Dongxi Liu
TitleCited byYear
Towards automatic model synchronization from model transformations
Y Xiong, D Liu, Z Hu, H Zhao, M Takeichi, H Mei
Proceedings of the twenty-second IEEE/ACM international conference on …, 2007
1952007
Programmable order-preserving secure index for encrypted database query
D Liu, S Wang
Cloud Computing (CLOUD), 2012 IEEE 5th International Conference on, 502-509, 2012
862012
Privacy of outsourced k-means clustering
D Liu, E Bertino, X Yi
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
632014
Nonlinear order preserving index for encrypted database query in service cloud environments
D Liu, S Wang
Concurrency and Computation: Practice and Experience 25 (13), 1967-1984, 2013
562013
Bidirectional interpretation of XQuery
D Liu, Z Hu, M Takeichi
Proceedings of the 2007 ACM SIGPLAN symposium on Partial evaluation and …, 2007
532007
Semantic based aspect-oriented programming for context-aware Web service composition
L Li, D Liu, A Bouguettaya
Information Systems 36 (3), 551-564, 2011
482011
Lightweight Mutual Authentication for IoT and Its Applications
N Li, D Liu, S Nepal
IEEE Transactions on Sustainable Computing, 2017
392017
Cloud#: A specification language for modeling cloud
D Liu, J Zic
Cloud Computing (CLOUD), 2011 IEEE International Conference on, 533-540, 2011
232011
Practical Fully Homomorphic Encryption without Noise Reduction.
D Liu
IACR Cryptology ePrint Archive 2015, 468, 2015
212015
Privacy-Preserving and Outsourced Multi-User k-Means Clustering
FY Rao, BK Samanthula, E Bertino, X Yi, D Liu
2015 IEEE Conference on Collaboration and Internet Computing (CIC), 80-89, 2015
192015
A mobile and portable trusted computing platform
S Nepal, J Zic, D Liu, J Jang
EURASIP Journal on Wireless Communications and Networking 2011 (1), 1-19, 2011
192011
A cloud architecture of virtual trusted platform modules
D Liu, J Lee, J Jang, S Nepal, J Zic
Embedded and Ubiquitous Computing (EUC), 2010 IEEE/IFIP 8th International …, 2010
182010
Result Pattern Hiding Searchable Encryption for Conjunctive Queries
S Lai, S Patranabis, A Sakzad, JK Liu, D Mukhopadhyay, R Steinfeld, ...
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
132018
Query encrypted databases practically
D Liu, S Wang
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
132012
An attack-finding algorithm for security protocols
D Liu, X Li, Y Bai
Journal of Computer Science and Technology 17 (4), 450-463, 2002
132002
Secure Data-centric Access Control for Smart Grid Services based on Publish/Subscribe Systems
L Duan, D Liu, Y Zhang, S Chen, RP Liu, B Cheng, J Chen
ACM Transactions on Internet Technology (TOIT) 16 (4), 23, 2016
122016
Securing Outsourced Databases in the Cloud
D Liu
Security, Privacy and Trust in Cloud Systems, 259-282, 2014
122014
Normalizing traffic pattern with anonymity for mission critical applications
D Liu, CH Chi, M Li
Proceedings of the 37th annual symposium on Simulation, 293, 2004
122004
Monero Ring Attack: Recreating Zero Mixin Transaction Effect
DA Wijaya, J Liu, R Steinfeld, D Liu
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
112018
Short lattice-based one-out-of-many proofs and applications to ring signatures
MF Esgin, R Steinfeld, A Sakzad, JK Liu, D Liu
International Conference on Applied Cryptography and Network Security, 67-88, 2019
102019
The system can't perform the operation now. Try again later.
Articles 1–20