Obserwuj
Jack P. K. Ma
Jack P. K. Ma
Zweryfikowany adres z ie.cuhk.edu.hk
Tytuł
Cytowane przez
Cytowane przez
Rok
Privacy-preserving decision trees evaluation via linear functions
RKH Tai, JPK Ma, Y Zhao, SSM Chow
Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017
1272017
Let’s stride blindfolded in a forest: Sublinear multi-client decision trees evaluation
JPK Ma, RKH Tai, Y Zhao, SSM Chow
252021
Real Threshold ECDSA.
HWH Wong, JPK Ma, HHF Yin, SSM Chow
NDSS, 2023
182023
Secure-computation-friendly private set intersection from oblivious compact graph evaluation
JPK Ma, SSM Chow
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
112022
On multi-channel Huffman codes for asymmetric-alphabet channels
HHF Yin, X Wang, KH Ng, RWF Lai, LKL Ng, JPK Ma
2021 IEEE International Symposium on Information Theory (ISIT), 2024-2029, 2021
62021
Learning Model with Error-Exposing the Hidden Model of BAYHENN.
HWH Wong, JPK Ma, DPH Wong, LKL Ng, SSM Chow
IJCAI, 3529-3535, 2020
62020
Secure multiparty computation of threshold signatures made more efficient
HWH Wong, JPK Ma, SSM Chow
ISOC Network and Distributed System Security Symposium–NDSS 2024, 2024
52024
SMART credentials in the multi-queue of slackness (or Secure management of anonymous reputation traits without global halting)
JPK Ma, SSM Chow
2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P), 896-912, 2023
52023
How (Not) to build threshold EdDSA
HWH Wong, JPK Ma, HHF Yin, SSM Chow
Proceedings of the 26th International Symposium on Research in Attacks …, 2023
42023
Scored anonymous credentials
SSM Chow, JPK Ma, TH Yuen
International Conference on Applied Cryptography and Network Security, 484-515, 2023
42023
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–10