Co-Authors
AuthorsNo. of Publications
susilo, willy 74
liu, joseph k. 40
mu, yi 31
yu, yong 16
zhou, jianying 13
xu, qiuliang 12
yang, rupeng 12
huang, xinyi 11
yu, zuoxia 11
cui, hui 10
wong, duncan s. 10
yuen, tsz hon 10
yang, guomin 9
yuen, th 9
liu, jk 8
tsang, patrick p. 8
wang, yang 8
meng, weizhi 7
susilo, w 7
chow, sherman s.m. 6
guo, fuchun 6
lai, junzuo 6
liang, kaitai 6
luo, xiapu 6
choo, kim kwang raymond 5
han, jinguang 5
jiang, zoe l. 5
kapadia, apu 5
kim, jongkil 5
li, jin 5
li, wenjuan 5
lu, xingye 5
zhang, zhenfei 5
lu, rongxing 4
luo, x 4
ni, jianbing 4
chow, yang wai 3
cui, h 3
deng, robert h. 3
du, y 3
duan, h 3
fang, junbin 3
huang, qiong 3
jiang, peng 3
li, kang 3
li, yannan 3
smith, sean w. 3
sun, shi feng 3
wang, c 3
wang, q 3
wang, y 3
wang, yu 3
wu, wei 3
xiang, yang 3
yang, r 3
zhang, yunmei 3
barmawi, ari moesriami 2
carminati, barbara 2
chan, henry c.b. 2
chen, wei 2
dou, yi 2
esgin, mf 2
fei, fei 2
gong, borui 2
hu, h 2
huang, z 2
huang, zhengan 2
kuo, c. c.jay 2
lai, j 2
lai, jianchang 2
lau, wang fat 2
li, w 2
liu, dyw 2
liu, hongyu 2
liu, zhe 2
ma, xiaobo 2
meng, x 2
nepal, surya 2
sakzad, amin 2
seberry, jennifer 2
shen, jian 2
steinfeld, ron 2
tang, yajuan 2
thorncharoensri, pairat 2
vasilakos, athanasios v. 2
wang, cong 2
wang, hao 2
wang, xuan 2
wong, duncan 2
xiao, bin 2
xie, x 2
xu, q 2
xue, h 2
xue, haiyang 2
xue, liang 2
yang, xu 2
ye, q 2
yin, chengyu 2
yiu, sm 2
yu, jiangshan 2
yu, z 2
zhang, yafang 2
zhou, a 2
zhou, j 2
zhou, miao 2
alberto torres, wilson abel 1
ateniese, giuseppe 1
baek, joonsang 1
bai, bo 1
bhattacharjee, nandita 1
cao, jie 1
castiglione, aniello 1
castiglione, arcangelo 1
chan, tony k. 1
chen, jiachi 1
chen, jing 1
chen, l 1
chen, lanxiang 1
chen, rongmao 1
chen, ting 1
chen, tong 1
chen, wenbin 1
chen, x 1
chen, xiaofeng 1
chen, y 1
chen, yuechen 1
cheng, jacob 1
cheung, dw 1
choo, kkr 1
choo, kr 1
chu, cheng kang 1
dai, yuanshun 1
das, dipayan 1
ding, z 1
dong, liju 1
du, r 1
du, xiaojiang 1
du, yuefeng 1
duan, huayi 1
esteves-verissimo, paulo 1
fan, z 1
fat, lau wang 1
fu, y 1
gu, d 1
gu, dawu 1
gu, g 1
han, shuai 1
he, debiao 1
he, kai 1
ho, iwh 1
ho, wang hei 1
hu, haibo 1
hu, hanwen 1
hu, shengtuo 1
hu, shun 1
hu, yuemei 1
huang, q 1
huang, x 1
imran, muhammad 1
jiang, j 1
jiang, muhui 1
jiang, y 1
jing, xu 1
kuchta, veronika 1
kutylowsky, miroslaw 1
kuzuno, hiroki 1
lau, wf 1
lau, wff 1
lee, wang hao 1
li, d 1
li, fengyin 1
li, hui 1
li, huilin 1
li, jiangtao 1
li, k 1
li, kuan ching 1
li, l 1
li, shuqin 1
li, wenmin 1
li, x 1
li, xiaoqi 1
li, zihao 1
lin, x 1
liu, j 1
liu, joseph 1
liu, l 1
liu, m 1
lu, x 1
luo, mingxing 1
luo, xp 1
lyu, jiazhuo 1
ma, x 1
mamoulis, n 1
manulis, mark 1
mao, x 1
mao, xianping 1
mao, yijun 1
meng, w 1
min, geyong 1
miyaji, atsuko 1
ni, j 1
ning, jianting 1
nong, zhenhao 1
palmieri, francesco 1
peng, zhen 1
phuong, tran viet xuan 1
qi, j 1
qin, baodong 1
qiu, xinliang 1
ren, jian 1
ren, kui 1
richard yu, f. 1
rimba, paul 1
sakzad, a 1
shen, t 1
shen, xs 1
shi, y 1
sookhak, mehdi 1
srinivasan, bala 1
sui, z 1
sun, sf 1
tang, c 1
tang, shaohua 1
tian, haibo 1
tian, shengwei 1
tian, song 1
wang, baocang 1
wang, boyang 1
wang, guilin 1
wang, hua 1
wang, j 1
wang, jianfeng 1
wang, kunpeng 1
wang, s 1
wang, tingting 1
wang, yi lei 1
wang, yilei 1
wang, ying 1
wei, victor k. 1
weng, jian 1
whyte, william 1
wong, ds 1
wu, huai 1
wu, qianhong 1
wu, w 1
xiao, x 1
xie, dongqing 1
xie, qi 1
xie, y 1
xiong, naixue 1
xu, cheng 1
xu, chunxiang 1
xu, jianliang 1
xu, xiu 1
xue, gz 1
xue, l 1
yan, jun 1
yang, anjia 1
yang, bo 1
yang, huijun 1
yang, x 1
yang, xiaoyan 1
yi, xun 1
yiu, s. m. 1
yiu, siu ming 1
yu, bin 1
yu, j 1
yu, yu 1
zeng, gongxian 1
zhan, zhi hui 1
zhang, f 1
zhang, fangguo 1
zhang, g 1
zhang, huang 1
zhang, jun 1
zhang, lei 1
zhang, lifeng 1
zhang, lingyue 1
zhang, peng 1
zhang, q 1
zhang, xiaosong 1
zhang, xinpeng 1
zhang, y 1
zhao, s 1
zhao, shuang 1
zheng, l 1
zheng, yifeng 1
zheng, zhihua 1
zhou, anxin 1
zhou, h 1
zhou, lu 1
zhou, y 1
zou, wei 1
zuo, c 1
View More
Keywords in Publications
keywordsNo. of Authors
anonymity 5
oblivious transfer 5
ring signature 5
access policies 4
data-base servers 4
database records 4
generic construction 4
linkable 4
ring signatures 4
the standard model 4
blockchain 3
cp-abe 3
k-taa 3
privacy 3
access control 2
anonymous access 2
anonymous authentication 2
artificial intelligence 2
attribute-based 2
authenticated key exchange 2
authentication 2
certificate based 2
chosen-ciphertext attack 2
cloud computing 2
convertible undeniable signature 2
cryptocurrencies 2
data privacy 2
data sharing 2
decentralization 2
decryption outsourcing 2
differential privacy 2
digital signatures 2
dual encryption system 2
electric vehicles 2
event-oriented 2
group signature 2
id-based cryptography 2
indistinguishability obfuscation 2
k-times 2
kem 2
key encapsulation mechanism 2
linkability 2
m-lwe/sis 2
multi-hop 2
optimistic fair exchange 2
pairings 2
personal health record 2
post quantum 2
privacy-enhanced revocation 2
random oracle model 2
random oracles 2
reservation 2
revocable 2
revocable anonymity 2
sdvs 2
security 2
security mediator 2
sharing 2
signature 2
smart contract 2
standard model 2
sum argument 2
supersingular elliptic curve isogeny 2
threshold 2
threshold ring signatures 2
unidirectional proxy re-encryption 2
user revocation 2
vehicular sensor networks 2
abstract stern-like protocol 1
accountability 1
accountable anonymity 1
accountable privacy 1
accumulator 1
ad hoc group 1
adaptive chosen-cipher text security 1
adaptive chosen-ciphertext security 1
algebraic signature 1
android and ios 1
android devices 1
android-app-analysis 1
android-packer 1
anonymous blacklisting 1
anonymous credential 1
anonymous identification 1
anonymous roaming 1
applied cryptography 1
arm-etm 1
assured data deletion 1
attribute based encryption 1
attribute-based encryption 1
auditable 1
authenticity 1
b2c 1
bandwidth 1
behavioral profiling 1
big data 1
bilinear pairing 1
bilinear pairings 1
biometric input 1
blacklistable anonymous credential 1
blind signature 1
blockchain enabled auditing 1
blockchain technology 1
bloom filter 1
bounded accumulator 1
bounded retrieval model 1
broadcast encryption 1
cc-rka 1
cc-rka security 1
certificateless encryption 1
certificateless signature 1
challenge-based mechanism 1
challenge-based trust mechanism 1
charging threat 1
chosen ciphertext attack 1
chosen-ciphertext attacks 1
chosen-ciphertext security 1
chosen-key model 1
ciphertext- policy attribute-based proxy re-encryption 1
ciphertext-policy attribute-based encryption 1
ciphertext-policy attribute-based proxy re-encryption 1
cloud 1
cloud data storage 1
cloud security 1
cloud storage 1
cm-rka 1
coin-traceability 1
collaborative intrusion detection 1
collaborative network 1
collusion 1
collusion attack 1
collusion resistance 1
command and control 1
compact 1
compact e-cash 1
computation cost 1
computational diffie-hellman assumption 1
computational hiding 1
concurrent signatures 1
confidential transactions 1
conjunctive keyword search 1
consortium blockchain 1
constant size 1
constant-size 1
cost-effective 1
criminal smart contract 1
crob 1
cross-system 1
crowdsensing 1
cryptocurrency 1
cryptography 1
cryptonote 1
cuckoo filter 1
data anonymity 1
data confidentiality 1
data feed 1
data integrity 1
data possession checking 1
ddos 1
decentralized anonymous credential 1
decentralized payment system 1
decentralized storage 1
delegation 1
deniability 1
designated verifier signature 1
detection performance 1
digital signature 1
directly revocable 1
divisible on-line/off-line signatures 1
dos-eu-cma 1
dual system encryption 1
dual system methodology 1
dynamic auditing 1
dynamic k-taa 1
e-cash 1
e-voting 1
efficiency 1
electric vehicle 1
electronic voting 1
emerging network 1
encodings 1
encrypted filter 1
encryption 1
energy consumption 1
enhanced model 1
enhanced security model 1
escrowed deniability 1
evoting 1
factorization 1
fairness 1
false alarm reduction 1
filtering 1
