Linkable spontaneous anonymous group signature for ad hoc groups JK Liu, VK Wei, DS Wong Information Security and Privacy: 9th Australasian Conference, ACISP 2004 …, 2004 | 611 | 2004 |
Toward efficient and privacy-preserving computing in big data era R Lu, H Zhu, X Liu, JK Liu, J Shao IEEE Network 28 (4), 46-50, 2014 | 423 | 2014 |
Ringct 2.0: A compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency monero SF Sun, MH Au, JK Liu, TH Yuen Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017 | 323 | 2017 |
A secure cloud computing based framework for big data information management of smart grid J Baek, QH Vu, JK Liu, X Huang, Y Xiang IEEE transactions on cloud computing 3 (2), 233-244, 2014 | 313 | 2014 |
An efficient file hierarchy attribute-based encryption scheme in cloud computing S Wang, J Zhou, JK Liu, J Yu, J Chen, W Xie IEEE Transactions on Information Forensics and Security 11 (6), 1265-1277, 2016 | 309 | 2016 |
Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model JK Liu, MH Au, W Susilo Proceedings of the 2nd ACM symposium on Information, computer and …, 2007 | 292 | 2007 |
Malicious KGC attacks in certificateless cryptography MH Au, Y Mu, J Chen, DS Wong, JK Liu, G Yang Proceedings of the 2nd ACM symposium on Information, computer and …, 2007 | 290 | 2007 |
Secure sharing of personal health records in cloud computing: Ciphertext-policy attribute-based signcryption J Liu, X Huang, JK Liu Future Generation Computer Systems 52, 67-76, 2015 | 278 | 2015 |
Practical backward-secure searchable encryption from symmetric puncturable encryption SF Sun, X Yuan, JK Liu, R Steinfeld, A Sakzad, V Vo, S Nepal Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 216 | 2018 |
An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing K Liang, JK Liu, DS Wong, W Susilo Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014 | 202 | 2014 |
An efficient access control scheme with outsourcing capability and attribute update for fog computing P Zhang, Z Chen, JK Liu, K Liang, H Liu Future Generation Computer Systems 78, 753-762, 2018 | 190 | 2018 |
Security analysis methods on ethereum smart contract vulnerabilities: a survey P Praitheeshan, L Pan, J Yu, J Liu, R Doss arXiv preprint arXiv:1908.08605, 2019 | 184 | 2019 |
A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing K Liang, MH Au, JK Liu, W Susilo, DS Wong, G Yang, Y Yu, A Yang Future Generation Computer Systems 52, 95-108, 2015 | 181 | 2015 |
Result pattern hiding searchable encryption for conjunctive queries S Lai, S Patranabis, A Sakzad, JK Liu, D Mukhopadhyay, R Steinfeld, ... Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018 | 180 | 2018 |
Efficient online/offline identity-based signature for wireless sensor network JK Liu, J Baek, J Zhou, Y Yang, JW Wong International Journal of Information Security 9, 287-296, 2010 | 175 | 2010 |
IoTChain: Establishing trust in the Internet of Things ecosystem using blockchain B Yu, J Wright, S Nepal, L Zhu, J Liu, R Ranjan IEEE Cloud Computing 5 (4), 12-23, 2018 | 174* | 2018 |
Cost-effective authentic and anonymous data sharing with forward security X Huang, JK Liu, S Tang, Y Xiang, K Liang, L Xu, J Zhou IEEE Transactions on computers 64 (4), 971-983, 2014 | 167 | 2014 |
Platform-independent secure blockchain-based voting system B Yu, JK Liu, A Sakzad, S Nepal, R Steinfeld, P Rimba, MH Au Information Security: 21st International Conference, ISC 2018, Guildford, UK …, 2018 | 164 | 2018 |
Attribute-based data sharing scheme revisited in cloud computing S Wang, K Liang, JK Liu, J Chen, J Yu, W Xie IEEE Transactions on Information Forensics and Security 11 (8), 1661-1673, 2016 | 161 | 2016 |
A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing K Liang, MH Au, JK Liu, W Susilo, DS Wong, G Yang, TVX Phuong, Q Xie IEEE Transactions on Information Forensics and Security 9 (10), 1667-1680, 2014 | 160 | 2014 |