Shangqi Lai, Joseph K. Liu, Kim Kwang Raymond Choo, Kaitai Liang (2016), Secret picture: An efficient tool for mitigating deletion delay on OSN, In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Volume 9543 p.467-477.

Kaitai Liang, Atsuko Miyaji, Chunhua Su (2016), Secure and traceable framework for data circulation, Joseph K. Liu, Ron Steinfeld (Eds.), In Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Proceedings p.376-388, Springer.

Jun Shao, Rongxing Lu, Xiaodong Lin, Kaitai Liang (2016), Secure bidirectional proxy re-encryption for cryptographic cloud storage, In Pervasive and Mobile Computing Volume 28 p.113-121.

Joseph K. Liu, Kaitai Liang, Willy Susilo, Jianghua Liu, Yang Xiang (2016), Two-Factor Data Security Protection Mechanism for Cloud Storage System, In IEEE Transactions on Computers Volume 65 p.1992-2004.

Man Ho Au, Kaitai Liang, Joseph K. Liu, Rongxing Lu (2016), While mobile encounters with clouds, Moti Yung, Jiageng Chen, Chunhua Su, Vincenzo Piuri (Eds.), In Network and System Security - 10th International Conference, NSS 2016, Proceedings p.3-18, Springer.

Anjia Yang, Kaitai Liang, Yunhui Zhuang, Duncan S. Wong, Xiaohua Jia (2015), A new unpredictability-based radio frequency identification forward privacy model and a provably secure construction, In SECURITY AND COMMUNICATION NETWORKS Volume 8 p.2836-2849.

Kaitai Liang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang, Yong Yu, Anjia Yang (2015), A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing, In Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications Volume 52 p.95-108.

Xinyi Huang, Joseph K. Liu, Shaohua Tang, Yang Xiang, Kaitai Liang, Li Xu, Jianying Zhou (2015), Cost-Effective Authentic and Anonymous Data Sharing with Forward Security, In IEEE Transactions on Computers Volume 64 p.971-983.

Kaitai Liang, Willy Susilo, Joseph K. Liu, Duncan S. Wong (2015), Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption, In Computer Journal Volume 58 p.2778-2792.

Yanjiang Yang, Joseph K. Liu, Kaitai Liang, Kim Kwang Raymond Choo, Jianying Zhou (2015), Extended proxy-assisted approach: Achieving revocable fine-grained encryption of cloud data, Günther Pernul, Peter Y.A. Ryan, Edgar Weippl (Eds.), In Computer Security – ESORICS 2015 - 20th European Symposium on Research in Computer Security, Proceedings p.146-166, Springer.