filtering service 1
fine-grained access control 1
firewall 1
fog computing 1
functional encryption 1
functional proxy re-encryption 1
fuzzy access-control 1
fuzzy data 1
fuzzy public-key encryption 1
game theory 1
geographical location 1
graph metric 1
graphical passwords 1
group signatures 1
hash proof system 1
hibe 1
homomorphic encryption 1
homomorphic hashing 1
identification 1
identity test 1
identity-based 1
identity-based broadcast encryption 1
identity-based cryptography 1
identity-based encryption 1
identity-based revocation system 1
identity-based signature 1
implementation 1
increasing maximal revocation number 1
inner product encryption 1
insider attack 1
intercloud 1
internet of things 1
internet of vehicles 1
intrusion detection 1
intrusion effort 1
ip networks 1
juice filming charging attack 1
k-anonymity 1
key escrow 1
lattice-based cryptography 1
lattice-based universal accumulator 1
leakage attack 1
leakage resilient cryptography 1
lightweight 1
lightweight verification 1
line-of-business services 1
linear related-key attack 1
linkable ring signature 1
local differential privacy 1
location privacy 1
location verification 1
logic gates 1
malicious node 1
map-based password authentication 1
medical cyber–physical system 1
medical smartphone network 1
message authentication 1
mobile botnet 1
mobile cloud 1
mobile could 1
mobile device 1
mobile device capabilities 1
mobile operating systems 1
mobile privacy and security 1
mobile security and privacy 1
mobile threats 1
multilinear map 1
multiple 1
non-membership proofs 1
obfuscations 1
ocr technology 1
on-line/off-line signatures 1
one-time password 1
one-time-password (otp) 1
online survey 1
os-eu-cma 1
pair encoding 1
pair encodings 1
pairing-based cryptography 1
partial fourier recovery problem 1
payment system 1
pkg 1
policy 1
position based cryptography 1
post-quantum cryptography 1
practicality 1
predicate 1
predicate encryption 1
priced oblivious transfer 1
prime order groups 1
privacy model 1
privacy preserving 1
privacy-preserving graph analysis 1
procurement 1
protocols 1
provable security 1
proxy re-encryption 1
proxy signature 1
pubilc key encrytion 1
public auditability 1
public extraction 1
public key 1
public key cryptography 1
public key encryption 1
public-key encryption 1
purchasing privacy 1
q-learning 1
qr code 1
query processing 1
random oracle 1
randomness extraction 1
range query 1
related-key attack 1
remote data integrity checking 1
reputation 1
restricted adaptive attacks 1
retrievability 1
revocable certificateless signature 1
revocation 1
risk assessment 1
rka security 1
robustness 1
rogue key attack 1
rsa cryptosystem 1
scenarios 1
search 1
searchable encryption 1
searchable symmetric encryption 1
secure 1
secure channel free 1
security analysis 1
security and privacy 1
security and usability 1
selective opening security for receivers 1
semi-static 1
semi-supervised learning 1
server-aided computation 1
short ciphertexts 1
short signature 1
short-parameter construction 1
signatures 1
signcryption 1
simulation-based security 1
sme 1
spatial encryption 1
standard assumption 1
statistical trust computation 1
subjective blacklisting 1
tampering attack 1
test-bed 1
threshold cryptosystem 1
traceability 1
transaction integrity 1
transaction verification 1
transaction-authentication-number (tan) 1
transferability 1
trust 1
trust computation 1
trust computation and management 1
trust evaluation 1
trust management 1
trusted hardware 1
twisted elgamal 1
two party ring signatures 1
ubiquitous computing 1
unforgeability 1
untraceability 1
user authentication 1
user misbehavior 1
vehicular network 1
verifiable ciphertext delegation 1
verifiable encryption 1
verifiable search 1
verification 1
visual cryptography 1
watermarkable prf 1
watermarking 1
weak computational device 1
zero knowledge 1
zero-knowledge arguments of nonmembership 1
zero-knowledge proof 1
zero-knowledge proof of knowledge 1
View More
Co-Investigators
InvestigatorsNo. of Grants
yiu, siu ming 6
View More