Chao Lin, Fei Zhu, Wei Wu, Kaitai Liang, Kim-Kwang Raymond Choo (2016), A New Transitive Signature Scheme, In NETWORK AND SYSTEM SECURITY, (NSS 2016) p.156-167.

Peng Zhang, Zehong Chen, Kaitai Liang, Shulan Wang, Ting Wang (2016), A cloud-based access control scheme with user revocation and attribute update, Joseph K. Liu, Ron Steinfeld (Eds.), In Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Proceedings p.525-540, Springer.

Chu Luo, Angelos Fylakis, Juha Partala, Simon Klakegg, Jorge Goncalves, Kaitai Liang, Tapio Seppänen, Vassilis Kostakos (2016), A data hiding approach for sensitive smartphone data, In UbiComp 2016 - Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing p.557-568, Association for Computing Machinery (ACM).

Jiannan Wei, Guomin Yang, Yi Mu, Kaitai Liang (2016), Anonymous Proxy Signature with Hierarchical Traceability, In Computer Journal Volume 59 p.559-569.

Shulan Wang, Kaitai Liang, Joseph K. Liu, Jianyong Chen, Jianping Yu, Weixin Xie (2016), Attribute-Based Data Sharing Scheme Revisited in Cloud Computing, In IEEE Transactions on Information Forensics and Security Volume 11 p.1661-1673.

Clémentine Gritti, Willy Susilo, Thomas Plantard, Kaitai Liang, Duncan S. Wong (2016), Broadcast encryption with dealership, In International Journal of Information Security Volume 15 p.271-283.

Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo, Kaitai Liang (2016), Edit distance based encryption and its application, Joseph K. Liu, Ron Steinfeld (Eds.), In Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Proceedings p.103-119, Springer.

Kaitai Liang, Chunhua Su, Joseph K. Liu, Jiageng Chen (2016), Efficient multi-function data sharing and searching mechanism for cloud-based encrypted data, In ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security p.83-94, Association for Computing Machinery (ACM).

Weiran Liu, Jianwei Liu, Qianhong Wu, Bo Qin, Kaitai Liang (2016), Online/offline public-index predicate encryption for fine-grained mobile access control, Sokratis Katsikas, Catherine Meadows, Ioannis Askoxylakis, Sotiris Ioannidis (Eds.), In Computer Security - 21st European Symposium on Research in Computer Security, ESORICS 2016, Proceedings p.588-605, Springer.

Kaitai Liang, Xinyi Huang, Fuchun Guo, Joseph K. Liu (2016), Privacy-Preserving and Regular Language Search over Encrypted Cloud Data, In IEEE Transactions on Information Forensics and Security Volume 11 p.2365-2376.