Follow
Liming Fang
Title
Cited by
Cited by
Year
A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security
K Liang, L Fang, W Susilo, DS Wong
2013 5th international conference on intelligent networking and …, 2013
3292013
Public key encryption with keyword search secure against keyword guessing attacks without random oracle
L Fang, W Susilo, C Ge, J Wang
Information sciences 238, 221-241, 2013
2642013
Revocable identity-based broadcast proxy re-encryption for data sharing in clouds
C Ge, Z Liu, J Xia, L Fang
IEEE transactions on dependable and secure computing 18 (3), 1214-1226, 2019
1962019
Secure keyword search and data sharing mechanism for cloud computing
C Ge, W Susilo, Z Liu, J Xia, P Szalachowski, L Fang
IEEE Transactions on Dependable and Secure Computing 18 (6), 2787-2800, 2020
1652020
Revocable attribute-based encryption with data integrity in clouds
C Ge, W Susilo, J Baek, Z Liu, J Xia, L Fang
IEEE Transactions on Dependable and Secure Computing 19 (5), 2864-2872, 2021
1542021
Provably secure dynamic ID-based anonymous two-factor authenticated key exchange protocol with extended security model
Q Xie, DS Wong, G Wang, X Tan, K Chen, L Fang
IEEE Transactions on Information Forensics and Security 12 (6), 1382-1392, 2017
1532017
A verifiable and fair attribute-based proxy re-encryption scheme for data sharing in clouds
C Ge, W Susilo, J Baek, Z Liu, J Xia, L Fang
IEEE Transactions on Dependable and Secure Computing 19 (5), 2907-2919, 2021
1292021
A secure channel free public key encryption with keyword search scheme without random oracle
L Fang, W Susilo, C Ge, J Wang
Cryptology and Network Security: 8th International Conference, CANS 2009 …, 2009
1152009
Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search
L Fang, W Susilo, C Ge, J Wang
Theoretical Computer Science 462, 39-58, 2012
762012
A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system
C Ge, W Susilo, L Fang, J Wang, Y Shi
Designs, Codes and Cryptography 86, 2587-2603, 2018
752018
Cluster-guided contrastive graph clustering network
X Yang, Y Liu, S Zhou, S Wang, W Tu, Q Zheng, X Liu, L Fang, E Zhu
Proceedings of the AAAI conference on artificial intelligence 37 (9), 10834 …, 2023
732023
Anonymous conditional proxy re-encryption without random oracle
L Fang, W Susilo, J Wang
Provable Security: Third International Conference, ProvSec 2009, Guangzhou …, 2009
722009
A large-scale empirical study on the vulnerability of deployed IoT devices
B Zhao, S Ji, WH Lee, C Lin, H Weng, J Wu, P Zhou, L Fang, R Beyah
IEEE Transactions on Dependable and Secure Computing 19 (3), 1826-1840, 2020
592020
A proxy broadcast re-encryption for cloud data sharing
M Sun, C Ge, L Fang, J Wang
Multimedia Tools and Applications 77, 10455-10469, 2018
562018
A blockchain based decentralized data security mechanism for the Internet of Things
C Ge, Z Liu, L Fang
Journal of Parallel and Distributed Computing 141, 1-9, 2020
552020
THP: A novel authentication scheme to prevent multiple attacks in SDN-based IoT network
L Fang, Y Li, X Yun, Z Wen, S Ji, W Meng, Z Cao, M Tanveer
IEEE Internet of Things Journal 7 (7), 5745-5759, 2019
492019
Privacy protection for medical data sharing in smart healthcare
L Fang, C Yin, J Zhu, C Ge, M Tanveer, A Jolfaei, Z Cao
ACM Transactions on Multimedia Computing, Communications, and Applications …, 2020
472020
A practical model based on anomaly detection for protecting medical IoT control services against external attacks
L Fang, Y Li, Z Liu, C Yin, M Li, ZJ Cao
IEEE Transactions on Industrial Informatics 17 (6), 4260-4269, 2020
462020
Secure transmission of compressed sampling data using edge clouds
Y Zhang, P Wang, L Fang, X He, H Han, B Chen
IEEE Transactions on Industrial Informatics 16 (10), 6641-6651, 2020
452020
Identity-based conditional proxy re-encryption with fine grain policy
C Ge, W Susilo, J Wang, L Fang
Computer Standards & Interfaces 52, 1-9, 2017
452017
The system can't perform the operation now. Try again later.
Articles 1–20