Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Duncan S. Wong
@article{DBLP:journals/ett/HuangHWZYWH24, author = {Jiahui Huang and Teng Huang and Huanchun Wei and Jiehua Zhang and Hongyang Yan and Duncan S. Wong and Haibo Hu}, title = {zkChain: {A} privacy-preserving model based on zk-SNARKs and hash chain for efficient transfer of assets}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {35}, number = {4}, year = {2024}, url = {https://doi.org/10.1002/ett.4709}, doi = {10.1002/ETT.4709}, timestamp = {Tue, 16 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ett/HuangHWZYWH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aisp/ChengZPWHZWD23, author = {Xingjiang Cheng and Fuxing Zhang and Yun Peng and Xianmin Wang and Teng Huang and Ziye Zhou and Duncan S. Wong and Changyu Dong}, editor = {Jaideep Vaidya and Moncef Gabbouj and Jin Li}, title = {A Survey of Privacy Preserving Subgraph Matching Methods}, booktitle = {Artificial Intelligence Security and Privacy - First International Conference on Artificial Intelligence Security and Privacy, AIS{\&}P 2023, Guangzhou, China, December 3-5, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14509}, pages = {98--113}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-9785-5\_8}, doi = {10.1007/978-981-99-9785-5\_8}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aisp/ChengZPWHZWD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aisp/YangYFDPWW23, author = {Ruilin Yang and Hui Yang and Jiluan Fan and Changyu Dong and Yan Pang and Duncan S. Wong and Shaowei Wang}, editor = {Jaideep Vaidya and Moncef Gabbouj and Jin Li}, title = {Personalized Differential Privacy in the Shuffle Model}, booktitle = {Artificial Intelligence Security and Privacy - First International Conference on Artificial Intelligence Security and Privacy, AIS{\&}P 2023, Guangzhou, China, December 3-5, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14509}, pages = {468--482}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-9785-5\_33}, doi = {10.1007/978-981-99-9785-5\_33}, timestamp = {Sun, 03 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aisp/YangYFDPWW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijis/YangZZCWL22, author = {Jie Yang and Jun Zheng and Zheng Zhang and Q. I. Chen and Duncan S. Wong and Yuanzhang Li}, title = {Security of federated learning for cloud-edge intelligence collaborative computing}, journal = {Int. J. Intell. Syst.}, volume = {37}, number = {11}, pages = {9290--9308}, year = {2022}, url = {https://doi.org/10.1002/int.22992}, doi = {10.1002/INT.22992}, timestamp = {Wed, 06 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijis/YangZZCWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijis/KoeCTAYZW22, author = {Arthur Sandor Voundi Koe and Qi Chen and Juan Tang and Shan Ai and Hongyang Yan and Shiwen Zhang and Duncan S. Wong}, title = {Outsourcing multiauthority access control revocation and computations over medical data to mobile cloud}, journal = {Int. J. Intell. Syst.}, volume = {37}, number = {11}, pages = {9774--9797}, year = {2022}, url = {https://doi.org/10.1002/int.23009}, doi = {10.1002/INT.23009}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijis/KoeCTAYZW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiuYWNWKL22, author = {Zhen Liu and Guomin Yang and Duncan S. Wong and Khoa Nguyen and Huaxiong Wang and Xiaorong Ke and Yining Liu}, title = {Secure Deterministic Wallet and Stealth Address: Key-Insulated and Privacy-Preserving Signature Scheme With Publicly Derived Public Key}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {5}, pages = {2934--2951}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2021.3078463}, doi = {10.1109/TDSC.2021.3078463}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/LiuYWNWKL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LiuHW21, author = {Zhen Liu and Qiong Huang and Duncan S. Wong}, title = {On Enabling Attribute-Based Encryption to Be Traceable Against Traitors}, journal = {Comput. J.}, volume = {64}, number = {4}, pages = {575--598}, year = {2021}, url = {https://doi.org/10.1093/comjnl/bxaa082}, doi = {10.1093/COMJNL/BXAA082}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/LiuHW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/YangXWZW21, author = {Anjia Yang and Jia Xu and Jian Weng and Jianying Zhou and Duncan S. Wong}, title = {Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {9}, number = {1}, pages = {212--225}, year = {2021}, url = {https://doi.org/10.1109/TCC.2018.2851256}, doi = {10.1109/TCC.2018.2851256}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/YangXWZW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/PhanABCDGGHKLLM20, author = {Raphael C.