption. Comput. J. 58(10): 2778-2792 (2015) - [j11]Kaitai Liang
, Liming Fang, Duncan S. Wong, Willy Susilo:
A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds. Concurr. Comput. Pract. Exp. 27(8): 2004-2027 (2015) - [j10]Kaitai Liang
, Man Ho Au
, Joseph K. Liu
, Willy Susilo, Duncan S. Wong, Guomin Yang
, Yong Yu, Anjia Yang
:
A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing. Future Gener. Comput. Syst. 52: 95-108 (2015) - [j9]Kaitai Liang
, Joseph K. Liu
, Rongxing Lu, Duncan S. Wong:
Privacy Concerns for Photo Sharing in Online Social Networks. IEEE Internet Comput. 19(2): 58-63 (2015) - [j8]Joseph K. Liu
, Man Ho Au
, Willy Susilo, Kaitai Liang
, Rongxing Lu, Bala Srinivasan:
Secure sharing and searching for real-time video data in mobile cloud. IEEE Netw. 29(2): 46-50 (2015) - [j7]Anjia Yang
, Kaitai Liang
, Yunhui Zhuang, Duncan S. Wong, Xiaohua Jia
:
A new unpredictability-based radio frequency identification forward privacy model and a provably secure construction. Secur. Commun. Networks 8(16): 2836-2849 (2015) - [j6]Xinyi Huang, Joseph K. Liu
, Shaohua Tang, Yang Xiang
, Kaitai Liang
, Li Xu, Jianying Zhou:
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security. IEEE Trans. Computers 64(4): 971-983 (2015) - [j5]Kaitai Liang
, Willy Susilo, Joseph K. Liu
:
Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage. IEEE Trans. Inf. Forensics Secur. 10(8): 1578-1589 (2015) - [j4]Kaitai Liang
, Willy Susilo:
Searchable Attribute-Based Mechanism With Efficient Data Sharing for Secure Cloud Storage. IEEE Trans. Inf. Forensics Secur. 10(9): 1981-1992 (2015) - [c8]Yanjiang Yang, Joseph K. Liu, Kaitai Liang
, Kim-Kwang Raymond Choo
, Jianying Zhou:
Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data. ESORICS (2) 2015: 146-166 - [c7]Shangqi Lai
, Joseph K. Liu, Kim-Kwang Raymond Choo
, Kaitai Liang
:
Secret Picture: An Efficient Tool for Mitigating Deletion Delay on OSN. ICICS 2015: 467-477 - 2014
- [j3]Clémentine Gritti, Willy Susilo, Thomas Plantard, Kaitai Liang, Duncan S. Wong:
Empowering Personal Health Records with Cloud Computing: How to encrypt with forthcoming fine-grained policies efficiently. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 5(4): 3-28 (2014) - [j2]Kaitai Liang
, Cheng-Kang Chu, Xiao Tan, Duncan S. Wong, Chunming Tang, Jianying Zhou:
Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts. Theor. Comput. Sci. 539: 87-105 (2014) - [j1]Kaitai Liang
, Man Ho Au
, Joseph K. Liu
, Willy Susilo, Duncan S. Wong, Guomin Yang
, Tran Viet Xuan Phuong, Qi Xie:
A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing. IEEE Trans. Inf. Forensics Secur. 9(10): 1667-1680 (2014) - [c6]Kaitai Liang
, Joseph K. Liu
, Duncan S. Wong, Willy Susilo:
An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing. ESORICS (1) 2014: 257-272 - [c5]Kaitai Liang
, Man Ho Au
, Willy Susilo, Duncan S. Wong, Guomin Yang
, Yong Yu:
An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data Sharing. ISPEC 2014: 448-461 - [c4]Rongxing Lu, Xiaodong Lin, Jun Shao, Kaitai Liang:
RCCA-Secure Multi-use Bidirectional Proxy Re-encryption with Master Secret Security. ProvSec 2014: 194-205 - 2013
- [c3]Kaitai Liang
, Liming Fang, Willy Susilo, Duncan S. Wong:
A Ciphertext-Policy Attribute-Based Proxy Re-encryption with Chosen-Ciphertext Security. INCoS 2013: 552-559 - [c2]Kaitai Liang
, Qiong Huang, Roman Schlegel, Duncan S. Wong, Chunming Tang:
A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release. ISPEC 2013: 132-146 - [i2]Kaitai Liang, Qiong Huang, Roman Schlegel, Duncan S. Wong, Chunming Tang:
A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release. IACR Cryptol. ePrint Arch. 2013: 115 (2013) - [i1]Kaitai Liang, Liming Fang, Duncan S. Wong, Willy Susilo:
A Ciphertext-Policy Attribute-Based Proxy Re-Encryption with Chosen-Ciphertext Security. IACR Cryptol. ePrint Arch. 2013: 236 (2013) - 2012
- [c1]Kaitai Liang
, Zhen Liu, Xiao Tan, Duncan S. Wong, Chunming Tang:
A CCA-Secure Identity-Based Conditional Proxy Re-Encryption without Random Oracles. ICISC 2012: 231-246
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2020-12-31 01:12 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint