Discovery - Top 10
By people
- 100 yiu, siu ming
- 100 yiu, siu-ming
- 100 yiu, sm
- 100 姚兆明
- 80 cheung, d
- 80 cheung, david
- 80 cheung, david wai lok
- 80 cheung, dw
- 80 cheung, dwl
- 80 張偉犖
HKU Organizations
- 915 faculty of engineering
- 912 school of computing and data science
- 64 faculty of engineering
- 32 president's office
- 14 department of electrical and elec...
- 13 hku musketeers foundation institu...
- 8 li ka shing faculty of medicine
- 5 faculty of business and economics...
- 5 faculty of science
- 4 department of chemistry
Browse
Collection's Items (Sorted by Submit Date in Descending order): 141 to 160 of 963
Title | Author(s) | Issue Date | |
---|---|---|---|
Towards a cryptographic treatment of publish/subscribe systems Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2010 | ||
Efficient completely non-malleable and RKA secure public key encryptions Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2016 | ||
How to construct identity-based signatures without the key escrow problem Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2010 | ||
Escrowed linkability of ring signatures and its applications Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2006 | ||
Proxy ring signature: Formal definitions, efficient construction and new variant Proceeding/Conference:2006 International Conference on Computational Intelligence and Security, ICCIAS 2006 | 2007 | ||
Sanitizable signatures revisited Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2008 | ||
Constant-size id-based linkable and revocable-iff-linked ring signature Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2006 | ||
Group signature where group manager, members and Open Authority are identity-based Proceeding/Conference:Lecture Notes in Computer Science | 2005 | ||
Fast and proven secure blind identity-based signcryption from pairings Proceeding/Conference:Lecture Notes in Computer Science | 2005 | ||
(Convertible) undeniable signatures without random oracles Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2007 | ||
RingCT 2.0: A compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency Monero Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2017 | ||
Time-based direct revocable ciphertext-policy attribute-based encryption with short revocation list Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2018 | ||
Towards anonymous ciphertext indistinguishability with identity leakage Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2013 | ||
Threshold ring signature without random oracles Proceeding/Conference:Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011 | 2011 | ||
Concurrent signatures with fully negotiable binding control Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2011 | ||
Efficient non-interactive range proof Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2009 | ||
Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2011 | ||
Ring signatures without random oracles Proceeding/Conference:Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06 | 2006 | ||
ID-based ring signature scheme secure in the standard model Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2006 | ||
Certificate based (linkable) ring signature Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2007 |
Collection's Items (Sorted by Submit Date in Descending order): 141 to 160 of 963