Browsing by Author Chow, SSM

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 20 of 21  next >
TitleAuthor(s)Issue DateViews
An e-lottery scheme using Verifiable Random Function
Proceeding/Conference:Lecture Notes in Computer Science
2005
107
 
Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity
Journal:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2004
104
Efficient identity based ring signature
Proceeding/Conference:Lecture Notes in Computer Science
2005
90
 
Exclusion-intersection encryption
Journal:International Journal of Security and Networks
2011
54
Exclusion-intersection encryption
Proceeding/Conference:IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2011
2011
43
 
Forward-secure multisignature and blind signature schemes
Journal:Applied Mathematics and Computation
2005
132
 
2005
93
Identity based delegation network
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2005
61
Identity based ring signature: Why, how and what next
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2005
89
Identity based threshold ring signature
Proceeding/Conference:Lecture Notes in Computer Science
2005
70
Identity-based encryption resilient to continual auxiliary leakage
Proceeding/Conference:Lecture Notes in Computer Science
2012
128
 
Multiplicative forward-secure threshold signature scheme
Journal:International Journal of Network Security
2008
49
 
PE(AR)2: privacy-enhanced anonymous authentication with reputation and revocation
Proceeding/Conference:Lecture Notes in Computer Science
2012
90
 
2006
83
Related randomness attacks for public key crypto systems
Proceeding/Conference:ASIACCS 2015 - Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security
2015
87
Role activation management in role based access control
Proceeding/Conference:Lecture Notes in Computer Science
2005
65
 
Secure hierarchical identity based signature and its application
Journal:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2004
126
 
Separable and anonymous identity-based key issuing
Proceeding/Conference:Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS
2005
75
 
SPICE - simple privacy-preserving identity-management for cloud environment
Proceeding/Conference:Lecture Notes in Computer Science
2012
258
Timed-release encryption revisited
Proceeding/Conference:Lecture Notes in Computer Science
2008
86