Follow
Liming Fang
Title
Cited by
Cited by
Year
A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security
K Liang, L Fang, W Susilo, DS Wong
2013 5th International Conference on Intelligent Networking and …, 2013
3202013
Public key encryption with keyword search secure against keyword guessing attacks without random oracle
L Fang, W Susilo, C Ge, J Wang
Information sciences 238, 221-241, 2013
2592013
Revocable identity-based broadcast proxy re-encryption for data sharing in clouds
C Ge, Z Liu, J Xia, L Fang
IEEE transactions on dependable and secure computing 18 (3), 1214-1226, 2019
1782019
Secure keyword search and data sharing mechanism for cloud computing
C Ge, W Susilo, Z Liu, J Xia, P Szalachowski, L Fang
IEEE Transactions on Dependable and Secure Computing 18 (6), 2787-2800, 2020
1472020
Provably secure dynamic ID-based anonymous two-factor authenticated key exchange protocol with extended security model
Q Xie, DS Wong, G Wang, X Tan, K Chen, L Fang
IEEE Transactions on Information Forensics and Security 12 (6), 1382-1392, 2017
1442017
Revocable attribute-based encryption with data integrity in clouds
C Ge, W Susilo, J Baek, Z Liu, J Xia, L Fang
IEEE Transactions on Dependable and Secure Computing 19 (5), 2864-2872, 2021
1332021
A secure channel free public key encryption with keyword search scheme without random oracle
L Fang, W Susilo, C Ge, J Wang
Cryptology and Network Security: 8th International Conference, CANS 2009 …, 2009
1132009
A verifiable and fair attribute-based proxy re-encryption scheme for data sharing in clouds
C Ge, W Susilo, J Baek, Z Liu, J Xia, L Fang
IEEE Transactions on Dependable and Secure Computing 19 (5), 2907-2919, 2021
1072021
Anonymous conditional proxy re-encryption without random oracle
L Fang, W Susilo, J Wang
Provable Security: Third International Conference, ProvSec 2009, Guangzhou …, 2009
722009
Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search
L Fang, W Susilo, C Ge, J Wang
Theoretical Computer Science 462, 39-58, 2012
702012
A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system
C Ge, W Susilo, L Fang, J Wang, Y Shi
Designs, Codes and Cryptography 86, 2587-2603, 2018
682018
A blockchain based decentralized data security mechanism for the Internet of Things
C Ge, Z Liu, L Fang
Journal of Parallel and Distributed Computing 141, 1-9, 2020
542020
A proxy broadcast re-encryption for cloud data sharing
M Sun, C Ge, L Fang, J Wang
Multimedia Tools and Applications 77, 10455-10469, 2018
532018
THP: A novel authentication scheme to prevent multiple attacks in SDN-based IoT network
L Fang, Y Li, X Yun, Z Wen, S Ji, W Meng, Z Cao, M Tanveer
IEEE Internet of Things Journal 7 (7), 5745-5759, 2019
452019
Identity-based conditional proxy re-encryption with fine grain policy
C Ge, W Susilo, J Wang, L Fang
Computer Standards & Interfaces 52, 1-9, 2017
442017
A large-scale empirical study on the vulnerability of deployed iot devices
B Zhao, S Ji, WH Lee, C Lin, H Weng, J Wu, P Zhou, L Fang, R Beyah
IEEE Transactions on Dependable and Secure Computing 19 (3), 1826-1840, 2020
432020
Secure transmission of compressed sampling data using edge clouds
Y Zhang, P Wang, L Fang, X He, H Han, B Chen
IEEE Transactions on Industrial Informatics 16 (10), 6641-6651, 2020
432020
Interactive conditional proxy re-encryption with fine grain policy
L Fang, W Susilo, C Ge, J Wang
Journal of Systems and Software 84 (12), 2293-2302, 2011
412011
Cluster-guided contrastive graph clustering network
X Yang, Y Liu, S Zhou, S Wang, W Tu, Q Zheng, X Liu, L Fang, E Zhu
Proceedings of the AAAI conference on artificial intelligence 37 (9), 10834 …, 2023
402023
Privacy protection for medical data sharing in smart healthcare
L Fang, C Yin, J Zhu, C Ge, M Tanveer, A Jolfaei, Z Cao
ACM Transactions on Multimedia Computing, Communications, and Applications …, 2020
402020
The system can't perform the operation now. Try again later.
Articles 1–20