Skip to the content of the web site.
an exploration to the future of secure and privacy systems ...

Publications

The documents are made available to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each copyright.

All IEEE publications: “© IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.”
    [J][C][B][T]

Journal Papers:

[2025 and beyond]

Conference Papers:

[2025 and beyond]

Book & Book Chapters:

  1. B. Li, R. Lu, and G. Xiao, Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems, Wireless Networks, Springer Verlag, 2020. (ISBN: 978-3-030-58671-3) [PDF]
  2. R. Lu, Privacy-Enhancing Aggregation Techniques for Smart Grid Communications, Wireless Networks, Springer Verlag, 2016. (ISBN: 978-3-319-32899-7) [PDF]
  3. R. Lu, X. Lin, C. Huang, and H. Bao, Privacy-Preserving Time Series Data Aggregation for Internet of Things, Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations, Editor Fei Hu, March 30, 2016 Forthcoming by CRC Press, (ISBN 9781498723183) [PDF]
  4. L. Li and R. Lu, Anonymous Communication for Big Data, Networking for Big Data, pp. 233 - 256, Editors S. Yu, X. Lin, J. Misic, and X. Shen, CRC Press, 2015. (ISBN 978-1-4822-720696349-7) [PDF]
  5. X. Lin and R. Lu, Vehicular Ad Hoc Network Security and Privacy, June 2015, Wiley-IEEE Press. (ISBN: 978-1-118-91390-1) [PDF]
  6. M. Wen, R. Lu, X. Liang, J. Lei, and X. Shen (authors), Querying over Encrypted Data in Smart Grids, SpringerBriefs in Computer Science, Springer Verlag, 2014. (ISBN: 978-3-319-06354-6, ISBN 978-3-319-06355-3 eBook) [PDF]
  7. X. Liang, R. Lu, X. Lin, and X. Shen (authors), Security and Privacy in Mobile Social Networks, SpringerBriefs in Computer Science, Springer Verlag, 2014. (ISBN: 978-1-4614-8857-6) [PDF]
  8. K. Zhang, X. Liang, R. Lu, and X. Shen, "Exploiting Private Profile Matching for Efficient Packet Forwarding in Mobile Social Networks", Handbook on Opportunistic Mobile Social Networks, to appear. Editors J. Wu and Y. Wang, CRC Press, Taylo & Francis Group, USA, 2013. [PDF]
  9. X. Lin, H. Zhu, M. Shi, R. Lu, P.H. Ho, X. Shen, "Universal Authentication and Billing Architecture for Wireless MANs", Emerging Wireless LANs, Wireless PANs, and Wireless MANs, pp. 555 - 584, Editors Y. Xiao and Y. Pan, John Wiley & Sons, Inc., 2009. (ISBN 978-0-471-72069-0) [PDF]

Technical Report:

  1. J. Shao, Z. Cao, L. Wang, and R. Lu, "Efficient Password-based Authenticated Key Exchange without Public Information", IACR Cryptology ePrint Archive 2007: 326, 2007. [PDF]
  2. R. Lu, Z. Cao, R. Su, and J. Shao, "Pairing-Based Two-Party Authenticated Key Agreement Protocol", IACR Cryptology ePrint Archive 2005: 354, 2005. [PDF]
  3. R. Lu and Z. Cao, "ID-based Encryption Scheme Secure against Chosen Ciphertext Attacks", IACR Cryptology ePrint Archive 2005: 355, 2005. [PDF]