Kaitai Liang, Joseph K. Liu, Rongxing Lu, Duncan S. Wong (2015), Privacy Concerns for Photo Sharing in Online Social Networks, In IEEE Internet Computing Volume 19 p.58-63.

Kaitai Liang, Willy Susilo, Joseph K. Liu (2015), Privacy-preserving ciphertext multi-sharing control for big data storage, In IEEE Transactions on Information Forensics and Security Volume 10 p.1578-1589.

Kaitai Liang, Willy Susilo (2015), Searchable Attribute-Based Mechanism With Efficient Data Sharing for Secure Cloud Storage, In IEEE Transactions on Information Forensics and Security Volume 10 p.1981-1992.

Joseph K. Liu, Man Ho Au, Willy Susilo, Kaitai Liang, Rongxing Lu, Bala Srinivasan (2015), Secure Sharing and Searching for Real-Time Video Data in Mobile Cloud, In IEEE Network: the magazine of global internetworking Volume 29 p.46-50.

Kaitai Liang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang, Tran Viet Xuan Phuong, Qi Xie (2014), A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing, In IEEE Transactions on Information Forensics and Security Volume 9 p.1667-1680.

Kaitai Liang, Joseph K. Liu, Duncan S. Wong, Willy Susilo (2014), An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing, In COMPUTER SECURITY - ESORICS 2014, PT I p.257-272.

Kaitai Liang, Cheng-Kang Chu, Xiao Tan, Duncan S. Wong, Chunming Tang, Jianying Zhou (2014), Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts, In Theoretical Computer Science Volume 539 p.87-105.

Clémentine Gritti, Willy Susilo, Thomas Plantard, Kaitai Liang, Duncan S. Wong (2014), Empowering personal health records with cloud computing: How to encrypt with forthcoming fine-grained policies efficiently, In Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications Volume 5 p.3-28.

Rongxing Lu, Xiaodong Lin, Jun Shao, Kaitai Liang (2014), RCCA-Secure Multi-use Bidirectional Proxy Re-encryption with Master Secret Security, In PROVABLE SECURITY, PROVSEC 2014 p.194-205.