{-}W. Phan and Masayuki Abe and Lynn Batten and Jung Hee Cheon and Ed Dawson and Steven D. Galbraith and Jian Guo and Lucas C. K. Hui and Kwangjo Kim and Xuejia Lai and Dong Hoon Lee and Mitsuru Matsui and Tsutomu Matsumoto and Shiho Moriai and Phong Q. Nguyen and Dingyi Pei and Duong Hieu Phan and Josef Pieprzyk and Huaxiong Wang and Hank Wolfe and Duncan S. Wong and Tzong{-}Chen Wu and Bo{-}Yin Yang and Siu{-}Ming Yiu and Yu Yu and Jianying Zhou}, title = {Advances in security research in the Asiacrypt region}, journal = {Commun. {ACM}}, volume = {63}, number = {4}, pages = {76--81}, year = {2020}, url = {https://doi.org/10.1145/3378428}, doi = {10.1145/3378428}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/PhanABCDGGHKLLM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/XuGSZLWW20, author = {Guangquan Xu and Bingjiang Guo and Chunhua Su and Xi Zheng and Kaitai Liang and Duncan S. Wong and Hao Wang}, title = {Am {I} eclipsed? {A} smart detector of eclipse attacks for Ethereum}, journal = {Comput. Secur.}, volume = {88}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2019.101604}, doi = {10.1016/J.COSE.2019.101604}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/XuGSZLWW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tetc/ZhuangYHWY20, author = {Yunhui Zhuang and Anjia Yang and Gerhard P. Hancke and Duncan S. Wong and Guomin Yang}, title = {Energy-Efficient Distance-Bounding with Residual Charge Computation}, journal = {{IEEE} Trans. Emerg. Top. Comput.}, volume = {8}, number = {2}, pages = {365--376}, year = {2020}, url = {https://doi.org/10.1109/TETC.2017.2761702}, doi = {10.1109/TETC.2017.2761702}, timestamp = {Wed, 15 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tetc/ZhuangYHWY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/JLCMR2020/LinMLW20, author = {Zhi Lin and Weizhi Meng and Wenjuan Li and Duncan S. Wong}, editor = {Richard Jiang and Chang{-}Tsun Li and Danny Crookes and Weizhi Meng and Christophe Rosenberger}, title = {Developing Cloud-Based Intelligent Touch Behavioral Authentication on Mobile Phones}, booktitle = {Deep Biometrics}, series = {Unsupervised and Semi-Supervised Learning}, pages = {141--159}, publisher = {Springer International Publishing}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-32583-1\_7}, doi = {10.1007/978-3-030-32583-1\_7}, timestamp = {Sat, 09 Apr 2022 12:20:04 +0200}, biburl = {https://dblp.org/rec/books/sp/JLCMR2020/LinMLW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LiuNYWW19, author = {Zhen Liu and Khoa Nguyen and Guomin Yang and Huaxiong Wang and Duncan S. Wong}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {A Lattice-Based Linkable Ring Signature Supporting Stealth Addresses}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {726--746}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_35}, doi = {10.1007/978-3-030-29959-0\_35}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/LiuNYWW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/LiuYWNW19, author = {Zhen Liu and Guomin Yang and Duncan S. Wong and Khoa Nguyen and Huaxiong Wang}, title = {Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2019, Stockholm, Sweden, June 17-19, 2019}, pages = {215--230}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EuroSP.2019.00025}, doi = {10.1109/EUROSP.2019.00025}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/LiuYWNW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/YangZWHWY18, author = {Anjia Yang and Yunhui Zhuang and Jian Weng and Gerhard P. Hancke and Duncan S. Wong and Guomin Yang}, title = {Exploring relationship between indistinguishability-based and unpredictability-based {RFID} privacy models}, journal = {Future Gener. Comput. Syst.}, volume = {82}, pages = {315--326}, year = {2018}, url = {https://doi.org/10.1016/j.future.2017.12.044}, doi = {10.1016/J.FUTURE.2017.12.044}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/YangZWHWY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LiCCHWL18, author = {Jin Li and Xiaofeng Chen and Sherman S. M. Chow and Qiong Huang and Duncan S. Wong and Zheli Liu}, title = {Multi-authority fine-grained access control with accountability and its application in cloud}, journal = {J. Netw. Comput. Appl.