Joseph K. Liu
Orcid: 0000-0001-6656-6240Affiliations:
- Monash University, Faculty of Information Technology, Melbourne, Australia (since 2015)
- Institute for Infocomm Research, Singapore (2007 - 2015)
- University of Bristol, UK (2005 - 2007)
- Chinese University of Hong Kong, Department of Information Engineering, Hong Kong (PhD 2004)
According to our database1,
Joseph K. Liu
authored at least 280 papers
between 2003 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on scopus.com
-
on orcid.org
On csauthors.net:
Bibliography
2025
Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy.
Proc. Priv. Enhancing Technol., 2025
2024
Inf. Sci., January, 2024
IEEE Trans. Inf. Forensics Secur., 2024
Blockchain-Based Messaging and Information Sharing Systems for Air Cargo Supply Chains.
IEEE Trans. Engineering Management, 2024
IEEE Trans. Dependable Secur. Comput., 2024
Practical Multi-Source Multi-Client Searchable Encryption With Forward Privacy: Refined Security Notion and New Constructions.
IEEE Trans. Dependable Secur. Comput., 2024
DualRing-PRF: Post-Quantum (Linkable) Ring Signatures from Legendre and Power Residue PRFs.
IACR Cryptol. ePrint Arch., 2024
Loquat: A SNARK-Friendly Post-Quantum Signature based on the Legendre PRF with Applications in Ring and Aggregate Signatures.
IACR Cryptol. ePrint Arch., 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the IEEE International Conference on Blockchain, 2024
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
SecuPath: A Secure and Privacy-Preserving Multiparty Path Planning Framework in UAV Applications.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
Detect Llama - Finding Vulnerabilities in Smart Contracts Using Large Language Models.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
2023
Verifiable Privacy-Enhanced Rotation Invariant LBP Feature Extraction in Fog Computing.
IEEE Trans. Ind. Informatics, December, 2023
Enhancing Blockchain Adoption through Tailored Software Engineering: An Industrial-grounded Study in Education Credentialing.
Distributed Ledger Technol. Res. Pract., December, 2023
A Survey on Exotic Signatures for Post-quantum Blockchain: Challenges and Research Directions.
ACM Comput. Surv., December, 2023
Shorter Linkable Ring Signature Based on Middle-Product Learning with Errors Problem.
Comput. J., December, 2023
IEEE Trans. Knowl. Data Eng., April, 2023
Privacy-Preserving and Outsourced Multi-Party K-Means Clustering Based on Multi-Key Fully Homomorphic Encryption.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
AgrEvader: Poisoning Membership Inference against Byzantine-robust Federated Learning.
Proceedings of the ACM Web Conference 2023, 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
2022
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
${\sf PBT}$PBT: A New Privacy-Preserving Payment Protocol for Blockchain Transactions.
IEEE Trans. Dependable Secur. Comput., 2022
A comprehensive overview of Deepfake: Generation, detection, datasets, and opportunities.
Neurocomputing, 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
BlindHub: Bitcoin-Compatible Privacy-Preserving Payment Channel Hubs Supporting Variable Amounts.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
A Survey on Exotic Signatures for Post-Quantum Blockchain: Challenges & Research Directions.
IACR Cryptol. ePrint Arch., 2022
Verifiable searchable symmetric encryption for conjunctive keyword queries in cloud storage.
Frontiers Comput. Sci., 2022
CVallet: A Blockchain-Oriented Application Development for Education and Recruitment.
Proceedings of the Network and System Security - 16th International Conference, 2022
Proceedings of the Network and System Security - 16th International Conference, 2022
OblivSend: Secure and Ephemeral File Sharing Services with Oblivious Expiration Control.
Proceedings of the Information Security - 25th International Conference, 2022
Blockchain-based Solutions for Education Credentialing System: Comparison and Implications for Future Development.
Proceedings of the IEEE International Conference on Blockchain, 2022
2021
IEEE Trans. Serv. Comput., 2021
IEEE Trans. Emerg. Top. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2021
Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Des. Codes Cryptogr., 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
OblivShare: Towards Privacy-Preserving File Sharing with Oblivious Expiration Control.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021
Privacy-Preserving Contact Tracing Protocol for Mobile Devices: A Zero-Knowledge Proof Approach.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
Geo-DRS: Geometric Dynamic Range Search on Spatial Data with Backward and Content Privacy.
Proceedings of the Computer Security - ESORICS 2021, 2021
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021
Fact and Fiction: Challenging the Honest Majority Assumption of Permissionless Blockchains.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
Towards Efficient and Strong Backward Private Searchable Encryption with Secure Enclaves.
Proceedings of the Applied Cryptography and Network Security, 2021
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021
2020
DeepPAR and DeepDPA: Privacy Preserving and Asynchronous Deep Learning for Industrial IoT.
IEEE Trans. Ind. Informatics, 2020
IEEE Trans. Emerg. Top. Comput., 2020
IEEE Trans. Dependable Secur. Comput., 2020
Inf. Sci., 2020
Enabling Efficient Privacy-Assured Outlier Detection Over Encrypted Incremental Data Sets.
