Browsing by Author Chow, SSM

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 20 of 22  next >
TitleAuthor(s)Issue DateViews
 
Don’t Tamper with Dual System Encryption: Beyond Polynomial Related-Key Security of IBE
Proceeding/Conference:The 20th International Conference on Applied Cryptography and Network Security, (ACNS 2022)
2022
An e-lottery scheme using Verifiable Random Function
Proceeding/Conference:Lecture Notes in Computer Science
2005
316
 
Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity
Journal:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2004
114
Efficient identity based ring signature
Proceeding/Conference:Lecture Notes in Computer Science
2005
Exclusion-intersection encryption
Proceeding/Conference:IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2011
2011
106
 
Exclusion-intersection encryption
Journal:International Journal of Security and Networks
2011
266
 
Forward-secure multisignature and blind signature schemes
Journal:Applied Mathematics and Computation
2005
411
 
2005
135
Identity based delegation network
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2005
Identity based ring signature: Why, how and what next
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2005
Identity based threshold ring signature
Proceeding/Conference:Lecture Notes in Computer Science
2005
128
Identity-based encryption resilient to continual auxiliary leakage
Proceeding/Conference:Lecture Notes in Computer Science
2012
142
 
Multiplicative forward-secure threshold signature scheme
Journal:International Journal of Network Security
2008
 
PE(AR)2: privacy-enhanced anonymous authentication with reputation and revocation
Proceeding/Conference:Lecture Notes in Computer Science
2012
63
 
2006
359
Related randomness attacks for public key crypto systems
Proceeding/Conference:ASIACCS 2015 - Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security
2015
Role activation management in role based access control
Proceeding/Conference:Lecture Notes in Computer Science
2005
111
 
Secure hierarchical identity based signature and its application
Journal:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2004
 
Separable and anonymous identity-based key issuing
Proceeding/Conference:Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS
2005
119
 
SPICE - simple privacy-preserving identity-management for cloud environment
Proceeding/Conference:Lecture Notes in Computer Science
2012
267