}, volume = {112}, pages = {89--96}, year = {2018}, url = {https://doi.org/10.1016/j.jnca.2018.03.006}, doi = {10.1016/J.JNCA.2018.03.006}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/LiCCHWL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/MengWWWX18, author = {Weizhi Meng and Yu Wang and Duncan S. Wong and Sheng Wen and Yang Xiang}, title = {\emph{TouchWB}: Touch behavioral user authentication based on web browsing on smartphones}, journal = {J. Netw. Comput. Appl.}, volume = {117}, pages = {1--9}, year = {2018}, url = {https://doi.org/10.1016/j.jnca.2018.05.010}, doi = {10.1016/J.JNCA.2018.05.010}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/MengWWWX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/HuTWZ18, author = {Xing Hu and Chunming Tang and Duncan S. Wong and Xianghan Zheng}, title = {Efficient pairing-free {PRE} schemes for multimedia data sharing in IoT}, journal = {Multim. Tools Appl.}, volume = {77}, number = {14}, pages = {18327--18354}, year = {2018}, url = {https://doi.org/10.1007/s11042-017-5387-1}, doi = {10.1007/S11042-017-5387-1}, timestamp = {Fri, 22 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mta/HuTWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/MengLW18a, author = {Weizhi Meng and Wenjuan Li and Duncan S. Wong}, title = {Enhancing touch behavioral authentication via cost-based intelligent mechanism on smartphones}, journal = {Multim. Tools Appl.}, volume = {77}, number = {23}, pages = {30167--30185}, year = {2018}, url = {https://doi.org/10.1007/s11042-018-6094-2}, doi = {10.1007/S11042-018-6094-2}, timestamp = {Thu, 18 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mta/MengLW18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/YangPM0W18, author = {Anjia Yang and Elena Pagnin and Aikaterini Mitrokotsa and Gerhard P. Hancke and Duncan S. Wong}, title = {Two-Hop Distance-Bounding Protocols: Keep Your Friends Close}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {17}, number = {7}, pages = {1723--1736}, year = {2018}, url = {https://doi.org/10.1109/TMC.2017.2771769}, doi = {10.1109/TMC.2017.2771769}, timestamp = {Tue, 10 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/YangPM0W18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuYWNW18, author = {Zhen Liu and Guomin Yang and Duncan S. Wong and Khoa Nguyen and Huaxiong Wang}, title = {Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {956}, year = {2018}, url = {https://eprint.iacr.org/2018/956}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LiuYWNW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuW18, author = {Zhen Liu and Duncan S. Wong}, title = {On Enabling Attribute-Based Encryption to Be Traceable against Traitors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {963}, year = {2018}, url = {https://eprint.iacr.org/2018/963}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ZhangCLWLY17, author = {Yinghui Zhang and Xiaofeng Chen and Jin Li and Duncan S. Wong and Hui Li and Ilsun You}, title = {Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing}, journal = {Inf. Sci.}, volume = {379}, pages = {42--61}, year = {2017}, url = {https://doi.org/10.1016/j.ins.2016.04.015}, doi = {10.1016/J.INS.2016.04.015}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/ZhangCLWLY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/LiYLCHW17, author = {Jin Li and Hongyang Yan and Zheli Liu and Xiaofeng Chen and Xinyi Huang and Duncan S. Wong}, title = {Location-Sharing Systems With Enhanced Privacy in Mobile Online Social Networks}, journal = {{IEEE} Syst. J.