IEEE Internet Things J., 2020
Forward and Backward Private Dynamic Searchable Symmetric Encryption for Conjunctive Queries.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Selected Areas in Cryptography - SAC 2020, 2020
Accelerating Forward and Backward Private Searchable Encryption Using Trusted Execution.
Proceedings of the Applied Cryptography and Network Security, 2020
2019
Theor. Comput. Sci., 2019
Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption.
J. Univers. Comput. Sci., 2019
Efficient threshold password-authenticated secret sharing protocols for cloud computing.
J. Parallel Distributed Comput., 2019
IACR Cryptol. ePrint Arch., 2019
RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
MatRiCT: Efficient, Scalable and Post-Quantum Blockchain Confidential Transactions Protocol.
IACR Cryptol. ePrint Arch., 2019
Lattice-based Zero-Knowledge Proofs: New Techniques for Shorter and Faster Constructions and Applications.
IACR Cryptol. ePrint Arch., 2019
Enabling Efficient Privacy-Assured Outlier Detection over Encrypted Incremental Datasets.
CoRR, 2019
CoRR, 2019
Catfish Effect Between Internal and External Attackers: Being Semi-honest is Helpful.
CoRR, 2019
Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward/Backward Privacy.
CoRR, 2019
GraphSE<sup>2</sup>: An Encrypted Graph Database for Privacy-Preserving Social Search.
CoRR, 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019
Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2019
Proceedings of the Applied Cryptography and Network Security, 2019
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
Proceedings of the Advances in Cyber Security: Principles, Techniques, and Applications., 2019
2018
Server-Aided Attribute-Based Signature With Revocation for Resource-Constrained Industrial-Internet-of-Things Devices.
IEEE Trans. Ind. Informatics, 2018
IEEE Trans. Inf. Forensics Secur., 2018
Soft Comput., 2018
Inf. Sci., 2018
Int. J. Embed. Syst., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT v1.0).
IACR Cryptol. ePrint Arch., 2018
Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List.
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
An efficient access control scheme with outsourcing capability and attribute update for fog computing.
Future Gener. Comput. Syst., 2018
Verifiable keyword search for secure big data-based mobile healthcare networks with fine-grained authorization control.
Future Gener. Comput. Syst., 2018
Privacy-preserving personal data operation on mobile cloud - Chances and challenges over advanced persistent threat.
Future Gener. Comput. Syst., 2018
Revocable Identity-Based Encryption and Server-Aided Revocable IBE from the Computational Diffie-Hellman Assumption.
Cryptogr., 2018
IEEE Cloud Comput., 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the Network and System Security - 12th International Conference, 2018
Proceedings of the Network and System Security - 12th International Conference, 2018
Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits.
Proceedings of the Information Security Practice and Experience, 2018
Proceedings of the Information Security Practice and Experience, 2018
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) Security.
Proceedings of the Computer Security, 2018
Towards Efficient Verifiable Conjunctive Keyword Search for Large Encrypted Database.
Proceedings of the Computer Security, 2018
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
Analyzing Use of High Privileges on Android: An Empirical Case Study of Screenshot and Screen Recording Applications.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
Soft Comput., 2017
Pers. Ubiquitous Comput., 2017
Pers. Ubiquitous Comput., 2017
J. Comput. Syst. Sci., 2017
Int. J. Appl. Cryptogr., 2017
RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Comput. Secur., 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the Provable Security, 2017
Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption.
Proceedings of the Provable Security, 2017
A Multi-client Dynamic Searchable Symmetric Encryption System with Physical Deletion.
Proceedings of the Information and Communications Security - 19th International Conference, 2017
RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero.
Proceedings of the Computer Security - ESORICS 2017, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
Proceedings of the 16th IEEE/ACIS International Conference on Computer and Information Science, 2017
2016
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Trans. Inf. Forensics Secur., 2016
Privacy-Preserving Public Auditing Protocol for Low-Performance End Devices in Cloud.
IEEE Trans. Inf. Forensics Secur., 2016
Theor. Comput. Sci., 2016
IEEE Trans. Computers, 2016
An Efficient Non-Interactive Multi-client Searchable Encryption with Support for Boolean Queries.
IACR Cryptol. ePrint Arch., 2016
Efficient handover authentication with user anonymity and untraceability for Mobile Cloud Computing.
Future Gener. Comput. Syst., 2016
Comput. J., 2016
Faulty Instantiations of Threshold Ring Signature from Threshold Proof-of-Knowledge Protocol.
Comput. J., 2016
Efficient Privacy-Preserving Charging Station Reservation System for Electric Vehicles.
Comput. J., 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
A Trust and Privacy Preserving Handover Authentication Protocol for Wireless Networks.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the Provable Security, 2016
Efficient Fine-Grained Access Control for Secure Personal Health Records in Cloud Computing.
