Sherman S. M. Chow
Sherman S. M. Chow
Department of Information Engineering, The Chinese University of Hong Kong
Correu electrònic verificat a ie.cuhk.edu.hk
Títol
Citada per
Citada per
Any
Privacy-Preserving Public Auditing for Secure Cloud Storage
C Wang, SSM Chow, Q Wang, K Ren, W Lou
IEEE Transactions on Computers 62 (2), 362-375, 2013
3596*2013
Improving Privacy and Security in Multi-Authority Attribute-Based Encryption
M Chase, SSM Chow
Proceedings of the 16th ACM conference on Computer and communications …, 2009
9172009
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
CK Chu, SSM Chow, WG Tzeng, J Zhou, RH Deng
IEEE Transactions on Parallel and Distributed Systems, 2014
3712014
Efficient Unidirectional Proxy Re-Encryption
SSM Chow, J Weng, Y Yang, R Deng
Progress in Cryptology–AFRICACRYPT 2010, 316-332, 2010
3512010
Efficient Forward and Provably Secure ID-based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity
SSM Chow, SM Yiu, LCK Hui, KP Chow
Information Security and Cryptology-ICISC 2003, 352-369, 2004
2602004
Constant-Size Dynamic k-Times Anonymous Authentication
MH Au, W Susilo, Y Mu, SSM Chow
IEEE Systems Journal 7 (2), 249-261, 2013
230*2013
Storing Shared Data on the Cloud via Security-Mediator
B Wang, SSM Chow, M Li, H Li
International Conference on Distributed Computing Systems (ICDCS), 2013
2062013
Optimal Sybil-resilient node admission control
N Tran, J Li, L Subramanian, SSM Chow
INFOCOM, 2011 Proceedings IEEE, 3218-3226, 2011
2022011
Efficient Identity Based Ring Signature
SSM Chow, SM Yiu, L Hui
Applied Cryptography and Network Security, 277-291, 2005
1952005
SPICE–Simple Privacy-Preserving Identity-Management for Cloud Environment
SSM Chow, YJ He, L Hui, SM Yiu
Applied Cryptography and Network Security, 526-543, 2012
1892012
Practical Leakage-Resilient Identity-Based Encryption from Simple Assumptions
SSM Chow, Y Dodis, Y Rouselakis, B Waters
Proceedings of the 17th ACM conference on Computer and communications …, 2010
1772010
Two Improved Partially Blind Signature Schemes from Bilinear Pairings
SSM Chow, LCK Hui, SM Yiu, KP Chow
Australasian Conference on Information Security and Privacy, 355-411, 2005
1582005
Multi-Authority Ciphertext-Policy Attribute-Based Encryption with Accountability
J Li, Q Huang, X Chen, SSM Chow, DS Wong, D Xie
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
1562011
Dynamic Secure Cloud Storage with Provenance
SSM Chow, CK Chu, X Huang, J Zhou, RH Deng
Festschrift Jean-Jacques Quisquater, 442-464, 2011
1342011
Conditional Proxy Broadcast Re-Encryption
CK Chu, J Weng, SSM Chow, J Zhou, R Deng
Australasian Conference on Information Security and Privacy, 327-342, 2009
1342009
Removing Escrow from Identity-Based Encryption
SSM Chow
Public Key Cryptography–PKC 2009, 256-276, 2009
1252009
Identity-Based Encryption Resilient to Continual Auxiliary Leakage
T Yuen, SSM Chow, Y Zhang, S Yiu
Advances in Cryptology–EUROCRYPT 2012, 117-134, 2012
1002012
Security-Mediated Certificateless Cryptography
SSM Chow, C Boyd, J Nieto
Public Key Cryptography-PKC 2006, 508-524, 2006
982006
Identity Based Threshold Ring Signature
SSM Chow, LCK Hui, SM Yiu
Information Security and Cryptology–ICISC 2004, 697-699, 2005
98*2005
Ring Signatures Without Random Oracles
SSM Chow, VK Wei, JK Liu, TH Yuen
Proceedings of the 2006 ACM Symposium on Information, computer and …, 2006
972006
En aquests moments el sistema no pot dur a terme l'operació. Torneu-ho a provar més tard.
Articles 1–20