|
Patent: ·
Singapore Patent:
Title: A Method Of Signing A Message
Patent number (granted) : 167062, granted on
15/12/2011 ·
Australia Patent Title: Transaction Protocol Patent application number (filed) : 2019903694, filed on
01/10/2019 Contribution to
International Standard: ·
ISO/IEC 29192-4:2013
Information technology - Security techniques - Lightweight cryptography -
Part 4: Mechanisms using asymmetric techniques Keynote Speech: ·
The 15th
International Conference on Information Security and Cryptology (Inscrypt 2019), Nanjing, China, 6-8 December, 2019 Title: Ring Confidential Transaction Protocol for Blockchain ·
The 18th IEEE
International Conference on Trust, Security and Privacy in Computing and
Communications (IEEE TrustCom 2019),
Rotorua, New Zealand, 5-8 August, 2019 Title: A Blockchain-enabled Society ·
2019 ACM
International Symposium on Blockchain and Secure Critical Infrastructure (BSCI 2019),
Auckland, New Zealand, 8 July, 2019 Title: A Blockchain-enabled Society ·
The 24th
Australasian Conference on Information Security and Privacy (ACISP 2019),
Christchurch, New Zealand, 3-5 July, 2019 Title: Advanced Forward and Backward Searchable Symmetric Encryption ·
The 11th
International Conference on Provable Security (ProvSec 2017),
Xian, 23-25 October, 2017 Title: (Linkable) Ring Signature and its Applications to Blockchain ·
IEEE International
Symposium on Security and Privacy in Social Networks and Big Data (IEEE SocialSec 2016), Fiji, 7-10 December, 2016 Title: Advanced Techniques on Searchable Encryption
·
Tao Jiang, Xiaofeng
Chen, Jin Li, Duncan S. Wong, Jianfeng
Ma, Joseph Liu, “TIMER: Secure and Reliable Cloud Storage against
Data Re-outsourcing”, Information Security Practice and Experience (ISPEC)
2014. - Best Student Paper Award. ·
Tsz Hon Yuen, Ye
Zhang, S. M. Yiu, Joseph K. Liu,
“Identity-based Encryption with Post-Challenge Auxiliary Inputs for Secure
Cloud Applications and Sensor Networks”, European Symposium on Research in
Computer Security (ESORICS) 2014. - Best Paper Award. ·
Yanjiang Yang, Joseph K. Liu, Kaitai
Liang, Raymond Choo and Jianying Zhou, “Extended
Proxy-Assisted Approach: Achieving Revocable Fine-Grained Cloud Data
Encryption”, European Symposium on Research in Computer Security (ESORICS)
2015. - Best Paper Award. ·
Shabnam Kasra Kermanshahi, Joseph K. Liu, Ron Steinfeld,
“Multi-user Cloud-Based Secure Keyword Search”, Australasian Conference on
Information Security and Privacy (ACISP) 2017. - Best Paper Award. Selected Recent
Publications: ·
Tsz Hon Yuen, Muhammed F. Esgin,
Joseph
K. Liu, Man Ho Au, Zhimin Ding, “DualRing: Generic Construction of Ring Signatures with
Efficient Instantiations”, CRYPTO 2021. ·
Shangqi
Lai, Xingliang Yuan, Joseph K. Liu, Xun Yi, Qi Li, Dongxi Liu,
Nepal Surya, “OblivSketch: Oblivious Network
Measurement as a Cloud Service”, NDSS 2021. ·
Shi-Feng Sun, Ron Steinfeld, Shangqi
Lai, Xingliang Yuan, Amin Sakzad,
Joseph
K. Liu, Surya Nepal, Dawu Gu, “Practical
Non-Interactive Searchable Encryption with Forward and Backward Privacy”, NDSS
2021. ·
Haoran
Yuan, Xiaofeng Chen, Guowen
Xu, Jianting Ning, Joseph K. Liu, Robert
Deng, “Efficient and Verifiable Proof of Replication with Fast Fault
Localization”, IEEE INFOCOM 2021. ·
Muhammed F. Esgin,
Raymond K. Zhao, Ron Steinfeld, Joseph K. Liu, Dongxi Liu, “MatRiCT:
Efficient, Scalable and Post-Quantum Blockchain Confidential Transactions
Protocol”, ACM CCS 2019. ·
Muhammed
F. Esgin, Ron Steinfeld, Joseph K. Liu, Dongxi Liu,
“Lattice-based Zero-Knowledge Proofs: New Techniques for Shorter and Faster
Constructions and Applications”, CRYPTO 2019. ·
Yevhen Zolotavkin,
Julian Garcia, Joseph K. Liu, “Time-dependent Decision-making and
Decentralization in Proof-of-Work Cryptocurrencies”, IEEE
Computer Security Foundations Symposium (CSF) 2019. ·
Shangqi
Lai, Sikhar Patranabis,
Amin Sakzad, Joseph
K. Liu*, Debdeep Mukhopadhyay, Ron Steinfeld,
Shifeng Sun, Dongxi
Liu, Cong Zuo, “Result
Pattern Hiding Searchable Encryption for Conjunctive Queries”. ACM CCS. 2018. ·
Shi-Feng
Sun, Xingliang Yuan, Joseph K. Liu, Ron Steinfeld, Amin Sakzad,
Viet Vo, Surya Nepal, “Practical Backward-Secure Searchable
Encryption from Symmetric Puncturable Encryption”. ACM CCS. 2018. ·
Wilson
Abel Alberto Torres, Ron Steinfeld, Amin Sakzad, Joseph K. Liu*, Veronika Kuchta, Nandita Bhattacharjee, Man Ho Au, Jacob Cheng,
“Post-Quantum One-Time Linkable Ring Signature and Application to Ring
Confidential Transactions in Blockchain (Lattice RingCT v1.0)”, ACISP 2018. ·
Shabnam Kasra Kermanshahi, Joseph K. Liu and Ron Steinfeld, “Multi-user Cloud-based Secure
Keyword Search”, ACISP 2017. [Best
Student Paper] ·
Shi-feng Sun, Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, “RingCT 2.0: A Compact
Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain
Cryptocurrency Monero”, ESORICS 2017. ·
Shi-Feng
Sun, Joseph K. Liu*, Amin Sakzad, Ron Steinfeld, Tsz Hon Yuen, “An Efficient
Non-Interactive Multi-client Searchable Encryption with Support for Boolean
Queries”, ESORICS 2016. ·
Yanjiang Yang, Joseph K. Liu, Kaitai Liang, Raymond
Choo and Jianying Zhou, “Extended Proxy-Assisted
Approach: Achieving Revocable Fine-Grained Cloud Data Encryption”, ESORICS 2015. [Best
Paper] ·
Tsz Hon Yuen, Ye Zhang, S. M. Yiu, Joseph K.
Liu, “Identity-based
Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud
Applications and Sensor Networks”, ESORICS,
2014. [Best Paper] Journal
Publication: My Google Citation Profile: http://scholar.google.com/citations?user=GGe9ON8AAAAJ&hl (* -
corresponding author) [2021 impact factor] (with
The Computing Research and Education Association of Australasia – CORE 2020
Journal Ranking) 2022 1. Xiaofeng Chen, Yunling
Wang, Jianfeng Wang, Shi-Feng Sun, Joseph K. Liu, “Achieving
Searchable Encryption Scheme with Search Pattern Hidden”, IEEE Transactions on Services Computing.
Accepted for publication. (Acceptance Date: 06/02/2020) [impact factor: 8.216]
[CORE Rank A*] 2.
Jianting
Ning, Jiageng Chen, Kaitai
Liang, Joseph K. Liu, Chunhua Su, Qianhong Wu, “Efficient Encrypted Data Search with
Expressive Queries and Flexible Update”,
IEEE Transactions on Services Computing. Accepted for publication.
(Acceptance Date: 22/06/2020) [impact factor: 8.216] [CORE Rank A*] 3. Shangqi Lai, Shifeng SunJoseph K. LiuRon Steinfeld, Amin Sakzad, Dongxi Liu “Practical Encrypted Network Traffic
Pattern Matching for Secure Middleboxes”, IEEE Transactions on Dependable and
Secure Computing. Accepted for publication. (Acceptance Date:
04/03/2021) [impact factor: 7.329] [CORE Rank A] 4. Viet
Vo, Xingliang Yuan, Shi-Feng Sun, Joseph K. Liu, Surya Nepal, Cong
Wang, “ShieldDB: An Encrypted Document Database
with Padding Countermeasures”, IEEE Transactions on Knowledge and
Data Engineering. Accepted for publication.
(Acceptance Date: 27/10/2021) [impact factor: 6.977] [CORE Rank A*] 5. Shi-Feng Sun, Cong Zuo, Joseph K.
