Ru Meng, Yanwei Zhou, Jianting Ning, Kaitai Liang, Jinguang Han, Willy Susilo (2017), An Efficient Key-Policy Attribute-Based Searchable Encryption in Prime-Order Groups, In PROVABLE SECURITY, PROVSEC 2017 p.39-56.

Cong Zuo, Kaitai Liang, Zoe L. Jiang, Jun Shao, Junbin Fang (2017), Cost-effective privacy-preserving vehicular urban sensing system, In Personal and Ubiquitous Computing Volume 21 p.893-901.

Yangguang Tian, Guomin Yang, Yi Mu, Shiwei Zhang, Kaitai Liang, Yong Yu (2017), One-Round Attribute-Based Key Exchange in the Multi-Party Setting, In International journal of foundations of computer science Volume 28 p.725-742.

Junwei Zhou, Hui Duan, Kaitai Liang, Qiao Yan, Fei Chen, F. Richard Yu, Jieming Wu, Jianyong Chen (2017), Securing Outsourced Data in the Multi-Authority Cloud with Fine-Grained Access Control and Efficient Attribute Revocation, In Computer Journal Volume 60 p.1210-1222.

Chao Lin, Fei Zhu, Wei Wu, Kaitai Liang, Kim-Kwang Raymond Choo (2016), A New Transitive Signature Scheme, In NETWORK AND SYSTEM SECURITY, (NSS 2016) p.156-167.

Peng Zhang, Zehong Chen, Kaitai Liang, Shulan Wang, Ting Wang (2016), A cloud-based access control scheme with user revocation and attribute update, Joseph K. Liu, Ron Steinfeld (Eds.), In Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Proceedings p.525-540, Springer.

Chu Luo, Angelos Fylakis, Juha Partala, Simon Klakegg, Jorge Goncalves, Kaitai Liang, Tapio Seppänen, Vassilis Kostakos (2016), A data hiding approach for sensitive smartphone data, In UbiComp 2016 - Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing p.557-568, ACM.

Jiannan Wei, Guomin Yang, Yi Mu, Kaitai Liang (2016), Anonymous Proxy Signature with Hierarchical Traceability, In Computer Journal Volume 59 p.559-569.

Shulan Wang, Kaitai Liang, Joseph K. Liu, Jianyong Chen, Jianping Yu, Weixin Xie (2016), Attribute-Based Data Sharing Scheme Revisited in Cloud Computing, In IEEE Transactions on Information Forensics and Security Volume 11 p.1661-1673.

Clémentine Gritti, Willy Susilo, Thomas Plantard, Kaitai Liang, Duncan S. Wong (2016), Broadcast encryption with dealership, In International Journal of Information Security Volume 15 p.271-283.