}, volume = {11}, number = {2}, pages = {439--448}, year = {2017}, url = {https://doi.org/10.1109/JSYST.2015.2415835}, doi = {10.1109/JSYST.2015.2415835}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/LiYLCHW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GuoMSHWV17, author = {Fuchun Guo and Yi Mu and Willy Susilo and Homer Hsing and Duncan S. Wong and Vijay Varadharajan}, title = {Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight Devices}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {2}, pages = {211--220}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2445760}, doi = {10.1109/TDSC.2015.2445760}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/GuoMSHWV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XieWWTCF17, author = {Qi Xie and Duncan S. Wong and Guilin Wang and Xiao Tan and Kefei Chen and Liming Fang}, title = {Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {6}, pages = {1382--1392}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2659640}, doi = {10.1109/TIFS.2017.2659640}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XieWWTCF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/BaekHBWJY17, author = {Joonsang Baek and Eman Hableel and Young{-}Ji Byon and Duncan S. Wong and Kitae Jang and Hwasoo Yeo}, title = {How to Protect {ADS-B:} Confidentiality Framework and Efficient Realization Based on Staged Identity-Based Encryption}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {18}, number = {3}, pages = {690--700}, year = {2017}, url = {https://doi.org/10.1109/TITS.2016.2586301}, doi = {10.1109/TITS.2016.2586301}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tits/BaekHBWJY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/YangTBW17, author = {Anjia Yang and Xiao Tan and Joonsang Baek and Duncan S. Wong}, title = {A New {ADS-B} Authentication Framework Based on Efficient Hierarchical Identity-Based Signature with Batch Verification}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {10}, number = {2}, pages = {165--175}, year = {2017}, url = {https://doi.org/10.1109/TSC.2015.2459709}, doi = {10.1109/TSC.2015.2459709}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/YangTBW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/SchlegelCHW17, author = {Roman Schlegel and Chi{-}Yin Chow and Qiong Huang and Duncan S. Wong}, title = {Privacy-Preserving Location Sharing Services for Social Networks}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {10}, number = {5}, pages = {811--825}, year = {2017}, url = {https://doi.org/10.1109/TSC.2016.2514338}, doi = {10.1109/TSC.2016.2514338}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsc/SchlegelCHW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/XieHTW17, author = {Qi Xie and Bin Hu and Xiao Tan and Duncan S. Wong}, title = {Chaotic Maps-Based Strong Anonymous Authentication Scheme for Roaming Services in Global Mobility Networks}, journal = {Wirel. Pers. Commun.}, volume = {96}, number = {4}, pages = {5881--5896}, year = {2017}, url = {https://doi.org/10.1007/s11277-017-4452-4}, doi = {10.1007/S11277-017-4452-4}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/XieHTW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/closer/LiLLW17, author = {Xiaoyi Li and Kaitai Liang and Zhen Liu and Duncan S. Wong}, editor = {Donald Ferguson and V{\'{\i}}ctor M{\'{e}}ndez Mu{\~{n}}oz and Jorge Cardoso and Markus Helfert and Claus Pahl}, title = {Attribute based Encryption: Traitor Tracing, Revocation and Fully Security on Prime Order Groups}, booktitle = {{CLOSER} 2017 - Proceedings of the 7th International Conference on Cloud Computing and Services Science, Porto, Portugal, April 24-26, 2017}, pages = {281--292}, publisher = {SciTePress}, year = {2017}, timestamp = {Thu, 03 Feb 2022 09:27:48 +0100}, biburl = {https://dblp.org/rec/conf/closer/LiLLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/BaekWLA16, author = {Joonsang Baek and Duncan S. Wong and Jin Li and Man Ho Au}, title = {Efficient Generic Construction of CCA-Secure Identity-Based Encryption from Randomness Extraction}, journal = {Comput. J.}, volume = {59}, number = {4}, pages = {508--521}, year = {2016}, url = {https://doi.org/10.1093/comjnl/bxv070}, doi = {10.1093/COMJNL/BXV070}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/BaekWLA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LiuYYCWS16, author = {Joseph K. Liu and Sze Ling Yeo and Wun{-}She Yap and Sherman S. M. Chow and Duncan S. Wong and Willy Susilo}, title = {Faulty Instantiations of Threshold Ring Signature from Threshold Proof-of-Knowledge Protocol}, journal = {Comput. J.}, volume = {59}, number = {7}, pages = {945--954}, year = {2016}, url = {https://doi.org/10.1093/comjnl/bxv098}, doi = {10.1093/COMJNL/BXV098}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/LiuYYCWS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LiuW16, author = {Zhen Liu and Duncan S. Wong}, title = {Practical Attribute-Based Encryption: Traitor Tracing, Revocation and Large Universe}, journal = {Comput. J.