Artículos con órdenes de acceso público - Tsz Hon YuenMás información
No disponibles en ningún lugar: 13
Identity-based encryption with post-challenge auxiliary inputs for secure cloud applications and sensor networks
TH Yuen, Y Zhang, SM Yiu, JK Liu
European Symposium on Research in Computer Security, 130-147, 2014
Órdenes: National Natural Science Foundation of China, A*Star, Singapore
Non-interactive multi-client searchable encryption: Realization and implementation
SF Sun, C Zuo, JK Liu, A Sakzad, R Steinfeld, TH Yuen, X Yuan, D Gu
IEEE Transactions on Dependable and Secure Computing 19 (1), 452-467, 2020
Órdenes: Australian Research Council, National Natural Science Foundation of China
Accountable mobile E-commerce scheme via identity-based plaintext-checkable encryption
J Han, Y Yang, X Huang, TH Yuen, J Li, J Cao
Information Sciences 345, 143-155, 2016
Órdenes: National Natural Science Foundation of China
Efficient privacy-preserving charging station reservation system for electric vehicles
JK Liu, W Susilo, TH Yuen, MH Au, J Fang, ZL Jiang, J Zhou
The Computer Journal 59 (7), 1040-1053, 2016
Órdenes: National Natural Science Foundation of China
Compact ring signature in the standard model for blockchain
H Ren, P Zhang, Q Shentu, JK Liu, TH Yuen
Information Security Practice and Experience: 14th International Conference …, 2018
Órdenes: National Natural Science Foundation of China
Towards anonymous ciphertext indistinguishability with identity leakage
TH Yuen, C Zhang, SSM Chow, JK Liu
Provable Security: 7th International Conference, ProvSec 2013, Melaka …, 2013
Órdenes: Research Grants Council, Hong Kong
Tight Leakage-Resilient Identity-based Encryption under Multi-challenge Setting
C Cai, X Qin, TH Yuen, SM Yiu
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
Órdenes: Research Grants Council, Hong Kong
Don’t Tamper with Dual System Encryption: Beyond Polynomial Related-Key Security of IBE
TH Yuen, C Zhang, SSM Chow
Applied Cryptography and Network Security: 20th International Conference …, 2022
Órdenes: Research Grants Council, Hong Kong
GCD-Filter: Private Set Intersection Without Encryption
M Wu, TH Yuen
Wireless Algorithms, Systems, and Applications: 17th International …, 2022
Órdenes: Research Grants Council, Hong Kong
Efficient completely non-malleable and RKA secure public key encryptions
SF Sun, U Parampalli, TH Yuen, Y Yu, D Gu
Information Security and Privacy: 21st Australasian Conference, ACISP 2016 …, 2016
Órdenes: National Natural Science Foundation of China
Practical fully leakage resilient signatures with auxiliary inputs
C Cai, S Pan, TH Yuen, SM Yiu
Future Generation Computer Systems 141, 448-461, 2023
Órdenes: Research Grants Council, Hong Kong
Hash Proof System with Auxiliary Inputs and Its Application
C Cai, TH Yuen, SM Yiu
2022 IEEE International Conference on Trust, Security and Privacy in …, 2022
Órdenes: Research Grants Council, Hong Kong
Efficient Construction of Completely Non-Malleable CCA Secure Public Key Encryption
SF Sun, D Gu, JK Liu, U Parampalli, TH Yuen
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
Órdenes: National Natural Science Foundation of China
Disponibles en algún lugar: 21
Ringct 2.0: A compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency monero
SF Sun, MH Au, JK Liu, TH Yuen
Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017
Órdenes: National Natural Science Foundation of China
An efficient non-interactive multi-client searchable encryption with support for boolean queries
SF Sun, JK Liu, A Sakzad, R Steinfeld, TH Yuen
Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016
Órdenes: Australian Research Council, National Natural Science Foundation of China
Improvements on an authentication scheme for vehicular sensor networks
JK Liu, TH Yuen, MH Au, W Susilo
Expert Systems with Applications 41 (5), 2559-2564, 2014
Órdenes: Australian Research Council
Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction
MH Au, JK Liu, W Susilo, TH Yuen
Theoretical Computer Science 469, 1-14, 2013
Órdenes: Australian Research Council
Time-based direct revocable ciphertext-policy attribute-based encryption with short revocation list
JK Liu, TH Yuen, P Zhang, K Liang
Applied Cryptography and Network Security: 16th International Conference …, 2018
Órdenes: Australian Research Council, National Natural Science Foundation of China
A general framework for secure sharing of personal health records in cloud system
MH Au, TH Yuen, JK Liu, W Susilo, X Huang, Y Xiang, ZL Jiang
Journal of computer and system sciences 90, 46-62, 2017
Órdenes: National Natural Science Foundation of China
Efficient Linkable and/or Threshold Ring Signature Without Random Oracles
TH Yuen, JK Liu, MH Au, W Susilo, J Zhou
The Computer Journal 56 (4), 407-421, 2013
Órdenes: Australian Research Council
La información de publicación y financiación se determina de forma automática mediante un programa informático