Suivre
Dr. Kaitai Liang
Dr. Kaitai Liang
Cybersecurity Group, EMCS, TU DELFT
Adresse e-mail validée de tudelft.nl - Page d'accueil
Titre
Citée par
Citée par
Année
A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security
K Liang, L Fang, W Susilo, DS Wong
2013 5th International Conference on Intelligent Networking and …, 2013
3022013
Searchable attribute-based mechanism with efficient data sharing for secure cloud storage
K Liang, W Susilo
IEEE Transactions on Information Forensics and Security 10 (9), 1981-1992, 2015
2052015
An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing
K Liang, JK Liu, DS Wong, W Susilo
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
1762014
Auditable -Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing
J Ning, Z Cao, X Dong, K Liang, H Ma, L Wei
IEEE Transactions on Information Forensics and Security 13 (1), 94-105, 2017
1622017
An efficient access control scheme with outsourcing capability and attribute update for fog computing
P Zhang, Z Chen, JK Liu, K Liang, H Liu
Future Generation Computer Systems 78, 753-762, 2018
1562018
A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing
K Liang, MH Au, JK Liu, W Susilo, DS Wong, G Yang, Y Yu, A Yang
Future Generation Computer Systems 52, 95-108, 2015
1542015
Cost-effective authentic and anonymous data sharing with forward security
X Huang, JK Liu, S Tang, Y Xiang, K Liang, L Xu, J Zhou
IEEE Transactions on computers 64 (4), 971-983, 2014
1532014
BPAS: Blockchain-Assisted Privacy-Preserving Authentication System for Vehicular Ad Hoc Networks
Q Feng, D He, S Zeadally, K Liang
IEEE Transactions on Industrial Informatics 16 (6), 4146-4155, 2019
1502019
A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing
K Liang, MH Au, JK Liu, W Susilo, DS Wong, G Yang, TVX Phuong, Q Xie
IEEE Transactions on Information Forensics and Security 9 (10), 1667-1680, 2014
1482014
Dissipative fault-tolerant control for nonlinear singular perturbed systems with Markov jumping parameters based on slow state feedback
J Wang, K Liang, X Huang, Z Wang, H Shen
Applied Mathematics and Computation 328, 247-262, 2018
1452018
A blockchain-based location privacy-preserving crowdsensing system
M Yang, T Zhu, K Liang, W Zhou, RH Deng
Future Generation Computer Systems 94, 408-418, 2019
1422019
Attribute-based data sharing scheme revisited in cloud computing
S Wang, K Liang, JK Liu, J Chen, J Yu, W Xie
IEEE Transactions on Information Forensics and Security 11 (8), 1661-1673, 2016
1412016
Certificateless public key authenticated encryption with keyword search for industrial internet of things
D He, M Ma, S Zeadally, N Kumar, K Liang
IEEE Transactions on Industrial Informatics 14 (8), 3618-3627, 2017
1392017
Extended proxy-assisted approach: Achieving revocable fine-grained encryption of cloud data
Y Yang, JK Liu, K Liang, KKR Choo, J Zhou
Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015
1192015
Privacy-preserving ciphertext multi-sharing control for big data storage
K Liang, W Susilo, JK Liu
IEEE transactions on information forensics and security 10 (8), 1578-1589, 2015
1132015
Two-factor data security protection mechanism for cloud storage system
JK Liu, K Liang, W Susilo, J Liu, Y Xiang
IEEE Transactions on Computers 65 (6), 1992-2004, 2015
1032015
Searchain: Blockchain-based private keyword search in decentralized storage
P Jiang, F Guo, K Liang, J Lai, Q Wen
Future Generation Computer Systems 107, 781-792, 2020
992020
Passive attacks against searchable encryption
J Ning, J Xu, K Liang, F Zhang, EC Chang
IEEE Transactions on Information Forensics and Security 14 (3), 789-802, 2018
842018
Secure sharing and searching for real-time video data in mobile cloud
JK Liu, MH Au, W Susilo, K Liang, R Lu, B Srinivasan
IEEE Network 29 (2), 46-50, 2015
782015
Time-based direct revocable ciphertext-policy attribute-based encryption with short revocation list
JK Liu, TH Yuen, P Zhang, K Liang
Applied Cryptography and Network Security: 16th International Conference …, 2018
702018
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20