Proceedings of the Network and System Security - 10th International Conference, 2016
Proceedings of the Network and System Security - 10th International Conference, 2016
Proceedings of the Information Security Practice and Experience, 2016
Credential Wrapping: From Anonymous Password Authentication to Anonymous Biometric Authentication.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Efficient Multi-Function Data Sharing and Searching Mechanism for Cloud-Based Encrypted Data.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
IEEE Trans. Inf. Forensics Secur., 2015
IEEE Trans. Inf. Forensics Secur., 2015
A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid.
IEEE Trans. Cloud Comput., 2015
IEEE Trans. Computers, 2015
IEEE Trans. Computers, 2015
On the security of a lightweight authentication and encryption scheme for mobile ad hoc network.
Secur. Commun. Networks, 2015
IEEE Netw., 2015
J. Univers. Comput. Sci., 2015
Inf. Sci., 2015
IEEE Internet Comput., 2015
Int. J. Embed. Syst., 2015
Secure sharing of Personal Health Records in cloud computing: Ciphertext-Policy Attribute-Based Signcryption.
Future Gener. Comput. Syst., 2015
A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing.
Future Gener. Comput. Syst., 2015
Future Gener. Comput. Syst., 2015
Comments on 'Efficient Revocable Certificateless Encryption Secure in the Standard Model'.
Comput. J., 2015
Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption.
Comput. J., 2015
Proceedings of the Provable Security, 2015
Proceedings of the Lightweight Cryptography for Security and Privacy, 2015
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015
Proceedings of the Information and Communications Security - 17th International Conference, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data.
Proceedings of the Computer Security - ESORICS 2015, 2015
Asymmetric Cross-cryptosystem Re-encryption Applicable to Efficient and Secure Mobile Access to Outsourced Data.
Proceedings of the 10th ACM Symposium on Information, 2015
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015
2014
IEEE Trans. Veh. Technol., 2014
IEEE Trans. Knowl. Data Eng., 2014
A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing.
IEEE Trans. Inf. Forensics Secur., 2014
An efficient PHR service system supporting fuzzy keyword search and fine-grained access control.
Soft Comput., 2014
A secure remote data integrity checking cloud storage system from threshold encryption.
J. Ambient Intell. Humaniz. Comput., 2014
Expert Syst. Appl., 2014
Proceedings of the Network and System Security - 8th International Conference, 2014
Proceedings of the Information Security Practice and Experience, 2014
Proceedings of the Information and Communications Security - 16th International Conference, 2014
Identity-Based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks.
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing.
Proceedings of the Computer Security - ESORICS 2014, 2014
2013
Realizing Fully Secure Unrestricted ID-Based Ring Signature in the Standard Model Based on HIBE.
IEEE Trans. Inf. Forensics Secur., 2013
Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction.
Theor. Comput. Sci., 2013
Comments on "Analysis and Improvement of a Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions".
IEEE Commun. Lett., 2013
Comput. J., 2013
Proceedings of the Provable Security - 7th International Conference, 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Privacy-preserving smart metering with regional statistics and personal enquiry services.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Provable Security - 6th International Conference, 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011
2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract).
Proceedings of the Provable Security - 4th International Conference, 2010
Short Generic Transformation to Strongly Unforgeable Signature in the Standard Model.
Proceedings of the Computer Security, 2010
2009
Proceedings of the Second ACM Conference on Wireless Network Security, 2009
Proceedings of the Information and Communications Security, 11th International Conference, 2009
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009
2008
Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model.
J. Univers. Comput. Sci., 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008
Proceedings of the Network and Distributed System Security Symposium, 2008
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008
2007
Int. J. Netw. Secur., 2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Information Security Practice and Experience, 2007
2006
Enhanced Security Models and a Generic Construction Approach for Linkable Ring Signature.
Int. J. Found. Comput. Sci., 2006
Self-Generated-Certificate Public Key Cryptography and Certificateless Signature / Encryption Scheme in the Standard Model.
IACR Cryptol. ePrint Arch., 2006
Practical Hierarchical Identity Based Encryption and Signature schemes Without Random Oracles.
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Advances in Information and Computer Security, 2006
Proceedings of the Advances in Information and Computer Security, 2006
Proceedings of the Progress in Cryptology, 2006
Proceedings of the Computational Science and Its Applications, 2006
2005
A Suite of Non-Pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity.
IACR Cryptol. ePrint Arch., 2005
Transferable E-Cash Revisit.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005
Proceedings of the Information Security Practice and Experience, 2005
Proceedings of the Information Security and Cryptology, 2005
Proceedings of the Computational Science and Its Applications, 2005
Proceedings of the Public Key Infrastructure, 2005
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2005
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005
2004
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Information Security and Cryptology, 2004
Proceedings of the Security in Ad-hoc and Sensor Networks, First European Workshop, 2004
Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (Extended Abstract).
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
2003
Proceedings of the Information Security and Cryptology, 2003
On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST.
Proceedings of the Information and Communications Security, 5th International Conference, 2003
Proceedings of the 2003 IEEE International Conference on Advanced Learning Technologies, 2003