Privacy-Preserving Public Auditing for Secure Cloud Storage C Wang, SSM Chow, Q Wang, K Ren, W Lou IEEE Transactions on Computers 62 (2), 362-375, 2013 | 3858* | 2013 |
Improving Privacy and Security in Multi-Authority Attribute-Based Encryption M Chase, SSM Chow 16th ACM Conference on Computer and Communications Security (CCS), 121-130, 2009 | 986 | 2009 |
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage CK Chu, SSM Chow, WG Tzeng, J Zhou, RH Deng IEEE Transactions on Parallel and Distributed Systems (TPDS) 25 (2), 468-477, 2014 | 400 | 2014 |
Efficient Unidirectional Proxy Re-Encryption SSM Chow, J Weng, Y Yang, R Deng Progress in Cryptology–AFRICACRYPT 2010, 316-332, 2010 | 374 | 2010 |
Efficient Forward and Provably Secure ID-based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity SSM Chow, SM Yiu, LCK Hui, KP Chow Information Security and Cryptology-ICISC 2003, 352-369, 2004 | 268 | 2004 |
Constant-Size Dynamic k-Times Anonymous Authentication MH Au, W Susilo, Y Mu, SSM Chow IEEE Systems Journal 7 (2), 249-261, 2013 | 254* | 2013 |
Storing Shared Data on the Cloud via Security-Mediator B Wang, SSM Chow, M Li, H Li International Conference on Distributed Computing Systems (ICDCS), 124-133, 2013 | 229 | 2013 |
Optimal Sybil-Resilient Node Admission Control N Tran, J Li, L Subramanian, SSM Chow INFOCOM, 2011 Proceedings IEEE, 3218-3226, 2011 | 207 | 2011 |
SPICE–Simple Privacy-Preserving Identity-Management for Cloud Environment SSM Chow, YJ He, L Hui, SM Yiu Applied Cryptography and Network Security (ACNS), 526-543, 2012 | 205 | 2012 |
Efficient Identity Based Ring Signature SSM Chow, SM Yiu, L Hui Applied Cryptography and Network Security (ACNS), 277-291, 2005 | 203 | 2005 |
Practical Leakage-Resilient Identity-Based Encryption from Simple Assumptions SSM Chow, Y Dodis, Y Rouselakis, B Waters 17th ACM Conference on Computer and Communications Security (CCS), 152-161, 2010 | 189 | 2010 |
Multi-Authority Ciphertext-Policy Attribute-Based Encryption with Accountability J Li, Q Huang, X Chen, SSM Chow, DS Wong, D Xie 6th ACM Symposium on Information, Computer and Communications Security, 386-390, 2011 | 170 | 2011 |
Two Improved Partially Blind Signature Schemes from Bilinear Pairings SSM Chow, LCK Hui, SM Yiu, KP Chow Australasian Conference on Information Security and Privacy, 355-411, 2005 | 161 | 2005 |
Conditional Proxy Broadcast Re-Encryption CK Chu, J Weng, SSM Chow, J Zhou, R Deng Australasian Conference on Information Security and Privacy, 327-342, 2009 | 148 | 2009 |
Dynamic Secure Cloud Storage with Provenance SSM Chow, CK Chu, X Huang, J Zhou, RH Deng Festschrift Jean-Jacques Quisquater, 442-464, 2011 | 147 | 2011 |
Removing Escrow from Identity-Based Encryption SSM Chow Public Key Cryptography–PKC 2009, 256-276, 2009 | 125 | 2009 |
Identity-Based Encryption Resilient to Continual Auxiliary Leakage T Yuen, SSM Chow, Y Zhang, S Yiu Advances in Cryptology–EUROCRYPT 2012, 117-134, 2012 | 112 | 2012 |
Security-Mediated Certificateless Cryptography SSM Chow, C Boyd, J Nieto Public Key Cryptography-PKC 2006, 508-524, 2006 | 105 | 2006 |
Ring Signatures Without Random Oracles SSM Chow, VK Wei, JK Liu, TH Yuen 1st ACM Symposium on Information, Computer and Communications Security, 297-302, 2006 | 103 | 2006 |
Cloud-assisted Mobile-access of Health Data with Privacy and Auditability Y Tong, J Sun, SSM Chow, P Li IEEE Journal of Biomedical and Health Informatics 18 (2), 419-429, 2014 | 99 | 2014 |