Liu, Amin Sakzad, Ron Steinfeld, Tsz Hon
Yuen, Xingliang Yuan, Dawu
Gu, “Non-Interactive Multi-Client Searchable Encryption: Realization and
Implementation”, IEEE Transactions on
Dependable and Secure Computing. 19(1): 452-467 (2022) [impact factor: 7.329]
[CORE Rank A] 6. Shabnam Kasra,
Shi-Feng Sun, Joseph K. Liu, Ron
Steinfeld, Surya Nepal, Franky Lau, Man Ho Au, “Geometric range search on
encrypted data with Forward/Backward security”, IEEE Transactions on Dependable and Secure Computing. 19(1)
698-716 (2022) [impact factor: 7.329] [CORE
Rank A] 7. Cong Zuo,
Shi-Feng Sun, Joseph K. Liu,
Chun Shao, Josef Pieprzyk, Lei Xu, “Forward and
Backward Private DSSE for Range Queries”, IEEE Transactions on Dependable and Secure Computing. 19(1):
328-338 (2022) [impact factor: 7.329] [CORE
Rank A] 8. Yanxue Jia, Shifeng SunYuncong ZhangQingzhao ZhangNing DingZhiqiang LiuJoseph K. LiuDawu Gu, “PBT:
A New Privacy-Preserving Payment Protocol for Blockchain Transactions”, IEEE
Transactions on Dependable and Secure Computing. 19(1): 647-662 (2022) [impact
factor: 7.329] [CORE Rank A] 2021 9.
Peng
Jiang, Fuchun Guo, Willy Susilo, Man Ho Au, Xinyi
Huang, Joseph K. Liu, “Efficient
and Adaptive Procurement Protocol with Purchasing Privacy”, IEEE Transactions on Services Computing.
14(3): 683-694 (2021) [impact factor: 8.216] [CORE
Rank A*] 10. Shabnam Kasra,
Joseph K. Liu, Ron Steinfeld,
Surya Nepal, Shanghai Lai, Randolph Loh, Cong Zuo, “Multi-client Cloud-based Symmetric Searchable
Encryption”, IEEE Transactions on
Dependable and Secure Computing. 18(5): 2419-2437 (2021) [impact
factor: 7.329] [CORE Rank A] 11. Veronika Kuchta, Amin
Sakzad, Ron Steinfeld, Joseph K. Liu, “Lattice-based zero-knowledge arguments for
additive and multiplicative relations”, Designs,
Codes and Cryptography. 89(5): 925-963 (2021) [impact factor: 1.492] 12. Fan Zhang, Ziyuan
Liang, Cong Zuo, Jun Shao, Jianting
Ning, Jun Sun, Joseph K. Liu, Yibao Bao, “hPRESS: A
Hardware-Enhanced Proxy Re-Encryption Scheme Using Secure Enclave”, IEEE Transactions on Computer-Aided
Design of Integrated Circuits and Systems. 40(6): 1144-1157 (2021)
[impact factor: 2.807] 13. Lei Xu, Shifeng Sun, Xingliang Yuan, Joseph
K. Liu, Cong Zuo, Chungen
Xu, “Enabling Authorized Encrypted Search for Multi-Authority Medical
Databases”, IEEE Transactions on
Emerging Topics in Computing 9(1): 534-546 (2021) [impact factor: 7.691] 2020 14. Lei
Xu, Chungen Xu, Joseph K. Liu, Cong Zuo, Peng Zhang,
“Building a dynamic searchable encrypted medical database for
multi-client”, Information Sciences 527: 394-405 (2020) [impact factor: 6.795] [CORE
Rank A] 15. Xiaoqiang Sun, Peng Zhang, Joseph K. Liu, Jianping Yu, Weixin Xie, “Private machine
learning classification based on fully homomorphic encryption”, IEEE Transactions on Emerging Topics in
Computing 8(2): 352-364 (2020) [impact factor: 7.691] 16. Kai He, Jun Guo, Jian Weng, Jiasi Weng, Joseph
K. Liu, Xun Yi, “Attribute-based Hybrid
Boolean Keyword Search over Outsourced Encrypted Data”, IEEE Transactions on Dependable and
Secure Computing 17(6): 1207-1217 (2020) [impact factor: 7.329] [CORE Rank A] 17. Xiaoyu Zhang, Xiaofeng
Chen, Joseph K. Liu, Yang Xiang,
“DeepPAR and DeepDPA:
Privacy-Preserving and Asynchronous Deep Learning for Industrial IoT”, IEEE Transactions on Industrial
Informatics 16(3): 2081-2090 (2020) [impact factor: 10.215] 18. Shangqi Lai, Xingliang
Yuan, Amin Sakzad, Mahsa
Salehi, Joseph K. Liu, Dongxi Liu, “Enabling Efficient Privacy-Assured Outlier
Detection over Encrypted Incremental Datasets”, IEEE Internet of Things Journal 7(4): 2651-2662 (2020) [impact
factor: 9.471] 19. Xiao
Yang, Wang Fat Lau, Qingqing Ye, Man Ho Au, Joseph K. Liu, Jacob Cheng, “Practical Escrow Protocol for
Bitcoin”, IEEE
Transactions on Information Forensics and Security 15: 3023-3034 (2020) [impact
factor: 7.178] [CORE Rank A] 2019 20. Xiao Zhang, Shengli
Liu, Dawu Gu, Joseph K. Liu, “A generic construction of tightly secure
signatures in the multi-user setting”, Theoretical
Computer Science 775: 32-52 (2019) [impact factor: 0.827] [CORE Rank A] 21. Xun Yi, Zahir Tari, Feng
Hao, Liqun Chen, Joseph K. Liu, Xuechao Yang, Kwok-Yan
Lam, Ibrahim Khalil, Albert Y. Zomaya, “Efficient
threshold password-authenticated secret sharing protocols for cloud
computing”, Journal of Parallel and Distributed Computing 128: 57-70 (2019) [impact factor: 3.734] [CORE Rank A] 22. Yunling Wang, Jianfeng Wang,
Shifeng Sun, Joseph
K. Liu, Willy Susilo, Joonsang Baek, Ilsun You, Xiaofeng Chen, “Towards Multi-user Searchable
Encryption Supporting Boolean Query and Fast Decryption”, Journal of Universal Computer Science 25
(3): 222-244 (2019) 23. Bin Yu, Joseph
K. Liu, Surya Nepal, Jiangshan Yu, Paul Rimba,
“Proof-of-QoS: QoS based blockchain consensus protocol”, Computers &
Security 87 (2019) [impact
factor: 4.438] 2018 24. Bin Yu, Jarod Wright, Surya Nepal, Liming Zhu, Joseph K. Liu, Rajiv Ranjan, “IoTChain: Establishing Trust in the Internet of Things
Ecosystem Using Blockchain”, IEEE
Cloud Computing 5(4): 12-23 (2018) [impact factor: 4.393] 25. Peng Zhang, Zehong
Chen, Joseph K. Liu, Kaitai Liang, Hongwei Liu, “An Efficient Access Control
Scheme with Outsourcing Capability and Attribute Update for Fog Computing”,
Future Generation Computer Systems
78: 753-762 (2018) [impact factor: 7.187]
[CORE Rank A] 26. Ziyuan Hu, Shengli Liu, Kefei Chen, Joseph
K. Liu, “Revocable
Identity-Based Encryption and Server-Aided Revocable IBE from the
Computational Diffie-Hellman Assumption”, Cryptography 2(4): 33
(2018) 27. Zehong Chen, Fangguo
Zhang, Peng Zhang, Joseph K. Liu,
Jiwu Huang, Hanbang
Zhao, Jian Shen, “Verifiable keyword search for secure
big data-based mobile healthcare networks with fine-grained authorization
control”, Future Generation
Computer Systems 87: 712-724 (2018) [impact factor: 7.187] [CORE Rank A] 28. Jinguang Han, Ye Yang, Joseph K. Liu, Jiguo Li, Kaitai Liang, Jian Shen, “Expressive attribute-based
keyword search with constant-size ciphertext”, Soft Computing, 22(15): 5163-5177 (2018) [impact factor: 3.643] 29. Peng Zhang, Joseph K. Liu*, F. Richard Yu, Mehdi Sookhak,
Man Ho Au and Xiapu Luo, “A Survey on Access
Control in Fog Computing”, IEEE
Communications Magazine 15(2): 144-149 (2018). [impact factor: 9.619] 30. Man Ho Au, Kaitai
Liang, Joseph K. Liu*, Rongxing Lu, Jianting Ning,
“Privacy-Preserving Personal Data Operation on Mobile Cloud - Chances and
Challenges over Advanced Persistent Threat”, Future Generation Computer Systems 79: 337-349 (2018). [impact
factor: 7.187] [CORE Rank A] 31. Yang Li, Xiaoling
Tao, Wei Wu, Joseph K. Liu,
“GO-CP-ABE: group-oriented ciphertext attribute-based encryption”, International Journal of Embedded
Systems 10(1): 62-70 (2018). 32. Huige Wang, Kefei Chen, Joseph K. Liu, Ziyuan
Hu, Yu Long, “Access
control encryption with efficient verifiable sanitized decryption”, Information
Sciences 465: 72-85 (2018) [impact factor: 6.795] [CORE
Rank A] 33. Cong Zuo, Jun Shao, Joseph K. Liu, Guiyi
Wei and Yun Ling, “Fine-Grained Two-Factor Protection Mechanism for Data
Sharing in Cloud Storage”, IEEE
Transactions on Information Forensics and Security 13(1): 186-196 (2018). [impact factor: 7.178] [CORE
Rank A] 34. Hui Cui, Robert H. Deng, Joseph K. Liu, Xun Yi, Yingjiu Li, “Server-Aided
Attribute-Based Signature with Revocation for Resource-Constrained
Industrial Internet of Things Devices”, IEEE Transactions on
Industrial Informatics. 14(8): 3724-3732 (2018) [impact factor: 10.215] 35. Ding Wang, Jian Shen, Joseph K. Liu, Kim-Kwang Raymond Choo, “Rethinking Authentication
on Smart Mobile Devices”, Wireless
Communications and Mobile Computing 2018: 7079037:1-7079037:4 (2018)
[impact factor: 2.336] 2017 36. Wei Wu, Shun Hu, Xu Yang, Joseph K. Liu, Man Ho Au, “Towards secure and cost-effective
fuzzy access control in mobile cloud computing”, Soft Computing, 21(10): 2643-2649 (2017) [impact factor: 3.643] 37. Man Ho Au, Joseph
K. Liu*, Zhenfei Zhang, Willy Susilo, Jin Li, Jianyiing Zhou, “Anonymous Announcement System (AAS)
for Electric Vehicle in VANETs”, Computer Journal, 60(4): 588-599
(2017) [impact factor: 1.494] 38. Man Ho Au, Tsz Hon Yuen, Joseph K. Liu*, Willy Susilo, Xinyi Huang, Yang Xiang, Zoe L.
