Artículos con órdenes de acceso público - Joseph K. LiuMás información
No disponibles en ningún lugar: 61
An efficient access control scheme with outsourcing capability and attribute update for fog computing
P Zhang, Z Chen, JK Liu, K Liang, H Liu
Future Generation Computer Systems 78, 753-762, 2018
Órdenes: National Natural Science Foundation of China, Academy of Finland
Private machine learning classification based on fully homomorphic encryption
X Sun, P Zhang, JK Liu, J Yu, W Xie
IEEE Transactions on Emerging Topics in Computing 8 (2), 352-364, 2018
Órdenes: National Natural Science Foundation of China
Fine-grained two-factor access control for web-based cloud computing services
JK Liu, MH Au, X Huang, R Lu, J Li
IEEE Transactions on Information Forensics and Security 11 (3), 484-497, 2015
Órdenes: National Natural Science Foundation of China
Linkable ring signature with unconditional anonymity
JK Liu, MH Au, W Susilo, J Zhou
IEEE Transactions on Knowledge and Data Engineering 26 (1), 157-165, 2013
Órdenes: Australian Research Council
Security concerns in popular cloud storage services
CK Chu, WT Zhu, J Han, JK Liu, J Xu, J Zhou
IEEE pervasive computing 12 (4), 50-57, 2013
Órdenes: A*Star, Singapore
Privacy-preserving public auditing protocol for low-performance end devices in cloud
J Li, L Zhang, JK Liu, H Qian, Z Dong
IEEE Transactions on Information Forensics and Security 11 (11), 2572-2583, 2016
Órdenes: National Natural Science Foundation of China
Efficient handover authentication with user anonymity and untraceability for mobile cloud computing
X Yang, X Huang, JK Liu
Future Generation Computer Systems 62, 190-195, 2016
Órdenes: National Natural Science Foundation of China
DeepPAR and DeepDPA: privacy preserving and asynchronous deep learning for industrial IoT
X Zhang, X Chen, JK Liu, Y Xiang
IEEE Transactions on Industrial Informatics 16 (3), 2081-2090, 2019
Órdenes: National Natural Science Foundation of China
Privacy concerns for photo sharing in online social networks
K Liang, JK Liu, R Lu, DS Wong
IEEE Internet Computing 19 (2), 58-63, 2014
Órdenes: Research Grants Council, Hong Kong
Fine-grained two-factor protection mechanism for data sharing in cloud storage
C Zuo, J Shao, JK Liu, G Wei, Y Ling
IEEE Transactions on Information Forensics and Security 13 (1), 186-196, 2017
Órdenes: National Natural Science Foundation of China
Attribute-based hybrid boolean keyword search over outsourced encrypted data
K He, J Guo, J Weng, J Weng, JK Liu, X Yi
IEEE Transactions on Dependable and Secure Computing 17 (6), 1207-1217, 2018
Órdenes: National Natural Science Foundation of China
Identity-based encryption with post-challenge auxiliary inputs for secure cloud applications and sensor networks
TH Yuen, Y Zhang, SM Yiu, JK Liu
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
Órdenes: A*Star, Singapore
Towards efficient verifiable conjunctive keyword search for large encrypted database
J Wang, X Chen, SF Sun, JK Liu, MH Au, ZH Zhan
Computer Security: 23rd European Symposium on Research in Computer Security …, 2018
Órdenes: Australian Research Council, National Natural Science Foundation of China …
Non-interactive multi-client searchable encryption: Realization and implementation
SF Sun, C Zuo, JK Liu, A Sakzad, R Steinfeld, TH Yuen, X Yuan, D Gu
IEEE Transactions on Dependable and Secure Computing 19 (1), 452-467, 2020
Órdenes: Australian Research Council, National Natural Science Foundation of China
Enabling authorized encrypted search for multi-authority medical databases
L Xu, S Sun, X Yuan, JK Liu, C Zuo, C Xu
IEEE Transactions on Emerging Topics in Computing 9 (1), 534-546, 2019
Órdenes: National Natural Science Foundation of China
Efficient multi-function data sharing and searching mechanism for cloud-based encrypted data
K Liang, C Su, J Chen, JK Liu
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
Órdenes: National Natural Science Foundation of China, Academy of Finland, European …
Privacy-preserving and outsourced multi-party k-means clustering based on multi-key fully homomorphic encryption
P Zhang, T Huang, X Sun, W Zhao, H Liu, S Lai, JK Liu
IEEE Transactions on Dependable and Secure Computing 20 (3), 2348-2359, 2022
Órdenes: National Natural Science Foundation of China
Trusted boolean search on cloud using searchable symmetric encryption
C Zuo, J Macindoe, S Yang, R Steinfeld, JK Liu
2016 IEEE Trustcom/BigDataSE/ISPA, 113-120, 2016
Órdenes: National Natural Science Foundation of China
Fully secure ciphertext-policy attribute based encryption with security mediator
Y Chen, ZL Jiang, SM Yiu, JK Liu, MH Au, X Wang
Information and Communications Security: 16th International Conference …, 2015
Órdenes: National Natural Science Foundation of China
Expressive attribute-based keyword search with constant-size ciphertext
J Han, Y Yang, JK Liu, J Li, K Liang, J Shen
Soft Computing 22, 5163-5177, 2018
Órdenes: National Natural Science Foundation of China
La información de publicación y financiación se determina de forma automática mediante un programa informático