Calculated based on number of publications stored in Pure and citations from Scopus
20162022

Research activity per year

Filter
Conference contribution

Search results

  • 2021

    Privacy-Preserving Contact Tracing Protocol for Mobile Devices: A Zero-Knowledge Proof Approach

    Liu, J. K., Au, M. H., Yuen, T. H., Zuo, C., Wang, J., Sakzad, A., Luo, X., Li, L. & Choo, K. K. R., 2021, Information Security Practice and Experience - 16th International Conference, ISPEC 2021, Proceedings. Deng, R., Bao, F., Wang, G., Shen, J., Ryan, M., Meng, W. & Wang, D. (eds.). Springer Science and Business Media Deutschland GmbH, p. 327-344 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13107 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    1 Citation (Scopus)
  • 2019

    A multi-client DSSE scheme supporting range queries

    Loh, R., Zuo, C., Liu, J. K. & Sun, S. F., 2019, Information Security and Cryptology - 14th International Conference, Inscrypt 2018, Revised Selected Papers. Huang, X., Yung, M. & Guo, F. (eds.). Springer Verlag, p. 289-307 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11449 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Citations (Scopus)
  • An encrypted database with enforced access control and blockchain validation

    Sui, Z., Lai, S., Zuo, C., Yuan, X., Liu, J. K. & Qian, H., 2019, Information Security and Cryptology - 14th International Conference, Inscrypt 2018, Revised Selected Papers. Yung, M., Huang, X. & Guo, F. (eds.). Springer Verlag, p. 260-273 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11449 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Citations (Scopus)
  • Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy: A Survey

    Gan, Q., Zuo, C., Wang, J., Sun, S. F. & Wang, X., 2019, Network and System Security - 13th International Conference, NSS 2019, Proceedings. Liu, J. K. & Huang, X. (eds.). Springer, p. 37-52 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11928 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Citations (Scopus)
  • Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy

    Zuo, C., Sun, S. F., Liu, J. K., Shao, J. & Pieprzyk, J., 2019, Computer Security – ESORICS 2019 - 24th European Symposium on Research in Computer Security, Proceedings. Sako, K., Schneider, S. & Ryan, P. Y. A. (eds.). Springer, p. 283-303 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11736 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    66 Citations (Scopus)
  • 2018

    A Multi-client dynamic searchable symmetric encryption system with physical deletion

    Xu, L., Xu, C., Liu, J. K., Zuo, C. & Zhang, P., 2018, Information and Communications Security - 19th International Conference, ICICS 2017, Proceedings. Qing, S., Liu, D., Mitchell, C. & Chen, L. (eds.). Springer Verlag, p. 516-528 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10631 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Citations (Scopus)
  • Dynamic searchable symmetric encryption schemes supporting range queries with forward (and backward) security

    Zuo, C., Sun, S. F., Liu, J. K., Shao, J. & Pieprzyk, J., 2018, Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Proceedings. Zhou, J., Soriano, M. & Lopez, J. (eds.). Springer Verlag, p. 228-246 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11099 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    64 Citations (Scopus)
  • Result pattern hiding searchable encryption for conjunctive queries

    Lai, S., Patranabis, S., Sakzad, A., Liu, J. K., Mukhopadhyay, D., Steinfeld, R., Sun, S. F., Liu, D. & Zuo, C., 15 Oct 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 745-762 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    156 Citations (Scopus)
  • 2017

    Efficient certificate-based signature and its aggregation

    Ma, X., Shao, J., Zuo, C. & Meng, R., 2017, Information Security Practice and Experience - 13th International Conference, ISPEC 2017, Proceedings. Liu, J. K. & Samarati, P. (eds.). Springer Verlag, p. 391-408 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10701 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Citations (Scopus)
  • Hidden-Token searchable public-key encryption

    Zuo, C., Shao, J., Liu, Z., Ling, Y. & Wei, G., 7 Sept 2017, Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017. Institute of Electrical and Electronics Engineers Inc., p. 248-254 7 p. 8029447. (Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    2 Citations (Scopus)
  • 2016

    Chosen ciphertext secure attribute-based encryption with outsourced decryption

    Zuo, C., Shao, J., Wei, G., Xie, M. & Ji, M., 2016, Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Proceedings. Liu, J. K. & Steinfeld, R. (eds.). Springer Verlag, p. 495-508 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9722).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Citations (Scopus)
  • New threshold anonymous authentication for VANETs

    Shao, J., Lu, R., Lin, X. & Zuo, C., 6 Apr 2016, 2015 IEEE/CIC International Conference on Communications in China, ICCC 2015. Institute of Electrical and Electronics Engineers Inc., 7448644. (2015 IEEE/CIC International Conference on Communications in China, ICCC 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    11 Citations (Scopus)
  • Trusted Boolean Search on Cloud Using Searchable Symmetric Encryption

    Zuo, C., Macindoe, J., Yang, S., Steinfeld, R. & Liu, J. K., 2016, Proceedings - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016. Institute of Electrical and Electronics Engineers Inc., p. 113-120 8 p. 7846936. (Proceedings - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    23 Citations (Scopus)