Obserwuj
Sherman S. M. Chow
Sherman S. M. Chow
Information Engineering, The Chinese University of Hong Kong
Zweryfikowany adres z ie.cuhk.edu.hk
Tytuł
Cytowane przez
Cytowane przez
Rok
Privacy-Preserving Public Auditing for Secure Cloud Storage
C Wang, SSM Chow, Q Wang, K Ren, W Lou
IEEE Transactions on Computers 62 (2), 362-375, 2013
4313*2013
Improving Privacy and Security in Multi-Authority Attribute-Based Encryption
M Chase, SSM Chow
16th ACM Conference on Computer and Communications Security (CCS), 121-130, 2009
10932009
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
CK Chu, SSM Chow, WG Tzeng, J Zhou, RH Deng
IEEE Transactions on Parallel and Distributed Systems (TPDS) 25 (2), 468-477, 2014
4312014
Efficient Unidirectional Proxy Re-Encryption
SSM Chow, J Weng, Y Yang, R Deng
Progress in Cryptology–AFRICACRYPT, 316-332, 2010
4132010
Constant-Size Dynamic k-Times Anonymous Authentication
MH Au, W Susilo, Y Mu, SSM Chow
IEEE Systems Journal 7 (2), 249-261, 2013
310*2013
Efficient Forward and Provably Secure ID-based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity
SSM Chow, SM Yiu, LCK Hui, KP Chow
Information Security and Cryptology-ICISC 2003, 352-369, 2004
2852004
Storing Shared Data on the Cloud via Security-Mediator
B Wang, SSM Chow, M Li, H Li
33rd IEEE International Conference on Distributed Computing Systems (ICDCS …, 2013
2502013
Efficient Identity Based Ring Signature
SSM Chow, SM Yiu, LCK Hui
Applied Cryptography and Network Security (ACNS), 277-291, 2005
2352005
SPICE–Simple Privacy-Preserving Identity-Management for Cloud Environment
SSM Chow, YJ He, LCK Hui, SM Yiu
Applied Cryptography and Network Security (ACNS), 526-543, 2012
2262012
Optimal Sybil-Resilient Node Admission Control
N Tran, J Li, L Subramanian, SSM Chow
30th IEEE Conference on Computer Communications (INFOCOM), 3218-3226, 2011
2192011
Multi-Authority Ciphertext-Policy Attribute-Based Encryption with Accountability
J Li, Q Huang, X Chen, SSM Chow, DS Wong, D Xie
6th ACM Symposium on Information, Computer and Communications Security, 386-390, 2011
2052011
Practical Leakage-Resilient Identity-Based Encryption from Simple Assumptions
SSM Chow, Y Dodis, Y Rouselakis, B Waters
17th ACM Conference on Computer and Communications Security (CCS), 152-161, 2010
1982010
Two Improved Partially Blind Signature Schemes from Bilinear Pairings
SSM Chow, LCK Hui, SM Yiu, KP Chow
Australasian Conference on Information Security and Privacy, 355-411, 2005
1762005
Dynamic Secure Cloud Storage with Provenance
SSM Chow, CK Chu, X Huang, J Zhou, RH Deng
Festschrift Jean-Jacques Quisquater, 442-464, 2011
1592011
Conditional Proxy Broadcast Re-Encryption
CK Chu, J Weng, SSM Chow, J Zhou, R Deng
Australasian Conference on Information Security and Privacy, 327-342, 2009
1572009
Removing Escrow from Identity-Based Encryption
SSM Chow
Public Key Cryptography–PKC, 256-276, 2009
1452009
Searchable Encryption over Feature-Rich Data
Q Wang, M He, M Du, SSM Chow, RWF Lai, Q Zou
IEEE Transactions on Dependable and Secure Computing 15 (3), 496-510, 2018
1362018
Identity-Based Encryption Resilient to Continual Auxiliary Leakage
TH Yuen, SSM Chow, Y Zhang, SM Yiu
Advances in Cryptology–EUROCRYPT, 117-134, 2012
1242012
Cloud-assisted Mobile-access of Health Data with Privacy and Auditability
Y Tong, J Sun, SSM Chow, P Li
IEEE Journal of Biomedical and Health Informatics 18 (2), 419-429, 2014
1222014
Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage
Y Wang, Q Wu, DS Wong, B Qin, SSM Chow, Z Liu, X Tan
European Symposium on Research in Computer Security (ESORICS), 326-343, 2014
1212014
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20