- Cryptography and Data Security
- Privacy-Preserving Technologies in Data
- Cloud Data Security Solutions
- Complexity and Algorithms in Graphs
- Advanced Malware Detection Techniques
- Blockchain Technology Applications and Security
- Cryptographic Implementations and Security
- Internet Traffic Analysis and Secure E-voting
- Chaos-based Image/Signal Encryption
- Security and Verification in Computing
- User Authentication and Security Systems
- Network Security and Intrusion Detection
- Advanced Authentication Protocols Security
- Stochastic Gradient Optimization Techniques
- Adversarial Robustness in Machine Learning
- Privacy, Security, and Data Protection
- Spam and Phishing Detection
- IoT and Edge/Fog Computing
- Digital and Cyber Forensics
- Information and Cyber Security
- Advanced Steganography and Watermarking Techniques
- Vehicular Ad Hoc Networks (VANETs)
- Coding theory and cryptography
- Security in Wireless Sensor Networks
- Anomaly Detection Techniques and Applications
Delft University of Technology
2020-2025
Wuhan University of Technology
2025
University of Wollongong
2023
University of Surrey
2017-2022
State of The Art
2020
Manchester Metropolitan University
2016-2019
Benchmark Research (United States)
2019
National University of Singapore
2018
Aalto University
2014-2016
City University of Hong Kong
2013-2015
To date, the growth of electronic personal data leads to a trend that owners prefer remotely outsource their clouds for enjoyment high-quality retrieval and storage service without worrying burden local management maintenance. However, secure share search outsourced is formidable task, which may easily incur leakage sensitive information. Efficient sharing searching with security critical importance. This paper, first time, proposes searchable attribute-based proxy reencryption system. When...
If all vehicles are connected together through a wireless communication channel, vehicular ad hoc networks (VANETs) can support wide range of real-time traffic information services, such as intelligent routing, weather monitoring, emergency call, etc. However, the accuracy and credibility transmitted messages among VANETs paramount importance life may depend on it. In this article we introduce novel framework called blockchain-assisted privacy-preserving authentication system (BPAS) that...
Industrial Internet of Things (IIoT) integrates various types intelligent terminals, mobile devices, and communication technologies to enable the upgrade traditional industries industries. IIoT relies on powerful data processing capabilities cloud computing reduce cost on-demand services as per requirements users. However, privacy confidentiality outsourced should be protected in this environment because are typically "handled" by a third-party service provider. An encryption technique can...
As a sophisticated mechanism for secure finegrained access control over encrypted data, ciphertext-policy attribute-based encryption (CP-ABE) is one of the highly promising candidates cloud computing applications. However, there exist two main long-lasting open problems CP-ABE that may limit its wide deployment in commercial One decryption yields expensive pairing cost which often grows with increase policy size. The other granted privilege unlimited times as long his attribute set satisfies...
Ciphertext-policy attribute-based encryption (CP-ABE) is a very promising technique for secure data sharing in the context of cloud computing. Data owner allowed to fully control access policy associated with his which be shared. However, CP-ABE limited potential security risk that known as key escrow problem, whereby secret keys users have issued by trusted authority. Besides, most existing schemes cannot support attribute arbitrary state. In this paper, we revisit scheme order solve issue...
Cipher text-Policy Attribute-Based Proxy Re-Encryption (CP-ABPRE) extends the traditional (PRE) by allowing a semi-trusted proxy to transform cipher text under an access policy one with same plaintext another (i.e. attribute-based re-encryption). The proxy, however, learns nothing about underlying plaintext. CP-ABPRE has many real world applications, such as fine-grained control in cloud storage systems and medical records sharing among different hospitals. Previous schemes leave how be...
Data sharing has never been easier with the advances of cloud computing, and an accurate analysis on shared data provides array benefits to both society individuals. a large number participants must take into account several issues, including efficiency, integrity privacy owner. Ring signature is promising candidate construct anonymous authentic system. It allows owner anonymously authenticate his which can be put for storage or purpose. Yet costly certificate verification in traditional...
