Browsing by Author Wong, Duncan S.

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 13 of 13
TitleAuthor(s)Issue DateViews
 
A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing
Journal:IEEE Transactions on Information Forensics and Security
2014
23
 
2015
31
A suite of non-pairing ID-based threshold ring signature schemes with different levels of anonymity (extended abstract)
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2010
19
An adaptively CCA-secure ciphertext-policy attribute-based proxy re-encryption for cloud data sharing
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2014
17
Concurrent signatures with fully negotiable binding control
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2011
12
 
2016
13
Efficient non-interactive range proof
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2009
18
Fairness in concurrent signatures revisited
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2013
12
Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2011
18
ID-based ring signature scheme secure in the standard model
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2006
36
Malicious KGC attacks in certificateless cryptography
Proceeding/Conference:eProceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
2007
10
Separable linkable threshold ring signatures
Proceeding/Conference:Cryptology - INDOCRYPT 2004: 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004. Proceedings
2004
16
Traceable and retrievable identity-based encryption
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2008
11