}, volume = {59}, number = {7}, pages = {983--1004}, year = {2016}, url = {https://doi.org/10.1093/comjnl/bxv101}, doi = {10.1093/COMJNL/BXV101}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/LiuW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/WangLLW16, author = {Hao Wang and Zhen Liu and Zhe Liu and Duncan S. Wong}, title = {Identity-based aggregate signcryption in the standard model from multilinear maps}, journal = {Frontiers Comput. Sci.}, volume = {10}, number = {4}, pages = {741--754}, year = {2016}, url = {https://doi.org/10.1007/s11704-015-5138-2}, doi = {10.1007/S11704-015-5138-2}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fcsc/WangLLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/WangWWQMD16, author = {Yujue Wang and Qianhong Wu and Duncan S. Wong and Bo Qin and Jian Mao and Yong Ding}, title = {Provably secure robust optimistic fair exchange of distributed signatures}, journal = {Future Gener. Comput. Syst.}, volume = {62}, pages = {29--39}, year = {2016}, url = {https://doi.org/10.1016/j.future.2016.03.012}, doi = {10.1016/J.FUTURE.2016.03.012}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/WangWWQMD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/XieDWH16, author = {Qi Xie and Na Dong and Duncan S. Wong and Bin Hu}, title = {Cryptanalysis and security enhancement of a robust two-factor authentication and key agreement protocol}, journal = {Int. J. Commun. Syst.}, volume = {29}, number = {3}, pages = {478--487}, year = {2016}, url = {https://doi.org/10.1002/dac.2858}, doi = {10.1002/DAC.2858}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/XieDWH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/GrittiSPLW16, author = {Cl{\'{e}}mentine Gritti and Willy Susilo and Thomas Plantard and Kaitai Liang and Duncan S. Wong}, title = {Broadcast encryption with dealership}, journal = {Int. J. Inf. Sec.}, volume = {15}, number = {3}, pages = {271--283}, year = {2016}, url = {https://doi.org/10.1007/s10207-015-0285-x}, doi = {10.1007/S10207-015-0285-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/GrittiSPLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiuW16, author = {Dennis Y. W. Liu and Duncan S. Wong}, title = {One-move convertible nominative signature in the standard model}, journal = {Secur. Commun. Networks}, volume = {9}, number = {12}, pages = {1796--1809}, year = {2016}, url = {https://doi.org/10.1002/sec.812}, doi = {10.1002/SEC.812}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiuW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/MengLWZ16, author = {Weizhi Meng and Wenjuan Li and Duncan S. Wong and Jianying Zhou}, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {TMGuard: {A} Touch Movement-Based Security Mechanism for Screen Unlock Patterns on Smartphones}, booktitle = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, pages = {629--647}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5\_34}, doi = {10.1007/978-3-319-39555-5\_34}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/MengLWZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiuWP16, author = {Zhen Liu and Duncan S. Wong and Jack Poon}, editor = {Xiaofeng Chen and XiaoFeng Wang and Xinyi Huang}, title = {Dealerless Corporate Key Generation for Identity-Based Encryption Schemes}, booktitle = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016}, pages = {211--222}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2897845.2897849}, doi = {10.1145/2897845.2897849}, timestamp = {Mon, 25 Apr 2022 08:42:03 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LiuWP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/XuYZW16, author = {Jia Xu and Anjia Yang and Jianying Zhou and Duncan S. Wong}, editor = {Ioannis G. Askoxylakis and Sotiris Ioannidis and Sokratis K. Katsikas and Catherine Meadows}, title = {Lightweight Delegatable Proofs of Storage}, booktitle = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9878}, pages = {324--343}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45744-4\_16}, doi = {10.1007/978-3-319-45744-4\_16}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/XuYZW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispdc/HuTW16, author = {Xing Hu and Chunming Tang and Duncan S. Wong}, editor = {Riqing Chen and Chunming Rong