I am a lecturer (assistant professor) at School of Computing, Mathematics and Digital Technology.
I would like to pay more attention to provoke your creativity, difference, diversity and diligence .
I am currently a lecturer (assistant professor) at School of Computing, Mathematics and Digital Technology, Manchester Metropolitan University in UK.
2012-2013
CS1302 Introduction to Computer Programing, City University of Hong Kong.
2011-2012
CS3342 Software Design, City University of Hong Kong.
CS3391 Advanced Programming, City University of Hong Kong.
2015
T-79.4502 Cryptography and Data SEcurity, Aalto University, Finland.
Cybersecurity, privacy and security in information technology; in particular, cloud security, big data security, genomic privacy, privacy enhancing technology, cryptocurrencies, blockchain, privacy in internet of things, and lightweight secure systems. Currently, I am interested in bringing back security and privacy to big data analysis, and exploring secure blockchain technology in other commercial/business scenarios.
Some userful links:
Top publications - Computer Security & Cryptography
Computer Security Conference Ranking and Statistic
C. Gritti, W. Susilo, T. Plantard, K. Liang, DS. Wong (2016). Broadcast encryption with dealership. International Journal of Information Security. 15(3), pp.271-283.
J. Shao, R. Lu, X. Lin, K. Liang (2016). Secure bidirectional proxy re-encryption for cryptographic cloud storage. Pervasive and Mobile Computing. 28, pp.113-121.
J. Wei, G. Yang, Y. Mu, K. Liang (2016). Anonymous Proxy Signature with Hierarchical Traceability: TABLE 1. The Computer Journal. 59(4), pp.559-569.
A. Yang, K. Liang, Y. Zhuang, DS. Wong, X. Jia (2015). A new unpredictability‐based radio frequency identification forward privacy model and a provably secure construction. Security and Communication Networks. 8(16), pp.2836-2849.
K. Liang, W. Susilo, JK. Liu, DS. Wong (2015). Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption. The Computer Journal. 58(10), pp.2778-2792.
K. Liang, L. Fang, DS. Wong, W. Susilo (2015). A ciphertext‐policy attribute‐based proxy re‐encryption scheme for data sharing in public clouds. Concurrency and Computation: Practice and Experience. 27(8), pp.2004-2027.
K. Liang, C-K. Chu, X. Tan, DS. Wong, C. Tang, et al. J. Zhou. (2014). Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts. Theoretical Computer Science. 539, pp.87-105.
C. Luo, A. Fylakis, J. Partala, S. Klakegg, J. Goncalves, et al. K. Liang, T. Seppänen, V. Kostakos. (2016). A data hiding approach for sensitive smartphone data. In: Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing.
K. Liang, C. Su, J. Chen, JK. Liu (2016). Efficient Multi-Function Data Sharing and Searching Mechanism for Cloud-Based Encrypted Data. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security.
S. Lai, JK. Liu, K-KR. Choo, K. Liang (2016). Secret Picture: An Efficient Tool for Mitigating Deletion Delay on OSN. pp.467-477.
Y. Tian, G. Yang, Y. Mu, K. Liang, Y. Yu (2016). One-Round Attribute-Based Key Exchange in the Multi-party Setting. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). pp.227-243.
C. Lin, F. Zhu, W. Wu, K. Liang, K-KR. Choo (2016). A New Transitive Signature Scheme. pp.156-167.
TVX. Phuong, G. Yang, W. Susilo, K. Liang (2016). Edit Distance Based Encryption and Its Application. pp.103-119.
P. Zhang, Z. Chen, K. Liang, S. Wang, T. Wang (2016). A Cloud-Based Access Control Scheme with User Revocation and Attribute Update. pp.525-540.
K. Liang, A. Miyaji, C. Su (2016). Secure and Traceable Framework for Data Circulation. pp.376-388.
W. Liu, J. Liu, Q. Wu, B. Qin, K. Liang (2016). Online/Offline Public-Index Predicate Encryption for Fine-Grained Mobile Access Control. pp.588-605.
R. Lu, X. Lin, J. Shao, K. Liang (2014). RCCA-Secure Multi-use Bidirectional Proxy Re-encryption with Master Secret Security. pp.194-205.
K. Liang, MH. Au, W. Susilo, DS. Wong, G. Yang, et al. Y. Yu. (2014). An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data Sharing. pp.448-461.
K. Liang, L. Fang, W. Susilo, DS. Wong (2013). A Ciphertext-Policy Attribute-Based Proxy Re-encryption with Chosen-Ciphertext Security. In: 2013 5th International Conference on Intelligent Networking and Collaborative Systems. 9/9/2013.
K. Liang, Q. Huang, R. Schlegel, DS. Wong, C. Tang (2013). A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release. pp.132-146.
K. Liang, . Zhen Liu, . Xiao Tan, . Duncan S. Wong, . Chunming Tang (2013). Information Security and Cryptology – ICISC 2012. Seoul, Korea, 28/11/2012.
- ESORICS best research paper, 2015.
- Certificate of Merit in the Teaching Students: Fist Steps Course, City University of Hong Kong, Hong Kong, March 2013.
IEEE Membership