Jiang, “A General Framework for Secure Sharing of Personal Health Records
in Cloud System”, Journal of Computer
and System Sciences 90: 46-62 (2017) [impact factor: 1.023] [CORE
Rank A*] 39. Yiteng Feng, Guomin
Yang, Joseph K. Liu, “A New
Public Remote Integrity Checking Scheme with User and Data Privacy”, International Journal of Applied
Cryptography 3(3): 196-209 (2017) 2016 40. Shi-feng Sun, Joseph K. Liu, Yu Yu, Baodong Qin, Dawu Gu, “RKA-Secure Public Key Encryptions against
Efficiently Invertible Functions”, Computer
Journal 59(11): 1637-1658 (2016). [impact factor: 1.494] 41. Jiangtao Li, Lei Zhang, Joseph K. Liu, Haifeng Qian, Zheming
Dong, “Privacy-Preserving Public Auditing Protocol for Low Performance End
Devices in Cloud”, IEEE
Transactions on Information Forensics and Security 11(11):
2572-2583 (2016). [impact factor: 7.178] [CORE
Rank A] 42. Kaitai Liang, Xinyi Huang, Fuchun
Guo, Joseph K. Liu,
“Privacy-Preserving and Regular Language Search over Encrypted Cloud Data”,
IEEE Transactions on Information Forensics and
Security 11(10): 2365-2376 (2016). [impact factor: 7.178] [CORE
Rank A] 43. Shulan Wang, Junwei Zhou, Jianping Yu, Joseph
K. Liu, Jianyong Chen, “An Efficient File
hierarchy Attribute-Based Encryption Scheme in Cloud Computing”, IEEE Transactions on Information Forensics and
Security 11(6): 1265 - 1277 (2016). [impact
factor: 7.178] [CORE Rank A] 44. Shulan Wang, Kaitai Liang, Joseph K. Liu, Jianyong
Chen, Jianping Yu, Weixin
Xie, “Attribute-Based Data Sharing Scheme
Revisited in Cloud Computing”, IEEE
Transactions on Information Forensics and Security 11(8): 1661-1673 (2016). [impact
factor: 7.178] [CORE Rank A] 45. Xu Yang, Xinyi Huang, Joseph K. Liu, “Efficient Handover Authentication with User
Anonymity and Untraceability for Mobile Cloud
Computing”, Future Generation
Computer Systems 62: 190-195 (2016). [impact factor: 7.187] [CORE
Rank A] 46. Kai He, Jiang Weng, Robert H. Deng, Joseph K. Liu, “On the security of
two identity-based conditional proxy re-encryption schemes”, Theoretical Computer Science 652:
18-27 (2016). [impact factor: 0.827] [CORE Rank A] 47. Joseph
K. Liu, Man Ho Au, Xinyi
Huang, Rongxing Lu, Jin
Li, “Fine-grained Two-factor Access Control for Web-based Cloud Computing
Services”, IEEE
Transactions on Information Forensics and Security 11(3):
484-497 (2016). [impact factor: 7.178] [CORE
Rank A] 48. Joseph
K. Liu, Kaitai
Liang, Willy Susilo, Jianghua Liu, Yang Xiang, “Two-Factor
Data Security Protection Mechanism for Cloud Storage System”, Computing”, IEEE Transactions on Computers 65(6): 1992-2004 (2016). [impact factor: 2.663]
[CORE Rank A*] 49. Joseph
K. Liu, Sze Ling Yeo, Wue-She Yap, Sherman S. M. Chow, Duncan S. Wong, Willy
Susilo, “Faulty
Instantiations of Threshold Ring Signature from Threshold
Proof-of-Knowledge Protocol”, Computer Journal 59(7): 945-954 (2016). [impact factor: 1.494] 50. Joseph
K. Liu, Tsz Hon Yuen, Man Ho
Au, Junbin Fang, Zoe L. Jiang, Willy Susilo, Jianying Zhou “Efficient
Privacy-Preserving Charging Station Reservation System for Electric
Vehicles”, Computer Journal 59(7): 1040-1053 (2016). [impact factor: 1.494] 2015 51. Joseph K. Liu, Cheng-Kang Chu, Sherman
S.M. Chow, Xinyi Huang, Man Ho Au, and Jianying
Zhou, “Time-Bound Anonymous Authentication
for Roaming Networks”, IEEE
Transactions on Information Forensics and Security 10(1):178-189
(2015). [impact factor: 7.178] [CORE Rank A] 52. Joseph
K. Liu, Man Ho Au, Willy
Susilo, Kaitai Liang, Rongxing
Lu, Bala Srinivasan, “Secure Sharing and
Searching for Real-Time Video Data in Mobile Cloud”, IEEE Network 29(2):46-50
(2015). [impact factor: 10.693] 53. Kaitai Liang, Joseph
K. Liu*, Rongxin Lu, Duncan S. Wong, “Privacy Concerns for Photo-Sharing
in Online Social Networks”, IEEE
Internet Computing 19(2): 58-63 (2015). [impact factor: 2.341] 54. Xinyi
Huang, Joseph K. Liu*, Shaohua Tang, Yang Xiang, Li Xu, Kaitai
Liang, Jianying Zhou, “Cost-Effective Authentic and
Anonymous Data Sharing with Forward Security”, IEEE Transactions on Computers 64(4): 971-983 (2015). [impact
factor: 2.663] [CORE Rank A*] 55. Xiaoding Wang,Li Xu, Shuming Zhou, Joseph K. Liu, “A Resolving Set based Algorithm for
Fault Identification in Wireless Mesh Networks”, Journal of Universal
Computer Science 21(3):384-405 (2015). [impact factor: 0.91] 56. Kaitai Liang, Willy Susilo, Joseph K. Liu*, “Privacy-Preserving
Ciphertext Sharing Mechanism for Big Data Storage”, IEEE
Transactions on Information Forensics and Security 10(8):
1578-1589 (2015). [impact factor: 7.178] [CORE
Rank A] 57. Tsz Hon
Yuen, Joseph K. Liu*, Man Ho Au,
Xinyi Huang, Willy Susilo, Jianying Zhou, “K-times
Attribute-Based Anonymous Access Control for Cloud Computing”, IEEE Transactions on Computers 64(9):
2595-2608 (2015). [impact factor: 2.663]
[CORE Rank A*] 58. Joonsang Baek, Quang Hieu Vu, Joseph
K. Liu, Xinyi Huang, Yang Xiang, “A secure cloud computing based
framework for big data information management of smart grid”, IEEE Transactions on Cloud Computing
3(2): 233-244 (2015). [impact factor: 5.938] 59. Ying-Kai Tang, Sherman
S. M. Chow, Joseph K. Liu, “Comments on “Efficient
Revocable Certificateless Encryption Secure in the Standard Model””, Computer Journal 58(4): 779-781
(2015). [impact factor: 1.494] 60. Shuquan Hou, Xinyi Huang, Joseph K. Liu, Jin Li, Li Xu, “Universal
Designated Verifier Signatures for Graph-based Big Data”, Information Sciences 318: 144-156
(2015). [impact factor: 6.795] [CORE Rank A] 61. Jianghua Liu, Xinyi Huang, Joseph K. Liu, “Secure Sharing of Personal Health Records in
Cloud Computing: Ciphertext-Policy Attribute Based Signcryption”,
Future Generation Computer Systems
52: 67-76 (2015). [impact factor: 7.187] [CORE Rank A] 62. Kaitai Liang, Man Ho Au, Joseph K. Liu*, Willy Susilo, Duncan S. Wong, Guomin Yang, Yong Yu, Anjia
Yang, “A Secure and Expressive Ciphertext-Policy Attribute-Based Proxy
Re-Encryption for Cloud Data Sharing”, Future
Generation Computer Systems 52:95-108 (2015). [impact factor: 7.187] [CORE
Rank A] 63. Tao Jiang, Xiaofeng
Chen, Jin Li, Duncan S Wong, Jianfeng
Ma, Joseph K. Liu, “Towards
secure and reliable cloud storage against data re-outsourcing”, Future
Generation Computer Systems 52:86-94
(2015). [impact factor: 7.187] [CORE Rank A] 64. Kaitai Liang, Willy Susilo, Joseph K. Liu, Duncan S. Wong, “Efficient and Fully CCA Secure
Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption”,
Computer Journal 58(10):
2778-2792 (2015). [impact factor: 1.494] 65. Wun-She Yap, Joseph
K. Liu, Syh-Yuan Tan, Bok-Min Goi, “On the security of a lightweight authentication
and encryption scheme for MANET”, Security
and Communication Networks 8(17): 3094-3098 (2015). [impact factor: 1.791] 66. Mengting Li, Xinyi Huang, Joseph K. Liu, Li Xu, Wei Wu, “Cooperative attribute-based
access control for enterprise computing system”, International Journal of Embedded Systems 7(3/4): 191 – 202
(2015). 2014 67. Joseph
K. Liu, Tsz Hon Yuen, Man Ho
Au, Willy Susilo, “Improvements on an Authentication Scheme for Vehicular
Sensor Network”, Expert Systems With Applications 41(5):
2559-2564 (2014). [impact factor: 6.954] 68. Joseph
K. Liu, Man Ho Au, Willy
Susilo, Jianying Zhou, “Linkable Ring Signature with
Unconditional Anonymity”, IEEE
Transactions on Knowledge and Data Engineering 26(1) 157-165 (2014). [impact factor: 6.977] [CORE
Rank A*] 69. Man Ho Au, Joseph
K. Liu*, Jun-bin Fang, Zoe L. Jiang, Willy Susilo, Jianying
Zhou, “A New Payment
System for Enhancing Location Privacy of Electric Vehicles”, IEEE Transactions on Vehicular
Technology 63(1): 3-18 (2014). [impact factor: 5.978] 70. Rongxing Lu, Hui Zhu, Ximeng
Liu, Joseph K. Liu, Jun Shao, “Towards
Efficient and Privacy-Preserving Computing in Big Data Era”, IEEE Network 28(4): 46-50 (2014).
