Multi-user verifiable searchable symmetric encryption for cloud storage X Liu, G Yang, Y Mu, RH Deng IEEE Transactions on Dependable and Secure Computing 17 (6), 1322-1332, 2018 | 78 | 2018 |
Privacy-preserving multi-keyword searchable encryption for distributed systems X Liu, G Yang, W Susilo, J Tonien, X Liu, J Shen IEEE Transactions on Parallel and Distributed Systems 32 (3), 561-574, 2020 | 76 | 2020 |
Towards enhanced security for certificateless public-key authenticated encryption with keyword search X Liu, H Li, G Yang, W Susilo, J Tonien, Q Huang Provable Security: 13th International Conference, ProvSec 2019, Cairns, QLD …, 2019 | 23 | 2019 |
Hot topic propagation model and opinion leader identifying model in microblog network Y Lin, H Li, X Liu, S Fan Abstract and Applied Analysis 2013 (1), 893961, 2013 | 21 | 2013 |
Broadcast authenticated encryption with keyword search X Liu, K He, G Yang, W Susilo, J Tonien, Q Huang Australasian Conference on Information Security and Privacy, 193-213, 2021 | 19 | 2021 |
Message-locked searchable encryption: A new versatile tool for secure cloud storage X Liu, G Yang, W Susilo, J Tonien, R Chen, X Lv IEEE Transactions on Services Computing 15 (3), 1664-1677, 2020 | 8 | 2020 |
Mixed-protocol multi-party computation framework towards complex computation tasks with malicious security Y Wu, X Wang, W Susilo, G Yang, ZL Jiang, J Li, X Liu Computer Standards & Interfaces 80, 103570, 2022 | 7 | 2022 |
Hierarchical conditional proxy re-encryption: A new insight of fine-grained secure data sharing K He, X Liu, H Yuan, W Wei, K Liang Information Security Practice and Experience: 13th International Conference …, 2017 | 3 | 2017 |
Enabling Efficient and Malicious Secure Data Aggregation in Smart Grid With False Data Detection H Pang, K He, Y Fu, JN Liu, X Liu, W Tan IEEE Transactions on Smart Grid, 2023 | 2 | 2023 |
Privacy-preserving multi-user outsourced computation for boolean circuits X Liu, G Yang, W Susilo, K He, RH Deng, J Weng IEEE Transactions on Information Forensics and Security, 2023 | 2 | 2023 |
Efficient Identity‐Based Broadcast Encryption Scheme on Lattices for the Internet of Things K He, X Liu, JN Liu, W Liu Security and Communication Networks 2021 (1), 2847731, 2021 | 1 | 2021 |
Searchable Encryption for Cloud and Distributed Systems X Liu | | 2021 |
Privacy-preserving polynomial interpolation and its applications on predictive analysis Z Chen, L Huang, X Shi, Q Huang, H Wang, X Liu Information Sciences 541, 259-270, 2020 | | 2020 |