Hui Cui
Orcid: 0000-0002-5820-2233Affiliations:
- Murdoch University, Discipline of Information Technology, Mathematics and Statistics, Perth, Australia
- Data61, CSIRO, Australia
- Royal Melbourne Institute of Technology University, RMIT, Computer Science and Software Engineering, Melbourne, Australia
- Singapore Management University, Secure Mobile Centre, Singapore
- University of Wollongong, School of Computing and Information Technology, Australia (PhD 2015)
According to our database1,
Hui Cui
authored at least 56 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Factors Affecting Trust and Acceptance for Blockchain Adoption in Digital Payment Systems: A Systematic Review.
Future Internet, March, 2024
UAV Control Method Combining Reptile Meta-Reinforcement Learning and Generative Adversarial Imitation Learning.
Future Internet, March, 2024
Secure Internet of Things in Cloud Computing via Puncturable Attribute-Based Encryption With User Revocation.
IEEE Internet Things J., January, 2024
IEEE Trans. Dependable Secur. Comput., 2024
Pay-Per-Proof: Decentralized Outsourced Multi-User PoR for Cloud Storage Payment Using Blockchain.
IEEE Trans. Cloud Comput., 2024
Advancing face detection efficiency: Utilizing classification networks for lowering false positive incidences.
Array, 2024
SecuPath: A Secure and Privacy-Preserving Multiparty Path Planning Framework in UAV Applications.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
2023
Vehicloak: A Blockchain-Enabled Privacy-Preserving Payment Scheme for Location-Based Vehicular Services.
IEEE Trans. Mob. Comput., November, 2023
Comput. J., October, 2023
Password-authenticated proofs of retrievability for multiple devices checking cloud data.
J. Inf. Secur. Appl., June, 2023
Sensors, April, 2023
Token-Based Biometric Enhanced Key Derivation for Authentication Over Wireless Networks.
IEEE Trans. Netw. Sci. Eng., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Cloud Comput., 2023
Int. J. Intell. Syst., 2023
2021
Comput. J., 2021
Proceedings of the Provable and Practical Security, 2021
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
2020
Pay as You Decrypt: Decryption Outsourcing for Functional Encryption Using Blockchain.
IEEE Trans. Inf. Forensics Secur., 2020
Key regeneration-free ciphertext-policy attribute-based encryption and its application.
Inf. Sci., 2020
Concurr. Comput. Pract. Exp., 2020
2019
Veh. Commun., 2019
IEEE/ACM Trans. Netw., 2019
IEEE Trans. Big Data, 2019
J. Comput. Secur., 2019
(Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance.
Inf. Sci., 2019
Concurr. Comput. Pract. Exp., 2019
2018
Server-Aided Attribute-Based Signature With Revocation for Resource-Constrained Industrial-Internet-of-Things Devices.
IEEE Trans. Ind. Informatics, 2018
IEEE Trans. Dependable Secur. Comput., 2018
Future Gener. Comput. Syst., 2018
An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited.
Comput. Networks, 2018
IEEE Access, 2018
2017
Proceedings of the A Systems Approach to Cyber Security, 2017
Proceedings of the Provable Security, 2017
Proceedings of the Information Security Practice and Experience, 2017
Server-Aided Revocable Attribute-Based Encryption Resilient to Decryption Key Exposure.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
2016
Theor. Comput. Sci., 2016
Proceedings of the Security and Privacy in Communication Networks, 2016
An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures.
Proceedings of the Provable Security, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
2015
Proof of retrievability with public verifiability resilient against related-key attacks.
IET Inf. Secur., 2015
2014
Int. J. Secur. Networks, 2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Proceedings of the Provable Security - 8th International Conference, 2014
2013
Int. J. Secur. Networks, 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the Security and Privacy in Communication Networks, 2013
Proceedings of the Provable Security - 7th International Conference, 2013
2011
A Secure Anonymous Identity-based Key Agreement Protocol for Distributed Computer Networks.
J. Networks, 2011
2009