and Dan Grigoras}, title = {Highly Efficient Proxy Re-encryption Schemes for User-End Encrypted Cloud Data Sharing}, booktitle = {15th International Symposium on Parallel and Distributed Computing, {ISPDC} 2016, Fuzhou, China, July 8-10, 2016}, pages = {261--268}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ISPDC.2016.45}, doi = {10.1109/ISPDC.2016.45}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispdc/HuTW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiLLW16, author = {Xiaoyi Li and Kaitai Liang and Zhen Liu and Duncan S. Wong}, title = {Attribute Based Encryption: Traitor Tracing, Revocation and Fully Security on Prime Order Groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1140}, year = {2016}, url = {http://eprint.iacr.org/2016/1140}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiLLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/WangWWQML15, author = {Yujue Wang and Qianhong Wu and Duncan S. Wong and Bo Qin and Yi Mu and Jianwei Liu}, title = {Further ideal multipartite access structures from integer polymatroids}, journal = {Sci. China Inf. Sci.}, volume = {58}, number = {7}, pages = {1--13}, year = {2015}, url = {https://doi.org/10.1007/s11432-015-5286-x}, doi = {10.1007/S11432-015-5286-X}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/WangWWQML15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LiangSLW15, author = {Kaitai Liang and Willy Susilo and Joseph K. Liu and Duncan S. Wong}, title = {Efficient and Fully {CCA} Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption}, journal = {Comput. J.}, volume = {58}, number = {10}, pages = {2778--2792}, year = {2015}, url = {https://doi.org/10.1093/comjnl/bxv050}, doi = {10.1093/COMJNL/BXV050}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/LiangSLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/MengWFZ15, author = {Weizhi Meng and Duncan S. Wong and Steven Furnell and Jianying Zhou}, title = {Surveying the Development of Biometric User Authentication on Mobile Phones}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {17}, number = {3}, pages = {1268--1293}, year = {2015}, url = {https://doi.org/10.1109/COMST.2014.2386915}, doi = {10.1109/COMST.2014.2386915}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/MengWFZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/LiangFWS15, author = {Kaitai Liang and Liming Fang and Duncan S. Wong and Willy Susilo}, title = {A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds}, journal = {Concurr. Comput. Pract. Exp.}, volume = {27}, number = {8}, pages = {2004--2027}, year = {2015}, url = {https://doi.org/10.1002/cpe.3397}, doi = {10.1002/CPE.3397}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/LiangFWS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/Jiang00WML15, author = {Tao Jiang and Xiaofeng Chen and Jin Li and Duncan S. Wong and Jianfeng Ma and Joseph K. Liu}, title = {Towards secure and reliable cloud storage against data re-outsourcing}, journal = {Future Gener. Comput. Syst.}, volume = {52}, pages = {86--94}, year = {2015}, url = {https://doi.org/10.1016/j.future.2014.11.002}, doi = {10.1016/J.FUTURE.2014.11.002}, timestamp = {Fri, 28 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/Jiang00WML15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/LiangALSWYYY15, author = {Kaitai Liang and Man Ho Au and Joseph K. Liu and Willy Susilo and Duncan S. Wong and Guomin Yang and Yong Yu and Anjia Yang}, title = {A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing}, journal = {Future Gener. Comput. Syst.}, volume = {52}, pages = {95--108}, year = {2015}, url = {https://doi.org/10.1016/j.future.2014.11.016}, doi = {10.1016/J.FUTURE.2014.11.016}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/LiangALSWYYY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcse/SchlegelW15, author = {Roman Schlegel and Duncan S. Wong}, title = {Private friends on a social networking site operated by an overly curious {SNP}}, journal = {Int. J. Comput. Sci. Eng.}, volume = {10}, number = {3}, pages = {281--292}, year = {2015}, url = {https://doi.org/10.1504/IJCSE.2015.068836}, doi = {10.1504/IJCSE.2015.068836}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcse/SchlegelW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijict/RenTWW15, author = {Yan Ren and Chunming Tang and Guilin Wang and Duncan S. Wong}, title = {Attribute-based signature schemes with accountability}, journal = {Int. J. Inf. Commun. Technol.