2023 - Research.com Computer Science in Australia Leader Award
His primary areas of study are Computer security, Encryption, Ring signature, Computer network and Public-key cryptography. The study incorporates disciplines such as Revocation and Cloud computing security in addition to Computer security. His Encryption study frequently draws parallels with other fields, such as Cryptography.
His Ring signature research incorporates themes from Random oracle, Group signature, Anonymity, Algorithm and Computer security model. His Random oracle research is multidisciplinary, incorporating perspectives in Cryptocurrency, Theoretical computer science and Schnorr signature. As a part of the same scientific study, Joseph K. Liu usually deals with the Public-key cryptography, concentrating on Certificate and frequently concerns with Adversary.
Joseph K. Liu mostly deals with Computer security, Encryption, Ring signature, Computer network and Random oracle. His study in Public-key cryptography, Cryptography, Key, Computer security model and Cryptocurrency falls within the category of Computer security. Joseph K. Liu interconnects Theoretical computer science and Revocation in the investigation of issues within Encryption.
His Ring signature research is multidisciplinary, relying on both Group signature, Schnorr signature and Anonymity. His research in Random oracle intersects with topics in Algorithm and Identity. His study looks at the intersection of Ciphertext and topics like Semantic security with Malleability and Ciphertext indistinguishability.
Joseph K. Liu mainly focuses on Encryption, Computer network, Computer security, Theoretical computer science and Cryptography. Joseph K. Liu has researched Encryption in several fields, including Information privacy and Server. Computer security is represented through his Cryptocurrency and Privacy preserving research.
His Theoretical computer science study combines topics from a wide range of disciplines, such as Homomorphic encryption, Correctness and Symmetric-key algorithm. His Cryptography research includes themes of Computational complexity theory, Relation, Reduction and Lattice. The Ciphertext study combines topics in areas such as Proxy, Plaintext, Computer hardware and Key encapsulation.
Encryption, Access control, Theoretical computer science, Ciphertext and Privacy preserving are his primary areas of study. His study in Encryption is interdisciplinary in nature, drawing from both Information privacy, Data processing and Cryptography. His studies in Access control integrate themes in fields like Server and Database.
His Privacy preserving study integrates concerns from other disciplines, such as Security analysis, Deep learning, Secrecy and Zero-knowledge proof. He studied Confidentiality and Protocol that intersect with Computer security. His research in Computer security is mostly concerned with Ring signature.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups
Joseph K. Liu;Victor K. Wei;Duncan S. Wong.
australasian conference on information security and privacy (2004)
Toward efficient and privacy-preserving computing in big data era
Rongxing Lu;Hui Zhu;Ximeng Liu;Joseph K. Liu.
IEEE Network (2014)
A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid
Joonsang Baek;Quang Hieu Vu;Joseph K. Liu;Xinyi Huang.
ieee international conference on cloud computing technology and science (2015)
Malicious KGC attacks in certificateless cryptography
Man Ho Au;Yi Mu;Jing Chen;Duncan S. Wong.
computer and communications security (2007)
An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing
Shulan Wang;Junwei Zhou;Joseph K. Liu;Jianping Yu.
IEEE Transactions on Information Forensics and Security (2016)
Secure sharing of Personal Health Records in cloud computing
Jianghua Liu;Xinyi Huang;Joseph K. Liu.
Future Generation Computer Systems (2015)
RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero
Shi Feng Sun;Shi Feng Sun;Man Ho Au;Joseph K. Liu;Tsz Hon Yuen.
european symposium on research in computer security (2017)
Self-Generated-Certificate Public Key Cryptography and Certificateless Signature / Encryption Scheme in the Standard Model.
Joseph K. Liu;Man Ho Au;Willy Susilo.
IACR Cryptology ePrint Archive (2006)
Efficient Online/Offline Identity-Based Signature for Wireless Sensor Network.
Joseph K. Liu;Joonsang Baek;Jianying Zhou;Yanjiang Yang.
IACR Cryptology ePrint Archive (2010)
An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing
Kaitai Alexander Liang;Joseph K. Liu;Duncan S. Wong;Willy Susilo.
european symposium on research in computer security (2014)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: