Suivre
Weiran Liu
Weiran Liu
Autres noms刘巍然
Staff Security Engineer, Alibaba Group
Adresse e-mail validée de alibaba-inc.com
Titre
Citée par
Citée par
Année
Auditing and revocation enabled role-based access control over outsourced private EHRs
W Liu, X Liu, J Liu, Q Wu, J Zhang, Y Li
2015 IEEE 17th international conference on high performance computing and …, 2015
372015
Hierarchical identity-based broadcast encryption
W Liu, J Liu, Q Wu, B Qin
Information Security and Privacy: 19th Australasian Conference, ACISP 2014 …, 2014
322014
Practical direct chosen ciphertext secure key-policy attribute-based encryption with public ciphertext test
W Liu, J Liu, Q Wu, B Qin, Y Zhou
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
312014
Practical chosen-ciphertext secure hierarchical identity-based broadcast encryption
W Liu, J Liu, Q Wu, B Qin, Y Li
International journal of information security 15, 35-50, 2016
252016
Anonymous role-based access control on e-health records
X Zhou, J Liu, W Liu, Q Wu
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
202016
Energy efficiency optimization for communication of air-based information network with guaranteed timing constraints
X Liu, M Qiu, X Wang, W Liu, K Cai
Journal of Signal Processing Systems 86, 299-312, 2017
152017
Secure and anonymous data transmission system for cluster organised space information network
D Li, J Liu, W Liu
2016 IEEE International Conference on Smart Cloud (SmartCloud), 228-233, 2016
132016
Revocable hierarchical identity-based broadcast encryption
D Li, J Liu, Z Zhang, Q Wu, W Liu
Tsinghua Science and Technology 23 (5), 539-549, 2018
122018
Efficient CCA2 secure revocable multi-authority large-universe attribute-based encryption
D Li, J Chen, J Liu, Q Wu, W Liu
Cyberspace Safety and Security: 9th International Symposium, CSS 2017, Xi’an …, 2017
122017
OpBoost: a vertical federated tree boosting framework based on order-preserving desensitization
X Li, Y Hu, W Liu, H Feng, L Peng, Y Hong, K Ren, Z Qin
arXiv preprint arXiv:2210.01318, 2022
112022
Efficient subtree-based encryption for fuzzy-entity data sharing
W Liu, J Liu, Q Wu, B Qin, D Naccache, H Ferradi
Soft Computing 22, 7961-7976, 2018
112018
Scape: Scalable collaborative analytics system on private database with malicious security
F Han, L Zhang, H Feng, W Liu, X Li
2022 IEEE 38th International Conference on Data Engineering (ICDE), 1740-1753, 2022
92022
Correlated randomness teleportation via semi-trusted hardware—enabling silent multi-party computation
Y Lu, B Zhang, HS Zhou, W Liu, L Zhang, K Ren
Computer Security–ESORICS 2021: 26th European Symposium on Research in …, 2021
92021
Dump: A dummy-point-based framework for histogram estimation in shuffle model
X Li, W Liu, Z Chen, K Huang, Z Qin, L Zhang, K Ren
arXiv preprint arXiv:2009.13738, 2020
92020
SAKE: scalable authenticated key exchange for mobile e‐health networks
W Liu, J Liu, Q Wu, W Susilo, H Deng, B Qin
Security and Communication Networks 9 (15), 2754-2765, 2016
92016
Android PBC: A pairing based cryptography toolkit for android platform
W Liu, J Liu, Q Wu, B Qin
IET Digital Library, 2014
92014
Linear private set union from {Multi-Query} reverse private membership test
C Zhang, Y Chen, W Liu, M Zhang, D Lin
32nd USENIX Security Symposium (USENIX Security 23), 337-354, 2023
72023
Optimal Private Set Union from Multi-Query Reverse Private Membership Test.
C Zhang, Y Chen, W Liu, M Zhang, D Lin
IACR Cryptol. ePrint Arch. 2022, 358, 2022
72022
A new lightweight link quality based reputation model for space-air-ground integrated wireless sensor network (SAGIWSN)
M Maamar, J Liu, W Liu
2014 IEEE Workshop on Electronics, Computer and Applications, 230-236, 2014
72014
Experimental performance comparisons between (h) ibe schemes over composite-order and prime-order bilinear groups
W Liu, X Liu, Q Wu, B Qin
Proceedings of 2014 11th International Bhurban Conference on Applied …, 2014
72014
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20