[impact factor: 10.693] 71. Fatos Xhafa, Jianfeng Wang, Xiaofeng Chen, Joseph K. Liu, Jin Li, Paul Krause, “An Efficient PHR Service System
Supporting Fuzzy Keyword Search and Fine-grained Access Control”, Soft Computing 18(9): 1795-1802
(2014). [impact factor 2.472] 72. Kaitai Liang, Man Ho Au, Joseph K. Liu*, Xie Qi, Willy Susilo,
Xuan Phoung Tran, Duncan S. Wong, Guomin Yang, “A DFA-based Functional Proxy
Re-Encryption Scheme for Secure Public Cloud Data Sharing,” IEEE Transactions on Information
Forensics and Security 9(10): 1667-1680 (2014). [impact
factor: 7.178] [CORE Rank A] 73. Chuan Yao, Li Xu, Xinyi Huang, Joseph K. Liu, “A secure remote data integrity checking cloud
storage system from threshold encryption”, Journal of Ambient Intelligence and Humanized Computing,
5:857-865 (2014). [impact factor: 1.910] 2013 74. Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying
Zhou, “Efficient
Linkable and/or Threshold Ring Signature without Random Oracles”, Computer Journal 56(4): 407-421
(2013). [impact factor: 1.494] 75. Man Ho Au, Joseph
K. Liu, Willy Susilo, Tsz Hon Yuen, “Secure ID-Based Linkable and Revocable-iff-Linked Ring Signature with Constant-Size
Construction ”, Theoretical Computer Science 469: 1-14 (2013). [impact factor: 0.827] [CORE
Rank A] 76. Cheng-Kang Chu, Wen Tao Zhu, Jin Han, Joseph
K. Liu, Jia Xu, Jianying Zhou, “Security
Concerns in Popular Cloud Storage Services”, IEEE Pervasive Computing 12(4): 50-57 (2013). [impact factor: 3.175]
[CORE Rank A] 77. Man Ho Au, Joseph
K. Liu*, Willy Susilo, Jianying Zhou, “Realizing Fully Secure Unrestricted
ID-based Ring Signature in the standard model from HIBE”, IEEE Transactions on Information
Forensics and Security 8(12): 1909-1922 (2013). [impact factor: 7.178] [CORE
Rank A] 78. Sze Ling Yeo, Wun-She
Yap, Joseph K. Liu*, Matt
Henricksen, “Comments on “Analysis and improvement of a secure and
efficient handover authentication based on bilinear pairing functions””, IEEE Communications Letters 17(8):
1521-1523 (2013). [impact factor: 3.436] 2010 79. Joseph K. Liu, Joonsang Baek,
Jianying Zhou, Yanjiang
Yang, Jun Wen Wong, “Efficient online/offline identity-based signature for
wireless sensor network”, International Journal of Information Security. 9(4): 287-296 (2010) [impact factor: 1.822] 2008 80. Joseph K. Liu, Duncan S. Wong, “Solutions to Key Exposure Problem in Ring
Signature”, International Journal of
Network Security, 6(2): 170-180 (2008) 81. Yong
Ho Hwang, Joseph K. Liu, Sherman S.M. Chow, “Certificateless Public Key Encryption Secure
against Malicious KGC Attacks in the Standard Model”, Journal of Universal Computer Science, 14(3), pages 463-480.
2008 [impact factor: 0. 696] 2007 82. Joseph K. Liu, Duncan S. Wong, “A
More Efficient Instantiation of Witness-Indistinguishable Signature”, International
Journal of Network Security, 5(2): 199-204 (2007) 83. Dennis Y. W. Liu, Joseph K. Liu, Yi Mu,
Willy Susilo, Duncan S. Wong, “Revocable Ring Signature”, Journal of Computer Science and
Technology, 22(6): 785-794 (2007) [impact factor: 0.878] 2006 84. Joseph K. Liu, Duncan S. Wong,
“Enhanced Security Models and a Generic Construction Approach for Linkable
Ring Signature”, International Journal of Foundation Computer Science,
17(6): 1403-1422 (2006) Refereed Articles in
Conference Proceedings: (with The Computing Research and Education
Association of Australasia - CORE Ranking) 2021 85. Runchao Han, Zhimei Sui, Jiangshan
Yu, Joseph K. Liu, Shiping Chen, “Fact and Fiction: Challenging the Honest
Majority Assumption of Permissionless Blockchains”, ACM Asia Conference on Computer and
Communications Security (AsiaCCS), pages 817-831,
ACM 2021. [CORE Rank A] 86. Haoran Yuan, Xiaofeng Chen,
Guowen Xu, Jianting
Ning, Joseph K. Liu, Robert
Deng, “Efficient and Verifiable Proof of Replication with Fast Fault
Localization”, IEEE INFOCOM, pages
1-10. 2021. [CORE
Rank A*] 87. Shangqi Lai, Xingliang Yuan,
Joseph K. Liu, Xun Yi, Qi Li, Dongxi Liu,
Nepal Surya, “OblivSketch: Oblivious Network
Measurement as a Cloud Service”, Network and Distributed System
Security Symposium
(NDSS) 2021. [CORE Rank A*] 88. Shi-Feng Sun, Ron Steinfeld, Shangqi Lai, Xingliang Yuan,
Amin Sakzad, Joseph
K. Liu, Surya Nepal, Dawu Gu, “Practical
Non-Interactive Searchable Encryption with Forward and Backward Privacy”, Network
and Distributed System Security Symposium (NDSS) 2021. [CORE Rank A*] 89. Tsz Hon Yuen, Muhammed F. Esgin, Joseph K. Liu, Man Ho Au, Zhimin Ding, “DualRing:
Generic Construction of Ring Signatures with Efficient Instantiations”, CRYPTO – Part I. Lecture Notes in Computer Science 12825, pages 251-281,
Springer 2021. [CORE
Rank A*] 90. Shabnam Kasra Kermanshahi, Rafael Dowsley,
Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Surya Nepal, Xun Yi, “Geo-DRS:
Geometric Dynamic Range Search on Spatial Data with Backward and Content Privacy”,
European
Symposium on Research in Computer Security (ESORICS
(2)), Lecture Notes in Computer Science 12973, pages 24-43,
Springer 2021. [CORE Rank A] 91. Viet Vo, Shangqi
Lai, Xingliang Yuan, Joseph K. Liu and Surya Nepal, “Towards Efficient and Strong
Backward Private Searchable Encryption with Secure Enclaves”, International
Conference on Applied Cryptography and Network Security (ACNS) – Part I. Lecture
Notes in Computer Science 12726, pages 50-75, Springer 2021. [CORE Rank
B] 92. Viet Vo, Shangqi
Lai, Xingliang Yuan, Joseph K. Liu and Surya Nepal, “Towards Efficient and Strong
Backward Private Searchable Encryption with Secure Enclaves”, International
Conference on Applied Cryptography and Network Security (ACNS) – Part I. Lecture
Notes in Computer Science 12726, pages 50-75, Springer 2021. [CORE Rank
B] 93. Dimaz Ankaa
Wijaya, Joseph K. Liu, Ron
Steinfeld, Dongxi Liu, “Transparency or Anonymity
Leak: Monero Mining Pools Data Publication”, Australasian Conference on Information
Security and Privacy (ACISP). Lecture Notes in Computer Science 13083, pages 433-450, Springer 2021. [CORE Rank B] 94. Yanjun Shen, Xingliang
Yuan, Shifeng Sun, Joseph K. Liu, Surya Nepal, “OblivShare:
Towards Privacy-Preserving File Sharing with Oblivious Expiration Control”,
Information Security Practice and
Experience Conference (ISPEC), Lecture Notes in Computer Science 13107, pages 126-144, Springer 2021.