}, volume = {7}, number = {2/3}, pages = {141--158}, year = {2015}, url = {https://doi.org/10.1504/IJICT.2015.068377}, doi = {10.1504/IJICT.2015.068377}, timestamp = {Fri, 22 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijict/RenTWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/LiangLLW15, author = {Kaitai Liang and Joseph K. Liu and Rongxing Lu and Duncan S. Wong}, title = {Privacy Concerns for Photo Sharing in Online Social Networks}, journal = {{IEEE} Internet Comput.}, volume = {19}, number = {2}, pages = {58--63}, year = {2015}, url = {https://doi.org/10.1109/MIC.2014.107}, doi = {10.1109/MIC.2014.107}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/internet/LiangLLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/HuangWS15, author = {Qiong Huang and Duncan S. Wong and Willy Susilo}, title = {How to protect privacy in Optimistic Fair Exchange of digital signatures}, journal = {Inf. Sci.}, volume = {325}, pages = {300--315}, year = {2015}, url = {https://doi.org/10.1016/j.ins.2015.07.032}, doi = {10.1016/J.INS.2015.07.032}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/HuangWS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kbs/0002LCXTW15, author = {Jin Li and Zheli Liu and Xiaofeng Chen and Fatos Xhafa and Xiao Tan and Duncan S. Wong}, title = {L-EncDB: {A} lightweight framework for privacy-preserving data queries in cloud computing}, journal = {Knowl. Based Syst.}, volume = {79}, pages = {18--26}, year = {2015}, url = {https://doi.org/10.1016/j.knosys.2014.04.010}, doi = {10.1016/J.KNOSYS.2014.04.010}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/kbs/0002LCXTW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/XhafaLZLCW15, author = {Fatos Xhafa and Jingwei Li and Gansen Zhao and Jin Li and Xiaofeng Chen and Duncan S. Wong}, title = {Designing cloud-based electronic health record system with attribute-based encryption}, journal = {Multim. Tools Appl.}, volume = {74}, number = {10}, pages = {3441--3458}, year = {2015}, url = {https://doi.org/10.1007/s11042-013-1829-6}, doi = {10.1007/S11042-013-1829-6}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/XhafaLZLCW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangWZX15, author = {Yilei Wang and Duncan S. Wong and Chuan Zhao and Qiuliang Xu}, title = {Fair two-party computation with rational parties holding private types}, journal = {Secur. Commun. Networks}, volume = {8}, number = {2}, pages = {284--297}, year = {2015}, url = {https://doi.org/10.1002/sec.979}, doi = {10.1002/SEC.979}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WangWZX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YangLZWJ15, author = {Anjia Yang and Kaitai Liang and Yunhui Zhuang and Duncan S. Wong and Xiaohua Jia}, title = {A new unpredictability-based radio frequency identification forward privacy model and a provably secure construction}, journal = {Secur. Commun. Networks}, volume = {8}, number = {16}, pages = {2836--2849}, year = {2015}, url = {https://doi.org/10.1002/sec.1208}, doi = {10.1002/SEC.1208}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/YangLZWJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangWS0X15, author = {Yilei Wang and Duncan S. Wong and Willy Susilo and Xiaofeng Chen and Qiuliang Xu}, title = {Achieving fairness by sequential equilibrium in rational two-party computation under incomplete information}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3690--3700}, year = {2015}, url = {https://doi.org/10.1002/sec.1292}, doi = {10.1002/SEC.1292}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WangWS0X15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/LiTCWX15, author = {Jin Li and Xiao Tan and Xiaofeng Chen and Duncan S. Wong and Fatos Xhafa}, title = {OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {3}, number = {2}, pages = {195--205}, year = {2015}, url = {https://doi.org/10.1109/TCC.2014.2366148}, doi = {10.1109/TCC.2014.2366148}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/LiTCWX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/ChenSLWMTT15, author = {Xiaofeng Chen and Willy Susilo and Jin Li and Duncan S. Wong and Jianfeng Ma and Shaohua Tang and Qiang Tang}, title = {Efficient algorithms for secure outsourcing of bilinear pairings}, journal = {Theor. Comput. Sci.