default search action
Hui Cui 0001
Person information
- affiliation: Murdoch University, Discipline of Information Technology, Mathematics and Statistics, Perth, Australia
- affiliation: Data61, CSIRO, Australia
- affiliation: Royal Melbourne Institute of Technology University, RMIT, Computer Science and Software Engineering, Melbourne, Australia
- affiliation: Singapore Management University, Secure Mobile Centre, Singapore
- affiliation (PhD 2015): University of Wollongong, School of Computing and Information Technology, Australia
Other persons with the same name
- Hui Cui — disambiguation page
- Hui Cui 0002 — La Trobe University, Department of Computer Science and Information Technology, Melbourne, Australia (and 1 more)
- Hui Cui 0003 — ShanghaiTech University, School of Life Science and Technology, China (and 1 more)
- Hui Cui 0004 — Shandong Normal University, School of Information Science and Engineering, Jinan, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j40]Jianlin Zhang, Chen Hou, Xu Yang, Xuechao Yang, Wencheng Yang, Hui Cui:
Advancing face detection efficiency: Utilizing classification networks for lowering false positive incidences. Array 22: 100347 (2024) - [j39]Shui Jiang, Yanning Ge, Xu Yang, Wencheng Yang, Hui Cui:
UAV Control Method Combining Reptile Meta-Reinforcement Learning and Generative Adversarial Imitation Learning. Future Internet 16(3): 105 (2024) - [j38]Tenzin Norbu, Joo-Yeon Park, Kok Wai Wong, Hui Cui:
Factors Affecting Trust and Acceptance for Blockchain Adoption in Digital Payment Systems: A Systematic Review. Future Internet 16(3): 106 (2024) - [j37]Hui Cui, Xun Yi:
Secure Internet of Things in Cloud Computing via Puncturable Attribute-Based Encryption With User Revocation. IEEE Internet Things J. 11(2): 3662-3670 (2024) - [j36]Hui Cui, Zhiguo Wan, Tianyu Zhaolu, Huaqun Wang, Atsuko Miyaji:
Pay-Per-Proof: Decentralized Outsourced Multi-User PoR for Cloud Storage Payment Using Blockchain. IEEE Trans. Cloud Comput. 12(1): 130-144 (2024) - [j35]Hui Cui, Zhiguo Wan, Rui Gao, Huaqun Wang:
Outsourced Privately Verifiable Proofs of Retrievability via Blockchain. IEEE Trans. Dependable Secur. Comput. 21(4): 1501-1514 (2024) - [c16]Yanjun Shen, Joseph K. Liu, Xingliang Yuan, Shifeng Sun, Hui Cui:
SecuPath: A Secure and Privacy-Preserving Multiparty Path Planning Framework in UAV Applications. ACISP (3) 2024: 213-232 - 2023
- [j34]Yangguang Tian, Atsuko Miyaji, Koki Matsubara, Hui Cui, Nan Li:
Revocable Policy-Based Chameleon Hash for Blockchain Rewriting. Comput. J. 66(10): 2365-2378 (2023) - [j33]Wei Liu, Yinghui Zhang, Gang Han, Jin Cao, Hui Cui, Dong Zheng:
Secure and Efficient Smart Healthcare System Based on Federated Learning. Int. J. Intell. Syst. 2023: 1-12 (2023) - [j32]Hui Cui, Zhiguo Wan, Huayi Qi, Baodong Qin, Xun Yi:
Password-authenticated proofs of retrievability for multiple devices checking cloud data. J. Inf. Secur. Appl. 75: 103480 (2023) - [j31]Wencheng Yang, Song Wang, Hui Cui, Zhaohui Tang, Yan Li:
A Review of Homomorphic Encryption for Privacy-Preserving Biometrics. Sensors 23(7): 3566 (2023) - [j30]Yinghui Zhang, Tian Zhu, Rui Guo, Shengmin Xu, Hui Cui, Jin Cao:
Multi-Keyword Searchable and Verifiable Attribute-Based Encryption Over Cloud Data. IEEE Trans. Cloud Comput. 11(1): 971-983 (2023) - [j29]Zhiguo Wan, Wei Liu, Hui Cui:
HIBEChain: A Hierarchical Identity-Based Blockchain System for Large-Scale IoT. IEEE Trans. Dependable Secur. Comput. 20(2): 1286-1301 (2023) - [j28]Yihao Guo, Zhiguo Wan, Hui Cui, Xiuzhen Cheng, Falko Dressler:
Vehicloak: A Blockchain-Enabled Privacy-Preserving Payment Scheme for Location-Based Vehicular Services. IEEE Trans. Mob. Comput. 22(11): 6830-6842 (2023) - [j27]Hui Cui, Xuechao Yang, Wencheng Yang, Baodong Qin, Xun Yi:
Token-Based Biometric Enhanced Key Derivation for Authentication Over Wireless Networks. IEEE Trans. Netw. Sci. Eng. 10(4): 2347-2357 (2023) - 2021
- [j26]Hui Cui, Russell Paulet, Surya Nepal, Xun Yi, Butrus Mbimbi:
Two-Factor Decryption: A Better Way to Protect Data Security and Privacy. Comput. J. 64(4): 550-563 (2021) - [c15]Baodong Qin, Xue Bai, Dong Zheng, Hui Cui, Yiyuan Luo:
Forward-Secure Revocable Identity-Based Encryption. ICICS (2) 2021: 321-340 - [c14]Baodong Qin, Hui Cui, Xiaokun Zheng, Dong Zheng:
Improved Security Model for Public-Key Authenticated Encryption with Keyword Search. ProvSec 2021: 19-38 - 2020
- [j25]Hui Cui, Tsz Hon Yuen, Robert H. Deng, Guilin Wang:
Server-aided revocable attribute-based encryption for cloud computing services. Concurr. Comput. Pract. Exp. 32(14) (2020) - [j24]Hui Cui, Robert H. Deng, Baodong Qin, Jian Weng:
Key regeneration-free ciphertext-policy attribute-based encryption and its application. Inf. Sci. 517: 217-229 (2020) - [j23]Hui Cui, Baodong Qin, Willy Susilo, Surya Nepal:
Robust digital signature revisited. Theor. Comput. Sci. 844: 87-96 (2020) - [j22]Hui Cui, Zhiguo Wan, Xinlei Wei, Surya Nepal, Xun Yi:
Pay as You Decrypt: Decryption Outsourcing for Functional Encryption Using Blockchain. IEEE Trans. Inf. Forensics Secur. 15: 3227-3238 (2020) - [e1]Joseph K. Liu, Hui Cui:
Information Security and Privacy - 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings. Lecture Notes in Computer Science 12248, Springer 2020, ISBN 978-3-030-55303-6 [contents]
2010 – 2019
- 2019
- [j21]Xu Yang, Xun Yi, Ibrahim Khalil, Hui Cui, Xuechao Yang, Surya Nepal, Xinyi Huang, Yali Zeng:
A new privacy-preserving authentication protocol for anonymous web browsing. Concurr. Comput. Pract. Exp. 31(21) (2019) - [j20]Baodong Qin, Qinglan Zhao, Dong Zheng, Hui Cui:
(Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance. Inf. Sci. 490: 74-92 (2019) - [j19]Yangguang Tian, Yingjiu Li, Guomin Yang, Willy Susilo, Yi Mu, Hui Cui, Yinghui Zhang:
DABKE: Secure deniable attribute-based key exchange framework. J. Comput. Secur. 27(2): 259-275 (2019) - [j18]Hui Cui, Robert H. Deng, Yingjiu Li, Guowei Wu:
Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud. IEEE Trans. Big Data 5(3): 330-342 (2019) - [j17]Hui Cui, Robert H. Deng, Guilin Wang:
An Attribute-Based Framework for Secure Communications in Vehicular Ad Hoc Networks. IEEE/ACM Trans. Netw. 27(2): 721-733 (2019) - [j16]Xu Yang, Xun Yi, Ibrahim Khalil, Yali Zeng, Xinyi Huang, Surya Nepal, Xuechao Yang, Hui Cui:
A lightweight authentication scheme for vehicular ad hoc networks based on MSR. Veh. Commun. 15: 16-27 (2019) - [i1]Zhiguo Wan, Wei Liu, Hui Cui:
HIBEChain: A Hierarchical Identity-based Blockchain System for Large-Scale IoT. IACR Cryptol. ePrint Arch. 2019: 1425 (2019) - 2018
- [j15]Hui Cui, Xun Yi, Surya Nepal:
Achieving Scalable Access Control Over Encrypted Data for Edge Computing Networks. IEEE Access 6: 30049-30059 (2018) - [j14]Hui Cui, Robert H. Deng, Junzuo Lai, Xun Yi, Surya Nepal:
An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited. Comput. Networks 133: 157-165 (2018) - [j13]Hui Cui, Robert H. Deng, Yingjiu Li:
Attribute-based cloud storage with secure provenance over encrypted data. Future Gener. Comput. Syst. 79: 461-472 (2018) - [j12]Hui Cui, Zhiguo Wan, Robert H. Deng, Guilin Wang, Yingjiu Li:
Efficient and Expressive Keyword Search Over Encrypted Data in Cloud. IEEE Trans. Dependable Secur. Comput. 15(3): 409-422 (2018) - [j11]Hui Cui, Robert H. Deng, Joseph K. Liu, Xun Yi, Yingjiu Li:
Server-Aided Attribute-Based Signature With Revocation for Resource-Constrained Industrial-Internet-of-Things Devices. IEEE Trans. Ind. Informatics 14(8): 3724-3732 (2018) - 2017
- [c13]Hui Cui, Robert H. Deng, Joseph K. Liu, Yingjiu Li:
Attribute-Based Encryption with Expressive and Authorized Keyword Search. ACISP (1) 2017: 106-126 - [c12]Baodong Qin, Qinglan Zhao, Dong Zheng, Hui Cui:
Server-Aided Revocable Attribute-Based Encryption Resilient to Decryption Key Exposure. CANS 2017: 504-514 - [c11]Xu Yang, Xun Yi, Hui Cui, Xuechao Yang, Surya Nepal, Xinyi Huang, YaLi Zeng:
A Practical Authentication Protocol for Anonymous Web Browsing. ISPEC 2017: 468-482 - [c10]Hui Cui, Man Ho Au, Baodong Qin, Robert H. Deng, Xun Yi:
Fuzzy Public-Key Encryption Based on Biometric Data. ProvSec 2017: 400-409 - [c9]Zhi Yuan Poh, Hui Cui, Robert H. Deng, Yingjiu Li:
Attribute-Based Secure Messaging in the Public Cloud. SG-CRC 2017: 86-96 - 2016
- [j10]Hui Cui, Robert H. Deng:
Revocable and Decentralized Attribute-Based Encryption. Comput. J. 59(8): 1220-1235 (2016) - [j9]Hui Cui, Guilin Wang, Robert H. Deng, Baodong Qin:
Escrow free attribute-based signature with self-revealability. Inf. Sci. 367-368: 660-672 (2016) - [j8]Hui Cui, Yi Mu, Man Ho Au:
Relations between robustness and RKA security under public-key encryption. Theor. Comput. Sci. 628: 78-91 (2016) - [c8]Hui Cui, Robert H. Deng, Yingjiu Li, Baodong Qin:
Server-Aided Revocable Attribute-Based Encryption. ESORICS (2) 2016: 570-587 - [c7]Hui Cui, Robert H. Deng, Guowei Wu, Junzuo Lai:
An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures. ProvSec 2016: 19-38 - [c6]Hui Cui, Robert H. Deng, Xuhua Ding, Yingjiu Li:
Attribute-Based Encryption with Granular Revocation. SecureComm 2016: 165-181 - 2015
- [j7]Hui Cui, Yi Mu, Man Ho Au:
Proof of retrievability with public verifiability resilient against related-key attacks. IET Inf. Secur. 9(1): 43-49 (2015) - 2014
- [j6]Hui Cui, Yi Mu, Man Ho Au:
Signcryption Secure Against Linear Related-Key Attacks. Comput. J. 57(10): 1472-1483 (2014) - [j5]Hui Cui, Yi Mu, Man Ho Au:
Anonymous broadcast encryption with an untrusted gateway. Int. J. Secur. Networks 9(1): 20-29 (2014) - [c5]Hui Cui, Yi Mu, Man Ho Au:
Complete Robustness in Identity-Based Encryption. ProvSec 2014: 342-349 - [c4]Hui Cui, Yi Mu, Man Ho Au:
Public-Key Encryption Resilient against Linear Related-Key Attacks Revisited. TrustCom 2014: 268-275 - 2013
- [j4]Hui Cui, Yi Mu, Fuchun Guo:
Server-aided identity-based anonymous broadcast encryption. Int. J. Secur. Networks 8(1): 29-39 (2013) - [c3]Hui Cui, Yi Mu, Man Ho Au:
Anonymous Signcryption against Linear Related-Key Attacks. ProvSec 2013: 165-183 - [c2]Hui Cui, Yi Mu, Man Ho Au:
Public-Key Encryption Resilient to Linear Related-Key Attacks. SecureComm 2013: 182-196 - [c1]Hui Cui, Yi Mu, Man Ho Au:
Verifiable and Anonymous Encryption in Asymmetric Bilinear Maps. TrustCom/ISPA/IUCC 2013: 704-711 - 2011
- [j3]Hui Cui, Tianjie Cao:
A Secure Anonymous Identity-based Key Agreement Protocol for Distributed Computer Networks. J. Networks 6(9): 1337-1343 (2011)
2000 – 2009
- 2009
- [j2]Tianjie Cao, Shi Huang, Hui Cui, Yipeng Wu, Qihan Luo:
Controlled Secret Leakage. J. Comput. 4(1): 61-68 (2009) - [j1]Hui Cui, Tianjie Cao:
An Novel Anonymous Authenticated and Key Exchange Protocol. J. Networks 4(10): 985-992 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-13 23:52 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint