Browsing by Author Chow, SSM

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 8 to 21 of 21 < previous 
TitleAuthor(s)Issue DateViews
Identity based delegation network
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2005
61
Identity based ring signature: Why, how and what next
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2005
89
Identity based threshold ring signature
Proceeding/Conference:Lecture Notes in Computer Science
2005
70
Identity-based encryption resilient to continual auxiliary leakage
Proceeding/Conference:Lecture Notes in Computer Science
2012
128
 
Multiplicative forward-secure threshold signature scheme
Journal:International Journal of Network Security
2008
49
 
PE(AR)2: privacy-enhanced anonymous authentication with reputation and revocation
Proceeding/Conference:Lecture Notes in Computer Science
2012
90
 
2006
84
Related randomness attacks for public key crypto systems
Proceeding/Conference:ASIACCS 2015 - Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security
2015
87
Role activation management in role based access control
Proceeding/Conference:Lecture Notes in Computer Science
2005
65
 
Secure hierarchical identity based signature and its application
Journal:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2004
128
 
Separable and anonymous identity-based key issuing
Proceeding/Conference:Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS
2005
75
 
SPICE - simple privacy-preserving identity-management for cloud environment
Proceeding/Conference:Lecture Notes in Computer Science
2012
258
Timed-release encryption revisited
Proceeding/Conference:Lecture Notes in Computer Science
2008
86
Two improved partially blind signature schemes from bilinear pairings
Proceeding/Conference:Lecture Notes in Computer Science
2005
66