GAN-based image steganography by exploiting transform domain knowledge with deep networks
Li, Xiao, Chen, Liquan, Lai, Jianchang, Fu, Zhangjie, Liu, Suhui
Published in Multimedia systems (01.08.2024)
Published in Multimedia systems (01.08.2024)
Get full text
Journal Article
Efficient Construction for Full Black-Box Accountable Authority Identity-Based Encryption
Zhao, Zhen, Lai, Jianchang, Susilo, Willy, Wang, Baocang, Hu, Yupu, Guo, Fuchun
Published in IEEE access (2019)
Published in IEEE access (2019)
Get full text
Journal Article
Searchain: Blockchain-based private keyword search in decentralized storage
Jiang, Peng, Guo, Fuchun, Liang, Kaitai, Lai, Jianchang, Wen, Qiaoyan
Published in Future generation computer systems (01.06.2020)
Published in Future generation computer systems (01.06.2020)
Get full text
Journal Article
Integrated and Accountable Data Sharing for Smart Grids With Fog and Dual-Blockchain Assistance
Liu, Suhui, Chen, Liquan, Chen, Liqun, Lai, Jianchang
Published in IEEE transactions on industrial informatics (01.03.2024)
Published in IEEE transactions on industrial informatics (01.03.2024)
Get full text
Journal Article
Full black-box retrievable and accountable identity-based encryption
Zhao, Zhen, Susilo, Willy, Guo, Fuchun, Lai, Jianchang, Wang, Baocang
Published in Computer standards and interfaces (01.08.2023)
Published in Computer standards and interfaces (01.08.2023)
Get full text
Journal Article
Blockchain-based privacy-preserving public key searchable encryption with strong traceability
Han, Yue, Han, Jinguang, Meng, Weizhi, Lai, Jianchang, Wu, Ge
Published in Journal of systems architecture (01.10.2024)
Published in Journal of systems architecture (01.10.2024)
Get full text
Journal Article
Efficient identity-based online/offline encryption and signcryption with short ciphertext
Lai, Jianchang, Mu, Yi, Guo, Fuchun
Published in International journal of information security (01.06.2017)
Published in International journal of information security (01.06.2017)
Get full text
Journal Article
SDSS: Sequential Data Sharing System in IoT
Lai, Jianchang, Susilo, Willy, Deng, Robert H., Guo, Fuchun
Published in IEEE transactions on information forensics and security (01.01.2024)
Published in IEEE transactions on information forensics and security (01.01.2024)
Get full text
Journal Article
Privacy-enhanced attribute-based private information retrieval
Lai, Jianchang, Mu, Yi, Guo, Fuchun, Jiang, Peng, Susilo, Willy
Published in Information sciences (01.07.2018)
Published in Information sciences (01.07.2018)
Get full text
Journal Article
Accountable authority identity-based broadcast encryption with constant-size private keys and ciphertexts
Zhao, Zhen, Guo, Fuchun, Lai, Jianchang, Susilo, Willy, Wang, Baocang, Hu, Yupu
Published in Theoretical computer science (24.02.2020)
Published in Theoretical computer science (24.02.2020)
Get full text
Journal Article
Efficient k-out-of-n oblivious transfer scheme with the ideal communication cost
Lai, Jianchang, Mu, Yi, Guo, Fuchun, Chen, Rongmao, Ma, Sha
Published in Theoretical computer science (01.03.2018)
Published in Theoretical computer science (01.03.2018)
Get full text
Journal Article
Generic construction for tightly-secure signatures from discrete log
Lai, Jianchang, Wu, Ge, Jiang, Peng, Zhao, Zhen, Susilo, Willy, Guo, Fuchun
Published in Theoretical computer science (04.10.2021)
Published in Theoretical computer science (04.10.2021)
Get full text
Journal Article
Data Access Control in Cloud Computing: Flexible and Receiver Extendable
Lai, Jianchang, Guo, Fuchun, Susilo, Willy, Huang, Xinyi, Jiang, Peng, Zhang, Futai
Published in IEEE transactions on services computing (01.09.2022)
Published in IEEE transactions on services computing (01.09.2022)
Get full text
Journal Article
PPFilter: Provider Privacy-Aware Encrypted Filtering System
Jiang, Peng, Guo, Fuchun, Susilo, Willy, Au, Man Ho, Lai, Jianchang, Li, Wenmin
Published in IEEE transactions on services computing (01.09.2021)
Published in IEEE transactions on services computing (01.09.2021)
Get full text
Journal Article
Identity-based revocation system: Enhanced security model and scalable bounded IBRS construction with short parameters
Jiang, Peng, Lai, Jianchang, Guo, Fuchun, Susilo, Willy, Au, Man Ho, Yang, Guomin, Mu, Yi, Chen, Rongmao
Published in Information sciences (01.01.2019)
Published in Information sciences (01.01.2019)
Get full text
Journal Article
Centralized keyword search on encrypted data for cloud applications
Jiang, Peng, Mu, Yi, Guo, Fuchun, Wang, Xiaofen, Lai, Jianchang
Published in Security and communication networks (01.12.2016)
Published in Security and communication networks (01.12.2016)
Get full text
Journal Article