Showing
1 - 10
results of
10
for search '
LIU, Joseph K.
'
Skip to content
AUNILO IRDS | AUNILO Institutional Repository Discovery Service
FAQs
|
Search Tips
|
Feedback
Your Account
Log Out
Login
Theme
Bootstrap
Aunilo
Language
English
中文(繁體)
اللغة العربية
Toggle navigation
Home
Search/Browse Options
Search History
Advanced Search
About
About AUNILO IRDS
Content Sources
Statistics
Technical Team
Disclaimer
Privacy & Security Policy
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Author
LIU, Joseph K.
Showing
1 - 10
results of
10
for search '
LIU, Joseph K.
'
, query time: 0.02s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
Attribute-based encryption with expressive and authorized keyword search
by
CUI, Hui
,
DENG, Robert H.
,
LIU
,
Joseph
K
.
,
LI, Yingjiu
Published 2017
Get full text
Get full text
text
Save to List
Saved in:
2
On the security of two identity-based conditional proxy re-encryption schemes
by
HE, Kai
,
WENG, Jian
,
DENG, Robert H.
,
LIU
,
Joseph
K
.
Published 2016
Get full text
Get full text
text
Save to List
Saved in:
3
Server-aided attribute-based signature with revocation for resource-constrained Industrial-Internet-of-Things devices
by
CUI, Hui
,
DENG, Robert H.
,
LIU
,
Joseph
K
.
,
YI, Xun
,
LI, Yingjiu
Published 2018
Get full text
Get full text
text
Save to List
Saved in:
4
Practical ID-based encryption for wireless sensor network
by
CHU, Cheng-Kang
,
LIU
,
Joseph
K
.
,
ZHOU, Jianying
,
BAO, Feng
,
DENG, Robert H.
Published 2010
Get full text
Get full text
text
Save to List
Saved in:
5
Efficient encrypted data search with expressive queries and flexible update
by
NING, Jianting
,
CHEN, Jiageng
,
LIANG, Kaitai
,
LIU
,
Joseph
K
.
,
SU, Chunhua
,
WU, Qianhong
Published 2022
Get full text
Get full text
text
Save to List
Saved in:
6
Traceable and retrievable identity-based encryption
by
AU, Man Ho
,
HUANG, Qiong
,
LIU
,
Joseph
K
.
,
SUSILO, Willy
,
WONG, Duncan S.
,
YANG, Guomin
Published 2008
Get full text
Get full text
text
Save to List
Saved in:
7
Anonymous identity-based broadcast encryption with chosen-ciphertext security
by
HE, Kai
,
WENG, Jian
,
LIU, Jia-Nan
,
LIU
,
Joseph
K
.
,
LIU, Wei
,
DENG, Robert H.
Published 2016
Get full text
Get full text
text
Save to List
Saved in:
8
Malicious KGC attacks in certificateless cryptography
by
AU, Man Ho
,
CHEN, Jing
,
LIU
,
Joseph
K
.
,
MU, Yi
,
WONG, Duncan S.
,
YANG, Guomin
,
YANG, Guomin
Published 2007
Get full text
Get full text
text
Save to List
Saved in:
9
HPRESS: A Hardware-enhanced proxy Re-encryption scheme using secure enclave
by
ZHANG, Fan
,
LIANG, Ziyuan
,
ZUO, Cong
,
SHAO, Jun
,
NING, Jianting
,
SUN, Jun
,
LIU
,
Joseph
K
.
,
BAO, Yibao
Published 2021
Get full text
text
Save to List
Saved in:
10
Efficient threshold password-authenticated secret sharing protocols for cloud computing
by
Yi, Xun
,
Tari, Zahir
,
Hao, Feng
,
Chen, Liqun
,
Liu
,
Joseph
K
.
,
Yang, Xuechao
,
Lam, Kwok-Yan
,
Khalil, Ibrahim
,
Zomaya, Albert Y.
Published 2020
Get full text
Article
Save to List
Saved in:
Search Tools:
Get RSS Feed
—
Email this Search
—
×
Loading...