Follow
Qin Liu
Qin Liu
Associate Professor, Hunan University, China
Verified email at hnu.edu.cn - Homepage
Title
Cited by
Cited by
Year
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
G Wang, Q Liu, J Wu
Proceedings of the 17th ACM conference on Computer and communications …, 2010
9122010
Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers
G Wang, Q Liu, J Wu, M Guo
computers & security 30 (5), 320-331, 2011
3252011
Time-based proxy re-encryption scheme for secure data sharing in a cloud environment
Q Liu, G Wang, J Wu
Information sciences 258, 355-370, 2014
3152014
Secure and privacy preserving keyword searching for cloud storage services
Q Liu, G Wang, J Wu
Journal of network and computer applications 35 (3), 927-933, 2012
1942012
Collaborative trajectory privacy preserving scheme in location-based services
T Peng, Q Liu, D Meng, G Wang
Information Sciences 387, 165-179, 2017
1872017
An efficient privacy preserving keyword search scheme in cloud computing
Q Liu, G Wang, J Wu
2009 International Conference on Computational Science and Engineering 2 …, 2009
1682009
Preserving privacy with probabilistic indistinguishability in weighted social networks
Q Liu, G Wang, F Li, S Yang, J Wu
IEEE Transactions on Parallel and Distributed Systems 28 (5), 1417-1429, 2016
1582016
A dual privacy preserving scheme in continuous location-based services
S Zhang, G Wang, MZA Bhuiyan, Q Liu
IEEE Internet of Things Journal 5 (5), 4191-4200, 2018
1532018
Enabling verifiable and dynamic ranked search over outsourced data
Q Liu, Y Tian, J Wu, T Peng, G Wang
IEEE Transactions on Services Computing 15 (1), 69-82, 2019
1182019
Enhanced location privacy preserving scheme in location-based services
T Peng, Q Liu, G Wang
IEEE Systems Journal 11 (1), 219-230, 2014
1102014
Enhancing privacy through uniform grid and caching in location-based services
S Zhang, KKR Choo, Q Liu, G Wang
Future Generation Computer Systems 86, 881-892, 2018
1032018
A Trajectory Privacy-Preserving Scheme Based on Dual-K Mechanism for Continuous Location-Based Services
S Zhang, G Wang, Q Liu, X Wen, J Liao
2017 IEEE International Symposium on Parallel and Distributed Processing …, 2017
1022017
Intelligent route planning on large road networks with efficiency and privacy
Q Liu, P Hou, G Wang, T Peng, S Zhang
Journal of Parallel and Distributed Computing 133, 93-106, 2019
1012019
Achieving reliable and secure services in cloud computing environments
Q Liu, G Wang, X Liu, T Peng, J Wu
Computers & Electrical Engineering 59, 153-164, 2017
882017
Hierarchical multi-authority and attribute-based encryption friend discovery scheme in mobile social networks
E Luo, Q Liu, G Wang
IEEE Communications Letters 20 (9), 1772-1775, 2016
842016
Efficient information retrieval for ranked queries in cost-effective cloud environments
Q Liu, CC Tan, J Wu, G Wang
2012 Proceedings IEEE INFOCOM, 2581-2585, 2012
752012
Reliable re-encryption in unreliable clouds
Q Liu, CC Tan, J Wu, G Wang
2011 IEEE Global Telecommunications Conference-GLOBECOM 2011, 1-5, 2011
732011
A secure self-destructing scheme for electronic data
G Wang, F Yue, Q Liu
Journal of Computer and System Sciences 79 (2), 279-290, 2013
642013
Achieving fine‐grained access control for secure data sharing on cloud servers
G Wang, Q Liu, J Wu
Concurrency and Computation: Practice and Experience 23 (12), 1443-1464, 2011
622011
Effective query grouping strategy in clouds
Q Liu, Y Guo, J Wu, G Wang
Journal of Computer Science and Technology 32, 1231-1249, 2017
592017
The system can't perform the operation now. Try again later.
Articles 1–20