In this paper, for the first time, we define a general notion proxy re-encryption (PRE), which call deterministic finite automata-based functional PRE (DFA-based FPRE). Meanwhile, propose and concrete DFA-based FPRE system, adapts to our new notion. scheme, message is encrypted in ciphertext associated with an arbitrary length index string, decryptor legitimate if only DFA his/her secret key accepts string. Furthermore, above encryption allowed be transformed another string by semitrusted...
The need of secure big data storage service is more desirable than ever to date. basic requirement the guarantee confidentiality data. However, anonymity clients, one most essential aspects privacy, should be considered simultaneously. Moreover, also provide practical and fine-grained encrypted sharing such that a owner allowed share ciphertext among others under some specified conditions. This paper, for first time, proposes privacy-preserving multi-sharing mechanism achieve above...
The rapid advances of wireless communication technologies along with the popularity mobile devices are enabling users to access various web services anywhere and anytime. Due openness communications, security becomes a vital issue. To provide secure communication, many anonymous authentication protocols in client-server environments based on classical mathematical hard assumptions (i.e., discrete logarithm problem or integer factorization problem) have been presented last two decades....
Searchable encryption (SE) provides a privacy-preserving mechanism for data users to search over encrypted stored on remote server. Researchers have designed number of SE schemes with high efficiency yet allowing some degree leakage profile the The leakage, however, should be further measured allow us understand what types attacks an scheme would encounter. This paper considers passive that make inferences based prior knowledge and observations queries issued by users. is in contrast...
Industrial Internet of Things (IoT) has suffered from insufficient identity authentication and dynamic network topology, thereby resulting in vulnerabilities to data confidentiality. Recently, the attribute-based encryption (ABE) schemes have been regarded as a solution ensure transmission security fine-grained sharing encrypted IoT data. However, most existing ABE that bring tremendous computational cost are not suitable for resource-constrained devices. Therefore, lightweight efficient...
Backdoor attack is a type of serious security threat to deep learning models. An adversary can provide users with model trained on poisoned data manipulate prediction behavior in test stage using backdoor. The backdoored models behave normally clean images, yet be activated and output incorrect if the input stamped specific trigger pattern. Most existing backdoor attacks focus manually defining imperceptible triggers space without considering abnormality triggers' latent representations...
In this article we propose an infrastructure that allows mobile users to securely share and search for their real-time video data. Specifically, the proposed takes advantages of cloud platform 5G technology achieve its goals, where (connected with some external taking device) can friends or families through while any other user no permission cannot get information about video. More importantly, security is guaranteed even if server hacked. addition, our also secure searching within user's...
Secure cloud storage, which is an emerging service, designed to protect the confidentiality of outsourced data but also provide flexible access for users whose out physical control. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) regarded as one most promising techniques that may be leveraged secure guarantee service. However, use CP-ABE yield inevitable security breach known misuse credential (i.e., decryption rights), due intrinsic "all-or-nothing" feature CP-ABE. In this paper, we...
In this paper, we propose a two-factor data security protection mechanism with factor revocability for cloud storage system. Our system allows sender to send an encrypted message receiver through server. The only needs know the identity of but no other information (such as its public key or certificate). possess two things in order decrypt ciphertext. first thing is his/her secret stored computer. second unique personal device which connects It impossible ciphertext without either piece....
Existing proxy re-encryption (PRE) schemes to secure cloud data sharing raise challenges such as supporting the heterogeneous system efficiently and achieving unbounded feature. To address this problem, we proposed a fast cross-domain scheme, named FABRIC, which enables delegator authorize semi-trusted server convert one ciphertext of an identity-based encryption (IBE) scheme another attribute-based (ABE) scheme. As first achieve feature mentioned above, FABRIC not only enjoys constant...