Discovery - Top 10
By people
- 205 yiu, siu ming
- 205 yiu, siu-ming
- 205 yiu, sm
- 205 姚兆明
- 180 wu, c
- 163 lau, f
- 163 lau, fcm
- 163 lau, francis c. m.
- 163 lau, francis chi moon
- 163 劉智滿
HKU Organizations
- 2909 faculty of engineering
- 2901 school of computing and data science
- 143 hku musketeers foundation institu...
- 121 faculty of engineering
- 45 department of electrical and elec...
- 32 president's office
- 21 li ka shing faculty of medicine
- 14 faculty of science
- 12 faculty of dentistry
- 10 faculty of business and economics...
Browse
Collection's Items (Sorted by Submit Date in Descending order): 1101 to 1120 of 3037
Title | Author(s) | Issue Date | |
---|---|---|---|
An adaptively CCA-secure ciphertext-policy attribute-based proxy re-encryption for cloud data sharing Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2014 | ||
An efficient KP-ABE with short ciphertexts in prime order groups under standard assumption Proceeding/Conference:ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security | 2017 | ||
Privacy-enhanced keyword search in clouds Proceeding/Conference:Proceedings - 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 | 2013 | ||
Efficient semi-static secure broadcast encryption scheme Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2014 | ||
PEVTS: Privacy-preserving electric vehicles test-bedding scheme Proceeding/Conference:Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS | 2016 | ||
Public-key encryption resilient against linear related-key attacks revisited Proceeding/Conference:Proceedings - 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014 | 2015 | ||
Verifiable and anonymous encryption in asymmetric bilinear maps Proceeding/Conference:Proceedings - 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 | 2013 | ||
Anonymous signcryption against linear related-key attacks Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2013 | ||
Relations among privacy notions for signcryption and key invisible "sign-then-encrypt" Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2013 | ||
Server-aided signatures verification secure against collusion attack Proceeding/Conference:Information Security Technical Report | 2013 | ||
Fairness in concurrent signatures revisited Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2013 | ||
PERM: Practical reputation-based blacklisting without TTPs Proceeding/Conference:Proceedings of the ACM Conference on Computer and Communications Security | 2012 | ||
Perfect ambiguous optimistic fair exchange Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2012 | ||
Enhancing location privacy for electric vehicles (at the right time) Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2012 | ||
Efficient escrow-free identity-based signature Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2012 | ||
Privacy-preserved access control for cloud computing Proceeding/Conference:Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011 | 2011 | ||
Proof-of-knowledge of representation of committed value and its applications Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2010 | ||
Short generic transformation to strongly unforgeable signature in the standard model Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2010 | ||
Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2018 | ||
Lattice-based universal accumulator with nonmembership arguments Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2018 |
Collection's Items (Sorted by Submit Date in Descending order): 1101 to 1120 of 3037