[CORE Rank B] 95. Joseph
K. Liu, Man Ho Au, Tsz Hon
Yuen, Cong Zuo, Jiawei Wang, Amin Sakzad, Xiapu Luo, Li Li, Kim-Kwang Raymond Choo, “Privacy-Preserving Contact
Tracing Protocol for Mobile Devices: A Zero-Knowledge Proof Approach”, Information Security Practice and Experience Conference (ISPEC), Lecture Notes in Computer Science 13107, pages 327-344, Springer 2021.
[CORE Rank B] 2020 96. Viet Vo, Shangqi Lai,
Xingliang Yuan, Shi-Feng Sun, Surya Nepal, Joseph K. Liu, “Accelerating
Forward and Backward Private Searchable Encryption Using Trusted Execution”,
International Conference on Applied
Cryptography and Network Security (ACNS) – Part II. Lecture Notes in Computer Science 12124, pages 83-103, Springer 2020. [CORE Rank B] 97. Tsz Hon Yuen, Shi-Feng Sun, Joseph K. Liu, Muhammed F. Esgin, Qingzhao Zhang, Dawu Gu, “RingCT 3.0 for Blockchain Confidential
Transaction: Shorter Size and Stronger Security”, Financial Cryptography and Data Security (FC), Lecture Notes in Computer Science 12059, pages 464-483, Springer 2020. [CORE Rank A] 98. Shi-Feng Sun, Amin Sakzad,
Ron Steinfeld, Joseph K. Liu, Dawu Gu, "Public-Key Puncturable Encryption:
Modular and Compact Constructions", International
Conference on Practice and Theory of Public-Key Cryptography (PKC), Lecture
Notes in Computer Science 12110, pages 309-338, Springer 2020. [CORE Rank B] 2019 99. Muhammed F. Esgin,
Raymond K. Zhao, Ron Steinfeld, Joseph
K. Liu, Dongxi Liu, “MatRiCT:
Efficient, Scalable and Post-Quantum Blockchain Confidential Transactions
Protocol”, ACM SIGSAC Conference on Computer and Communications Security (CCS), pages 567-584, ACM 2019. [CORE Rank A*] 100.
Shabnam
Kasra Kermanshahi, Joseph K. Liu*, Ron Steinfeld and
Surya Nepal, “Generic Multi-keyword Ranked Search on Encrypted Cloud Data”,
European Symposium on Research in Computer Security (ESORICS
(2)), Lecture Notes in Computer Science 11735, pages 322-343,
Springer 2019. [CORE Rank A] 101.
Cong
Zuo, Shi-Feng Sun, Joseph K. Liu, Jun Shao and Josef Pieprzyk,
“Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward
Privacy”, European Symposium on Research in Computer
Security (ESORICS (2)), Lecture Notes in
Computer Science 11735, pages 283-303, Springer 2019. [CORE Rank A] 102.
Maxime
Buser, Joseph
K. Liu*, Ron Steinfeld, Amin Sakzad and
Shi-Feng Sun, “A Dynamic & Revocable Group Merkle Signature”, European Symposium on Research in Computer Security (ESORICS
(1)), Lecture Notes in Computer Science 11735, pages 194-214,
Springer 2019. [CORE
Rank A] 103.
Yevhen Zolotavkin,
Julian Garcia, Joseph K. Liu, “Time-dependent Decision-making and
Decentralization in Proof-of-Work Cryptocurrencies”, IEEE Computer Security Foundations
Symposium. DOI: 10.1109/CSF.2019.00015.
[CORE Rank A] 104.
Muhammed
F. Esgin, Ron Steinfeld, Joseph K. Liu, Dongxi Liu,
“Lattice-based Zero-Knowledge Proofs: New Techniques for Shorter and Faster
Constructions and Applications”, CRYPTO,
Lecture Notes in Computer Science 11692, pages 115-146,
Springer 2019. [CORE Rank A*] 105.
Muhammed
F. Esgin, Ron Steinfeld, Amin Sakzad,
Joseph K. Liu, Dongxi Liu, “Short Lattice-based One-out-of-Many Proofs
and Applications to Ring Signatures”, Applied
Cryptography and Network Security (ACNS), Lecture
Notes in Computer Science 11464, pages 67-88, Springer 2019. [CORE Rank B] 106.
Shi-Feng
Sun, Dawu Gu, Man Ho Au, Shuai Han, Yu Yu, Joseph K.
Liu, “Strong Leakage and tamper-resilient Public Key Encryption from
Refined Hash Proof Systems”, Applied
Cryptography and Network Security (ACNS), Lecture
Notes in Computer Science 11464, pages 486-506, Springer 2019. [CORE Rank B] 107.
Wilson
Alberto Torres, Veronika Kuchta, Ron Steinfeld,
Amin Sakzad, Joseph
K. Liu, Jacob Cheng, “Lattice RingCT v2.0 with Multiple Input and
Output Wallets”, Australasian Conference on Information Security and
Privacy (ACISP), Lecture Notes in Computer Science 11547, pages 156-175,
Springer 2019. 108.
Shuyang Tang, Sherman S. M. Chow, Zhiqiang Liu, Joseph
K. Liu, “Fast-to-Finalize Nakamoto-Like Consensus Protocol”, Australasian
Conference on Information Security and Privacy (ACISP), Lecture Notes in Computer Science 11547, pages 271-288, Springer 2019. 109.
Dimaz Ankaa
Wijaya, Joseph K. Liu, Ron
Steinfeld, Dongxi Liu, “Risk of Asynchronous
Protocol Update: Attacks to Monero Protocols”, Australasian Conference on
Information Security and Privacy (ACISP), Lecture
Notes in Computer Science 11547, pages 307-321, Springer 2019. 110.
Lin
Zhong, Qianhong Wu, Jan Xie,
Bo Qin, Joseph K. Liu, Huili Wang, “A Flexible Instant Payment System Based on
Blockchain”, Australasian Conference on Information Security and Privacy
(ACISP), Lecture Notes in Computer Science 11547, pages 289-306,
Springer 2019. 111.
Shangqi
Lai, Xingliang Yuan, Shi-Feng Sun, Joseph K. Liu, Yuhong
Liu, Dongxi Liu, “GraphSE^2: An Encrypted Graph
Database for Privacy-Preserving Social Search”, ACM Asia Conference on
Computer and Communications Security (AsiaCCS), pages
41-45, ACM 2019. [CORE Rank A] 112.
Dimaz
Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi
Liu, Jiangshan Yu, “On The Unforkability of
Monero”, ACM Asia Conference on Computer and Communications Security (AsiaCCS), pages 621-632, ACM 2019. [CORE Rank A] 2018 113.
Dimaz Ankaa
Wijaya, Joseph K. Liu*, Ron
Steinfeld, Dongxi Liu, “Monero Ring Attack:
Recreating Zero Mixin Transaction Effect”, TrustCom, pages 1196-1201, IEEE 2018. [CORE Rank A] 114.
Xiaoning Liu, Xingliang Yuan, Joseph
K. Liu, “Towards
Privacy-Preserving Forensic Analysis for Time-Series Medical Data”, TrustCom, pages 1664-1668, IEEE 2018. [CORE Rank A] 115.
Cong Zuo, Shi-Feng Sun, Joseph
K. Liu, Jun Shao, Josef Pieprzyk, “Dynamic
Searchable Symmetric Encryption Schemes Supporting Range Queries with
Forward (and Backward) Security”. European Symposium on Research in
Computer Security (ESORICS (2)), Lecture Notes in
Computer Science 11099, pages 228-246, Springer 2018. [CORE Rank A] 116.
Jianfeng
Wang, Xiaofeng Chen, Shi-Feng Sun, Joseph K. Liu, Man Ho Au, Zhi-Hui Zhan, “Towards Efficient Verifiable
Conjunctive Keyword Search for Large Encrypted Database”. European Symposium on Research in
Computer Security (ESORICS (2)), Lecture Notes in
Computer Science 11099, pages 83-100, Springer 2018. [CORE Rank A] 117.
Shangqi
Lai, Sikhar Patranabis,
Amin Sakzad, Joseph
K. Liu*, Debdeep Mukhopadhyay, Ron Steinfeld,
Shifeng Sun, Dongxi
Liu, Cong Zuo, “Result
Pattern Hiding Searchable Encryption for Conjunctive Queries”. ACM
SIGSAC Conference on Computer and Communications Security (CCS), pages
745-762, 2018. [CORE Rank A*] 118.
