Man Ho Au
Man Ho Au
在 cs.hku.hk 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Attribute-based signature and its applications
J Li, MH Au, W Susilo, D Xie, K Ren
Proceedings of the 5th ACM Symposium on Information, Computer and …, 2010
3072010
Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model
JK Liu, MH Au, W Susilo
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
2622007
Malicious KGC attacks in certificateless cryptography
MH Au, Y Mu, J Chen, DS Wong, JK Liu, G Yang
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
2622007
Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage
Y Yu, MH Au, G Ateniese, X Huang, W Susilo, Y Dai, G Min
IEEE Transactions on Information Forensics and Security 12 (4), 767-778, 2016
2422016
Constant-Size Dynamic k-TAA
MH Au, W Susilo, Y Mu
International conference on security and cryptography for networks, 111-125, 2006
2322006
Blacklistable anonymous credentials: blocking misbehaving users without TTPs
PP Tsang, MH Au, A Kapadia, SW Smith
Proceedings of the 14th ACM conference on Computer and communications …, 2007
1862007
Improving privacy and security in decentralized ciphertext-policy attribute-based encryption
J Han, W Susilo, Y Mu, J Zhou, MHA Au
IEEE transactions on information forensics and security 10 (3), 665-678, 2014
1422014
Ringct 2.0: A compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency monero
SF Sun, MH Au, JK Liu, TH Yuen
European Symposium on Research in Computer Security, 456-474, 2017
1382017
A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing
K Liang, MH Au, JK Liu, W Susilo, DS Wong, G Yang, TVX Phuong, Q Xie
IEEE Transactions on Information Forensics and Security 9 (10), 1667-1680, 2014
1252014
A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing
K Liang, MH Au, JK Liu, W Susilo, DS Wong, G Yang, Y Yu, A Yang
Future Generation Computer Systems 52, 95-108, 2015
1242015
Separable linkable threshold ring signatures
PP Tsang, VK Wei, TK Chan, MH Au, JK Liu, DS Wong
International Conference on Cryptology in India, 384-398, 2004
1222004
ID-based ring signature scheme secure in the standard model
MH Au, JK Liu, TH Yuen, DS Wong
International Workshop on Security, 1-16, 2006
1182006
Fine-grained two-factor access control for web-based cloud computing services
JK Liu, MH Au, X Huang, R Lu, J Li
IEEE Transactions on Information Forensics and Security 11 (3), 484-497, 2015
1162015
Certificate based (linkable) ring signature
MH Au, JK Liu, W Susilo, TH Yuen
International Conference on Information Security Practice and Experience, 79-92, 2007
1092007
Short linkable ring signatures revisited
MH Au, SSM Chow, W Susilo, PP Tsang
European Public Key Infrastructure Workshop, 101-115, 2006
962006
Cloud data integrity checking with an identity-based auditing mechanism from RSA
Y Yu, L Xue, MH Au, W Susilo, J Ni, Y Zhang, AV Vasilakos, J Shen
Future Generation Computer Systems 62, 85-91, 2016
942016
Improvements on an authentication scheme for vehicular sensor networks
JK Liu, TH Yuen, MH Au, W Susilo
Expert Systems with Applications 41 (5), 2559-2564, 2014
932014
PEREA: Towards practical TTP-free revocation in anonymous authentication
PP Tsang, MH Au, A Kapadia, SW Smith
Proceedings of the 15th ACM conference on Computer and communications …, 2008
912008
Dynamic universal accumulators for DDH groups and their application to attribute-based anonymous credential systems
MH Au, PP Tsang, W Susilo, Y Mu
Cryptographers’ track at the RSA conference, 295-308, 2009
812009
Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage
Y Yu, MH Au, Y Mu, S Tang, J Ren, W Susilo, L Dong
International Journal of Information Security 14 (4), 307-318, 2015
742015
系统目前无法执行此操作,请稍后再试。
文章 1–20