Follow
Dr. Kaitai Liang
Dr. Kaitai Liang
Cybersecurity Group, EEMCS, TU DELFT
Verified email at tudelft.nl - Homepage
Title
Cited by
Cited by
Year
A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security
K Liang, L Fang, W Susilo, DS Wong
2013 5th international conference on intelligent networking and …, 2013
3322013
Searchable attribute-based mechanism with efficient data sharing for secure cloud storage
K Liang, W Susilo
IEEE Transactions on Information Forensics and Security 10 (9), 1981-1992, 2015
2582015
BPAS: Blockchain-Assisted Privacy-Preserving Authentication System for Vehicular Ad Hoc Networks
Q Feng, D He, S Zeadally, K Liang
IEEE Transactions on Industrial Informatics 16 (6), 4146-4155, 2019
2332019
Certificateless public key authenticated encryption with keyword search for industrial internet of things
D He, M Ma, S Zeadally, N Kumar, K Liang
IEEE Transactions on Industrial Informatics 14 (8), 3618-3627, 2017
2242017
Auditable -Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing
J Ning, Z Cao, X Dong, K Liang, H Ma, L Wei
IEEE Transactions on Information Forensics and Security 13 (1), 94-105, 2017
2062017
A blockchain-based location privacy-preserving crowdsensing system
M Yang, T Zhu, K Liang, W Zhou, RH Deng
Future Generation Computer Systems 94, 408-418, 2019
2042019
An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing
K Liang, JK Liu, DS Wong, W Susilo
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
2032014
An efficient access control scheme with outsourcing capability and attribute update for fog computing
P Zhang, Z Chen, JK Liu, K Liang, H Liu
Future Generation Computer Systems 78, 753-762, 2018
1992018
A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing
K Liang, MH Au, JK Liu, W Susilo, DS Wong, G Yang, Y Yu, A Yang
Future Generation Computer Systems 52, 95-108, 2015
1912015
Attribute-based data sharing scheme revisited in cloud computing
S Wang, K Liang, JK Liu, J Chen, J Yu, W Xie
IEEE Transactions on Information Forensics and Security 11 (8), 1661-1673, 2016
1692016
Cost-effective authentic and anonymous data sharing with forward security
X Huang, JK Liu, S Tang, Y Xiang, K Liang, L Xu, J Zhou
IEEE Transactions on computers 64 (4), 971-983, 2014
1642014
Dissipative fault-tolerant control for nonlinear singular perturbed systems with Markov jumping parameters based on slow state feedback
J Wang, K Liang, X Huang, Z Wang, H Shen
Applied Mathematics and Computation 328, 247-262, 2018
1602018
A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing
K Liang, MH Au, JK Liu, W Susilo, DS Wong, G Yang, TVX Phuong, Q Xie
IEEE Transactions on Information Forensics and Security 9 (10), 1667-1680, 2014
1602014
Searchain: Blockchain-based private keyword search in decentralized storage
P Jiang, F Guo, K Liang, J Lai, Q Wen
Future Generation Computer Systems 107, 781-792, 2020
1462020
Extended proxy-assisted approach: Achieving revocable fine-grained encryption of cloud data
Y Yang, JK Liu, K Liang, KKR Choo, J Zhou
Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015
1262015
Privacy-preserving ciphertext multi-sharing control for big data storage
K Liang, W Susilo, JK Liu
IEEE transactions on information forensics and security 10 (8), 1578-1589, 2015
1222015
Two-factor data security protection mechanism for cloud storage system
JK Liu, K Liang, W Susilo, J Liu, Y Xiang
IEEE Transactions on Computers 65 (6), 1992-2004, 2015
1102015
Passive attacks against searchable encryption
J Ning, J Xu, K Liang, F Zhang, EC Chang
IEEE Transactions on Information Forensics and Security 14 (3), 789-802, 2018
1082018
Time-based direct revocable ciphertext-policy attribute-based encryption with short revocation list
JK Liu, TH Yuen, P Zhang, K Liang
Applied Cryptography and Network Security: 16th International Conference …, 2018
1052018
Am I eclipsed? A smart detector of eclipse attacks for Ethereum
G Xu, B Guo, C Su, X Zheng, K Liang, DS Wong, H Wang
Computers & Security 88, 101604, 2020
1022020
The system can't perform the operation now. Try again later.
Articles 1–20