Shi-Feng
Sun, Xingliang Yuan, Joseph K. Liu, Ron Steinfeld, Amin Sakzad,
Viet Vo, Surya Nepal, “Practical Backward-Secure Searchable
Encryption from Symmetric Puncturable Encryption”. ACM SIGSAC Conference on
Computer and Communications Security (CCS), pages 763-780, 2018. [CORE Rank A*] 119.
Ziyuan Hu, Shengli Liu, Kefei Chen, Joseph K. Liu, “Revocable
Identity-Based Encryption from the Computational Diffie-Hellman Problem”, Australasian
Conference on Information Security and Privacy (ACISP) 2018, Lecture Notes in Computer Science 10946, pages 265-283, Springer 2018. 120.
Wilson
Abel Alberto Torres, Ron Steinfeld, Amin Sakzad, Joseph K. Liu*, Veronika Kuchta, Nandita Bhattacharjee, Man Ho Au, Jacob Cheng,
“Post-Quantum One-Time Linkable Ring Signature and Application to Ring
Confidential Transactions in Blockchain (Lattice RingCT v1.0)”, Australasian Conference on
Information Security and Privacy (ACISP) 2018, Lecture
Notes in Computer Science 10946, pages 558-576, Springer 2018. 121.
Joseph K. Liu, Tsz Hon Yuen, Peng Zhang, Kaitai Liang, “Time-Based Direct
Revocable Ciphertext-Policy Attribute-Based Encryption with Short
Revocation List”, Applied Cryptography & Network
Security (ACNS) 2018, Lecture Notes in Computer Science 10892, pages 516-534,
Springer 2018. [CORE
Rank B] 122.
Siyi Lv, Yanyu
Huang, Bo Li, Yu Wei, Zheli Liu, Joseph K. Liu, Dong Hoon Lee, “Forward Secure Searchable Encryption Using
Key-Based Blocks Chain Technique”, International Conference on Algorithms
and Architectures for Parallel Processing (ICA3PP) 2018, Lecture Notes in Computer Science 11337, pages 85-97, Springer 2018.
[CORE Rank B] 123.
Hao Ren, Peng Zhang, Qingchun Shentu, Joseph K. Liu, Tsz Hon Yuen, “Compact Ring
Signature in the Standard Model for Blockchain”, Information Security Practice and
Experience Conference (ISPEC) 2018, Lecture
Notes in Computer Science 11125, pages 50-65, Springer 2018. [CORE Rank B] 124.
Huige Wang, Kefei Chen, Joseph
K. Liu, Ziyuan Hu, “Leakage-Resilient Chosen-Ciphertext
Secure Functional Encryption from Garbled Circuits”, Information Security Practice and
Experience Conference (ISPEC) 2018, Lecture
Notes in Computer Science 11125, pages 119-140, Springer 2018. [CORE Rank B] 125.
Bin Yu, Joseph K. Liu, Amin Sakzad, Surya Nepal, Ron Steinfeld, Paul Rimba, Man Ho Au, “Platform-Independent Secure
Blockchain-Based Voting System”, Information Security Conference (ISC) 2018, Lecture Notes in Computer Science 11060, pages 369-386, Springer 2018.
[CORE Rank B] 126.
Peter Ince, Joseph K. Liu, Peng Zhang, “Adding
Confidential Transactions to Cryptocurrency IOTA with Bulletproofs”, International Conference on network and
System Security (NSS) 2018, Lecture Notes in Computer
Science 11058, pages 32-45, Springer 2018. [CORE Rank B] 127.
Weizhi Meng, Jianfeng Wang, Xianmin Wang, Joseph K. Liu, Zuoxia
Yu, Jin Li, Yongjun
Zhao, Sherman S. M. Chow, “Position Paper on Blockchain Technology: Smart Contract
and Applications”, International
Conference on network and System Security (NSS) 2018, Lecture Notes in Computer Science 11058, pages 474-483, Springer 2018.
[CORE Rank B] 128.
Runchao Han, Jiangshan Yu, Joseph K. Liu, Peng Zhang, “Evaluating CryptoNote-Style Blockchains”, Inscrypt 2018,
Lecture Notes in Computer Science 11449, pages 29-48, Springer 2018. [CORE
Rank B] 129.
Dimaz Ankaa
Wijaya, Joseph K. Liu, Ron
Steinfeld, Dongxi Liu, Tsz Hon Yuen, “Anonymity
Reduction Attacks to Monero”, Inscrypt 2018, Lecture Notes in Computer Science 11449,
pages 86-100, Springer 2018. [CORE Rank B] 130.
Zhimei Sui, Shangqi Lai, Cong Zuo, Xingliang Yuan, Joseph K. Liu, Haifeng Qian, “An Encrypted
Database with Enforced Access Control and Blockchain Validation”, Inscrypt 2018,
Lecture Notes in Computer Science 11449, pages 260-273, Springer 2018.
[CORE Rank B] 131.
Randolph Loh, Cong Zuo, Joseph K. Liu,
Shifeng Sun, “A Multi-client DSSE Scheme
Supporting Range Queries”, Inscrypt 2018, Lecture Notes in Computer Science 11449,
pages 289-307, Springer 2018. [CORE Rank B] 132.
Mark
H. Meng, Guangdong Bai, Joseph K. Liu, Xiapu Luo,
Yu Wang, “Analyzing Use of High
Privileges on Android: An Empirical Case Study of Screenshot and Screen
Recording Applications”, Inscrypt 2018, Lecture Notes in Computer Science 11449,
pages 349-369, Springer 2018. [CORE Rank B] 2017 133.
Shabnam Kasra Kermanshahi, Joseph K. Liu and Ron Steinfeld, “Multi-user Cloud-based Secure
Keyword Search”, Australasian Conference on
Information Security and Privacy (ACISP) 2017, Lecture
Notes in Computer Science 10342, pages 227-274, Springer 2017. 134.
Hui
Cui, Robert H. Deng, Joseph K. Liu
and Yingjiu Li, “Attribute-Based Encryption with Expressive and
Authorized Keyword Search”, Australasian Conference on
Information Security and Privacy (ACISP) 2017, Lecture
Notes in Computer Science 10342, pages 106-126, Springer 2017. 135.
Yanjiang Yang, Joseph K. Liu, Zhuo
Wei and Xinyi Huang, “Towards
Revocable Fine-Grained Encryption of Cloud Data: Reducing Trust upon Cloud”, Australasian
Conference on Information Security and Privacy (ACISP) 2017, Lecture Notes in Computer Science 10342, pages 127-144, Springer 2017. 136.
Peng
Zhang, Xiafei Zhang, Xiaoqiang
Sun, Joseph K. Liu, Jianping Yu and Zoe Jiang, “Anonymous Anti-Sybil Attack
Protocol for Mobile Healthcare Networks Analytics”, TrustCom,
pages 668-674, IEEE 2017. [CORE Rank A] 137.
Shi-feng Sun, Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, “RingCT 2.0: A Compact
Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain
Cryptocurrency Monero”, European Symposium on Research in
Computer Security (ESORICS (2)), Lecture Notes in
Computer Science 10493, pages 456-474, Springer 2017. [CORE
Rank A] 138.
Yunling
Wang, Jianfeng Wang, Shi-Feng Sun, Joseph K. Liu, Willy Susilo and Xiaofeng Chen, “Towards Multi-user Searchable
Encryption Supporting Boolean Query and Fast Decryption”, International Conference on Provable Security (ProvSec), Lecture Notes in Computer
Science 10592, pages 24-38, Springer 2017. [CORE Rank B] 139.
Dimaz
Ankaa Wijaya, Joseph K. Liu, Dony Suwarsono and Peng Zhang, “A New Blockchain-based
Value-Added Tax System”, International
Conference on Provable Security (ProvSec), Lecture Notes in Computer Science 10592, pages 471-486, Springer 2017. [CORE Rank B] 2016 140.
Yili Ren, Xiling Luo, Qianhong Wu, Joseph K. Liu, Peng Zhang, “Towards
Certificate-Based Group Encryption”, International Conference on Provable
Security (ProvSec), Lecture Notes
in Computer Science 10005, pages 296-305, Springer 2016. [CORE Rank B] 141.
Dimaz Ankaa
Wijaya, Ron Steinfeld, Joseph K. Liu,
Shi-Feng Sun and Xinyi Huang, “Anonymizing Bitcoin Transaction”, Information
Security Practice and Experience (ISPEC), Lecture
Notes in Computer Science 10060, pages 271-283, Springer 2016. [CORE Rank B] 142.
Shi-Feng Sun, Joseph K. Liu*, Amin Sakzad, Ron Steinfeld, Tsz Hon Yuen, “An Efficient
Non-Interactive Multi-client Searchable Encryption with Support for Boolean
Queries”, European
Symposium on Research in Computer Security (ESORICS
(1)), Lecture Notes in Computer Science 9878, pages 154-172,
Springer 2016. [CORE Rank A] 143.
Kaitai Liang, Joseph K. Liu, Rongxing
Lu, Man Ho Au, “While Mobile Encounters with Clouds”, Network and System
Security (NSS), Lecture Notes in Computer Science 9955, pages 3-18,
Springer 2016. [CORE
Rank B] 144.
Kai He, Jian Weng, Joseph K. Liu, Wanlie
Zhou, Jia-Nan Liu, “Efficient
Fine-Grained Access Control for Secure Personal Health Records in Cloud
Computing”, Network and System
Security (NSS), Lecture Notes in Computer Science 9955, pages 65-79,
Springer 2016. [CORE
Rank B] 145.
Xu
Yang, Ting-Ting Lee, Joseph K. Liu,
Xinyi Huang, “Trust Enhancement over Range Search for Encrypted
Data”, IEEE TrustCom 2016, pg. 66-73. IEEE. 2016.
[CORE Rank A] 146.
Cong
Zuo, James Macindoe, Siyin Yang, Ron Steinfeld, Joseph K. Liu*, “Trusted Boolean Search on Cloud
Using Searchable Symmetric Encryption”, IEEE TrustCom
2016, pg. 113-120. IEEE. 2016. [CORE Rank A] 147.
Xu
Yang, Yuexin Zhang, Joseph K. Liu, Yali Zeng, “A Trust and Privacy Preserving Handover Authentication Protocol
for Wireless Networks”, IEEE TrustCom 2016,
pg. 138-143. IEEE. 2016. [CORE Rank A] 148.
Shi-Feng Sun, Dawu Gu, Joseph
K. Liu, Udaya Parampalli, Tsz Hon Yuen, “Efficient Construction of Completely
Non-Malleable CCA Secure Public Key Encryption”, ASIACCS 2016, pg. 901-906. ACM 2016. [CORE
Rank A] 149.
Kaitai
Liang, Chunhua Su, Jiageng Chen and Joseph
K. Liu, “Efficient Multi-Function Data Sharing and Searching Mechanism
for Cloud-Based Encrypted Big Data”, ASIACCS 2016, pg. 83-94. ACM 2016. [CORE Rank A] 150.
Yanjiang Yang, Haibing Lu, Joseph K. Liu, Jian Weng, Youcheng Zhang and Jianying
Zhou, “Credential
Wrapping: From Anonymous Password Authentication to Anonymous Biometric
Authentication”, ASIACCS 2016, pg. 141-152. ACM 2016. [CORE Rank A] 151.
Kai
He, Jian Weng, Jia'Nan Liu, Joseph K. Liu, Robert Deng and Wei Liu, “Anonymous
Identity-Based Broadcast Encryption with Chosen-Ciphertext Security”, ASIACCS 2016, pg. 247-256. ACM 2016. [CORE
Rank A] 2015 152.
Hua Deng, Qianhong Wu, Bo Qin, Willy Susilo, Joseph K. Liu, Wenchang Shi, “Asymmetric Cross-cryptosystem
Re-encryption Applicable to Efficient and Secure Mobile Access to
Outsourced Data”, ASIACCS, pg. 393-404. ACM 2015. [CORE
Rank A] 153.
Yanjiang
Yang, Joseph K. Liu, Kaitai Liang, Raymond Choo and Jianying
Zhou, “Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained
Cloud Data Encryption”, European Symposium on Research in
Computer Security (ESORICS (2)), Lecture Notes in
Computer Science 9327, pages 146-166, Springer 2015. [CORE
Rank A] 154.
Xun
Yi, Feng Hao, Liqun Chen, Joseph K. Liu, “Practical Threshold Password-Authenticated
Secret Sharing Protocol”, European Symposium on Research in
Computer Security (ESORICS (1)), Lecture Notes in
Computer Science 9326, pages 347-365, Springer 2015. [CORE
Rank A] 155.
Xu Yang, Wei Wu, Joseph K. Liu, Xiaofeng
Chen, “Lightweight Anonymous Authentication for Ad Hoc Group: A Ring
Signature Approach”, ProvSec 2015, Lecture Notes in Computer Science 9451, pages 215-226, Springer 2015.
[CORE Rank B] 156.
Xu
Yang, Joseph K. Liu, Wei Wu, Man
Ho Allen Au, Willy Susilo, “PEVTS: Privacy-Preserving Electric Vehicles
Test-Bedding Scheme”, IEEE International 157.
Yanjiang Yang, Jiqiang Lu, Kim-Kwang Raymond Choo, Joseph K. Liu, “On Lightweight
Security Enforcement in Cyber-Physical Systems”, LightSec 2015, Lecture Notes in Computer Science 9542, pages 97-112, Springer 2015. 158.
Shangqi
Lai, Joseph K. Liu, Raymond Choo
and Kaitai Liang, “Secret Picture: An Efficient
Tool for Mitigating Deletion Delay on OSN”, International Conference on
Information and Communications Security (ICICS) 2015, Lecture Notes in Computer Science 9543, pages 467-477, Springer 2015. [CORE Rank B] 159.
Yiteng
Feng, Yi Mu, Guomin Yang, Joseph K. Liu, “A New Public Remote Integrity
Checking Scheme with User Privacy”, Australasian Conference on
Information Security and Privacy (ACISP) 2015, Lecture
Notes in Computer Science 9144, pages 377-394, Springer 2015. 2014 160.
Tao
Jiang, Xiaofeng Chen, Jin
Li, Duncan S. Wong, Jianfeng Ma, Joseph K. Liu, “TIMER:
Secure and Reliable Cloud Storage against Data Re-outsourcing”, Information
Security Practice and Experience (ISPEC), Lecture Notes in
Computer Science 8434, pages 346-358, Springer 2014. [CORE Rank B] 161.
Haixin
Nie, Xiaofeng Chen, Jin Li, Joseph K. Liu, Wenjing Lou, “Efficient
and Verifiable Algorithm for Secure Outsourcing of Large-scale Linear
Programming”, 28th IEEE International Conference on
Advanced Information Networking and Applications (AINA) pages 591-596, IEEE 2014. [CORE Rank B] 162.
Joseph K.
Liu, Man Ho Au, Xinyi Huang, Willy Susilo, Jianying
Zhou, Yong Yu, “New
Insight to Preserve Accuracy and Privacy in Online Survey and Other Systems with Big
Data”, European
Symposium on Research in Computer Security (ESORICS),
Lecture Notes in Computer Science 8713, pages 182-199, Springer 2014. [CORE
Rank A] 163.
Tsz Hon Yuen, Ye Zhang, S. M. Yiu, Joseph K.
Liu, “Identity-based
Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud
Applications and Sensor Networks”, European Symposium on Research in Computer Security (ESORICS),
Lecture Notes in Computer Science 8712, pages 130-147, Springer 2014. [CORE
Rank A] 164.
Kaitai Liang, Joseph K. Liu, Duncan S. Wong, Willy
Susilo, “An Efficient
Cloud-based Revocable Identity-based Proxy Re-encryption Scheme for Public
Clouds Data Sharing”, European Symposium on
Research in Computer Security (ESORICS), Lecture Notes in Computer Science
8712, pages 257-272, Springer 2014. [CORE Rank A] 165.
Mengting Li, Xinyi Huang, Joseph K. Liu, Li Xu, “GO-ABE:
Group-Oriented Attribute-Based Encryption”, Network and System Security (NSS),
Lecture Notes in Computer Science 8792, pages 260-270. Springer 2014. [CORE Rank B] 2013 166.
Cheng-Kang-Chu, Joseph K. Liu, Jun Wen Wong, Yunlei Zhao, Jianying Zhou, “Privacy-preserving
Smart Metering with Regional Statistics and Personal Enquiry Services”,
ASIACCS, pages 368-380, ACM 2013. [CORE Rank A] 167.
Yang
Wang, Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Willy Susilo, “Threshold-Oriented Optimistic Fair
Exchange”, The 7th International Conference on Network
and System Security (NSS), Lecture Notes in Computer Science 7873, pages
424-438, Springer 2013. [CORE
Rank B] 168.
Tsz Hon Yuen, Cong
Zhang, Sherman S. M. Chow, Joseph K.
Liu, “Towards Anonymous Ciphertext Indistinguishability with Identity
Leakage”, ProvSec 2013, Lecture Notes in Computer
Science 8209, pages 139-153, Springer 2013. [CORE Rank B] 2012 169.
Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou, “Enhancing Location Privacy for
Electric Vehicles (at the right time)”, ESORICS 2012, Lecture Notes in Computer Science 7459, pages 397-414, Springer 2012. [CORE Rank A] 170.
Tsz Hon Yuen, Joseph K. Liu, Xinyi Huang, Man Ho
Au, Willy Susilo, Jianying Zhou, “Forward Secure
Attribute-Based Signatures”, ICICS
2012, Lecture Notes in Computer Science 7618, pages 167-177, Springer 2012.
[CORE Rank B] 171.
Yunmei Zhang, Joseph K. Liu, Xinyi Huang, Man Ho
Au, Willy Susilo, “Efficient
Escrow-Free Identity-Based Signature”, ProvSec 2012, Lecture Notes in Computer
Science 7496, pages 161-174, Springer 2012. [CORE Rank B] 172.
Cheng-Kang Chu, Joseph K. Liu, Xinyi Huang, Jianying Zhou, “Verifier-Local
Revocation Group Signatures with Time-Bound Keys”, ASIACCS 2012,
pages 26-27. ACM 2012.
[CORE Rank A] 2011 173.
Sherman S. M. Chow, Joseph
K. Liu, Jianying Zhou, “Identity-Based
Online/Offline Key Encapsulation and Encryption”, ASIACCS 2011, pages 52-60. ACM 2011. [CORE
Rank A] 174.
Tsz Hon Yuen, Joseph
K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou,
“Threshold Ring Signature without Random Oracles”, ASIACCS 2011, pages 261-267. ACM 2011. [CORE
Rank A] 175.
Joseph K. Liu, Cheng-Kang Chu, Jianying Zhou, “Identity-Based
Server-Aided Decryption”,
ACISP 2011, Lecture Notes in Computer Science 6812, pages 337-352. Springer
2011. 176.
Joseph K. Liu, Tsz Hon Yuen, Jianying Zhou, “Forward Secure
Ring Signature without Random Oracles”, ICICS 2011, Lecture Notes in Computer Science 7043, pages 1-14.
Springer 2011. [CORE
Rank B] 177.
Joseph K. Liu, Feng Bao, Jianying Zhou, “Short and
Efficient Certificate-Based Signature”, Networking Workshops 2011, Lecture Notes in Computer Science 6827,
pages 167-178. Springer 2011. 2010 178.
Cheng-Kang Chu, Joseph
K. Liu, Jianying Zhou, Feng Bao, Robert H.
Deng, “Practical ID-based encryption for wireless sensor network”, ASIACCS
2010: pages 337-340, ACM, 2010. [CORE Rank A] 179.
Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying
Zhou, “Short Generic Transformation to Strongly Unforgeable Signature in
the Standard Model”, ESORICS 2010, Lecture
Notes in Computer Science 6345, pages 168-181, Springer 2010. [CORE Rank A] 180.
Patrick P. Tsang, Man
Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong, “A Suite of
Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels
of Anonymity (Extended Abstract)”, ProvSec 2010, Lecture
Notes in Computer Science 6402, pages 166-183,
Springer 2010. [CORE Rank B] 181.
Joseph K. Liu, Joonsang Baek, Jianying Zhou, “Online/Offline
Identity-Based Signcryption Revisited”, Inscrypt 2010,
Lecture Notes in Computer Science 6584, pages 36-51. Springer 2010. [CORE Rank B] 2009 182.
Joonsang Baek,
Willy Susilo, Joseph K. Liu, Jianying
Zhou, “A New Variant of the Cramer-Shoup KEM
Secure against Chosen Ciphertext Attack”, ACNS 2009. Lecture
Notes in Computer Science 5536, pages 143-155, Springer 2009. [CORE
Rank B] 183.
Joseph K. Liu, Jianying Zhou, “An
Efficient Identity-Based Online/Offline Encryption Scheme”, ACNS 2009. Lecture
Notes in Computer Science 5536, pages 156-167, Springer 2009. [CORE
Rank B] 184.
Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying
Zhou, “Online/Offline Ring Signature Scheme”, ICICS. Lecture
Notes in Computer Science 5927, pages 80-90, Springer 2009. [CORE
Rank B] 185.
Joseph K. Liu, Joonsang Baek, Jianying Zhou,
“Certificate-based sequential aggregate signature”, WISEC 2009, pages
21-28, ACM, 2009. 2008 186.
Sherman. S. Chow, Joseph K. Liu, Duncan S. Wong, “Robust Receipt-Free Election
System with Ballot Secrecy and Verifiability”, NDSS 2008, pages 81-94, Internet
Society, 2008. [CORE
Rank A*] 187.
Man Ho Au, Qiong Huang, Joseph K. Liu, 188.
Tsz Hon Yuen, 189.
Joseph
K. Liu, 190.
Joseph
K. Liu, 2007 191.
Man Ho Au, Joseph K. Liu, Willy Susilo, Tze
Hon Yuen, “Certificate Based (Linkable) Ring Signature”, ISPEC 2007, Lecture Notes in Computer
Science 4464, page
79-92. Springer, 2007. [CORE Rank B] 192.
Tsz Hon Yuen, Man Ho Au, Joseph K. Liu,
Willy Susilo,
“(Convertible) Undeniable Signatures Without Random Oracles.” ICICS 2007, Lecture Notes in Computer Science 4861, pages 83-97. Springer, 2007. [CORE Rank B] 193.
Joseph K. Liu, Man Ho Au, Willy Susilo,
“Self-Generated-Certificate Public Key Cryptography and certificateless
signature/encryption scheme in the standard model: extended abstract”,
ASIACCS 2007, pages 273-283, ACM, 2007. [CORE Rank A] 194.
Man Ho Au, Yi Mu, Jing Chen, Duncan S. Wong, Joseph K. Liu, Guomin Yang, “Malicious KGC attacks in certificateless
cryptography”, ASIACCS 2007, pages
302-311, ACM, 2007. [CORE Rank A] 2006 195.
Sherman S. M. Chow,
Victor K.-W. Wei, Joseph K. Liu, Tsz Hon Yuen, “Ring signatures
without random oracles”, ASIACCS 2006, pages 297-302, ACM, 2006. [CORE
Rank A] 196.
Yuen-Yan Chan, Sebastian Fleissner,
Joseph K. Liu, Jin Li, “Single Sign-On and Key Establishment for
Ubiquitous Smart Environments”,
ICCSA(4) 2006, Lecture
Notes in Computer Science 3983, pages 406-415, Springer, 2006 197.
Man Ho Au, Joseph K. Liu, Willy Susilo, Tsz
Hon Yuen, “Constant-Size ID-Based Linkable
and Revocable-iff-Linked Ring Signature”, INDOCRYPT 2006, Lecture Notes in Computer Science 4329, pages 364-378, Springer, 2006. [CORE Rank B] 198.
Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Duncan S. Wong,
“ID-Based Ring Signature Scheme Secure in the Standard Model”, IWSEC 2006, Lecture Notes in Computer Science 4266, pages 1-16, Springer, 2006.
[CORE Rank B] 199.
Joseph K. Liu, Willy Susilo, Duncan S. Wong, “Ring Signature with Designated
Linkability”, IWSEC 2006, Lecture Notes in
Computer Science 4266, pages 104-119,
Springer, 2006. [CORE
Rank B] 2005 200.
Sherman S.M. Chow, Zhengjun
Cao, Joseph K. Liu, “Security Analysis of Three Cryptographic
Schemes”, CISC 2005 (later known as Inscrypt), Lecture
Notes in Computer Science 3822, pages 290-301. Springer, 2005 201.
Joseph K. Liu, Patrick P.
Tsang, Duncan S. Wong, “Efficient Verifiable Ring Encryption for Ad Hoc
Groups”, ESAS 2005, Lecture Notes in Computer Science
3813, pages
1-13. Springer, 2005 202.
Joseph K. Liu, Patrick P.
Tsang, Duncan S. Wong, “Recoverable and Untraceable E-Cash”, EuroPKI 2005, Lecture Notes in Computer Science
3545, pages
206-214. Springer, 2005 203.
Joseph K. Liu, Duncan S. Wong, “Linkable Ring Signatures:
Security Models and New Schemes” ICCSA 2005, Lecture Notes in Computer Science 3481, pages 614-623. Springer,
2005 204.
Joseph K. Liu, Patrick P.
Tsang, Duncan S. Wong, Robert W. Zhu, “Universal Custodian-Hiding
Verifiable Encryption for Discrete Logarithms”, ICISC 2005, Lecture Notes in Computer Science 3935, pages 389-409. Springer
2005. [CORE Rank B] 205.
Joseph K. Liu, Duncan S.
Wong, “A Restricted Multi-show Credential System and Its Application on
E-voting”, ISPEC 2005, Lecture
Notes in Computer Science 3439, pages 268-279. Springer 2005. [CORE
Rank B] 206.
Joseph K. Liu, Sandy H. Wong, Duncan S. Wong, “Transferable
E-Cash Revisit”, SEC 2005, pages 171-188, Springer 2005. [CORE Rank B] 2004 207.
Joseph K. Liu, 208.
Tony K. Chan, Karyin
Fung, Joseph K. Liu, 209.
Joseph K. Liu, Duncan S.
Wong, “On the Security Model of (Threshold) Ring Signature”, ICISC 2004, Lecture Notes in Computer
Science 3506, pages 204-217. Springer 2004. [CORE
Rank B] 210.
Patrick P. Tsang, Allen Au, Tony K. Chan, Joseph
K. Liu, 211.
Joseph K. Liu, 2003 212.
Yuen-Yan Chan, Chi-Hong Leung, Joseph K. Liu, “Evaluation on Security and Privacy of Web-Based
Learning Systems”,
ICALT 2003, pages
308-309. IEEE Computer Society
2003 213.
Duncan S. Wong, K. Fung, Joseph K. Liu, 214.
Joseph
K. Liu, |
|
|
Publication