}, volume = {562}, pages = {112--121}, year = {2015}, url = {https://doi.org/10.1016/j.tcs.2014.09.038}, doi = {10.1016/J.TCS.2014.09.038}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/ChenSLWMTT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/HuangYWS15, author = {Qiong Huang and Guomin Yang and Duncan S. Wong and Willy Susilo}, title = {Ambiguous optimistic fair exchange: Definition and constructions}, journal = {Theor. Comput. Sci.}, volume = {562}, pages = {177--193}, year = {2015}, url = {https://doi.org/10.1016/j.tcs.2014.09.043}, doi = {10.1016/J.TCS.2014.09.043}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/HuangYWS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/TanHW15, author = {Xiao Tan and Qiong Huang and Duncan S. Wong}, title = {Concurrent signature without random oracles}, journal = {Theor. Comput. Sci.}, volume = {562}, pages = {194--212}, year = {2015}, url = {https://doi.org/10.1016/j.tcs.2014.09.044}, doi = {10.1016/J.TCS.2014.09.044}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/TanHW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/WangWWCQLD15, author = {Yujue Wang and Duncan S. Wong and Qianhong Wu and Sherman S. M. Chow and Bo Qin and Jianwei Liu and Yong Ding}, title = {Practical (fully) distributed signatures provably secure in the standard model}, journal = {Theor. Comput. Sci.}, volume = {595}, pages = {143--158}, year = {2015}, url = {https://doi.org/10.1016/j.tcs.2015.06.029}, doi = {10.1016/J.TCS.2015.06.029}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/WangWWCQLD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuCW15a, author = {Zhen Liu and Zhenfu Cao and Duncan S. Wong}, title = {Traceable {CP-ABE:} How to Trace Decryption Devices Found in the Wild}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {1}, pages = {55--68}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2363562}, doi = {10.1109/TIFS.2014.2363562}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiuCW15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenHLMLW15, author = {Xiaofeng Chen and Xinyi Huang and Jin Li and Jianfeng Ma and Wenjing Lou and Duncan S. Wong}, title = {New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {1}, pages = {69--78}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2363765}, doi = {10.1109/TIFS.2014.2363765}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChenHLMLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/SchlegelCHW15, author = {Roman Schlegel and Chi{-}Yin Chow and Qiong Huang and Duncan S. Wong}, title = {User-Defined Privacy Grid System for Continuous Location-Based Services}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {14}, number = {10}, pages = {2158--2172}, year = {2015}, url = {https://doi.org/10.1109/TMC.2015.2388488}, doi = {10.1109/TMC.2015.2388488}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmc/SchlegelCHW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LiuW15, author = {Zhen Liu and Duncan S. Wong}, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe}, booktitle = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, pages = {127--146}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7\_7}, doi = {10.1007/978-3-319-28166-7\_7}, timestamp = {Tue, 25 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/LiuW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LiuW15, author = {Zhen Liu and Duncan S. Wong}, editor = {Sihan Qing and Eiji Okamoto and Kwangjo Kim and Dongmei Liu}, title = {Traceable {CP-ABE} on Prime Order Groups: Fully Secure and Fully Collusion-Resistant Blackbox Traceable}, booktitle = {Information and Communications Security - 17th International Conference, {ICICS} 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9543}, pages = {109--124}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-29814-6\_10}, doi = {10.1007/978-3-319-29814-6\_10}, timestamp = {Wed, 12 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/LiuW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/HableelBBW15, author = {Eman Hableel and Joonsang Baek and Young{-}Ji Byon and Duncan S. Wong}, title = {How to protect {ADS-B:} Confidentiality framework for future air traffic communication}, booktitle = {2015 {IEEE} Conference on Computer Communications Workshops, {INFOCOM} Workshops, Hong Kong, China, April 26 - May 1, 2015}, pages = {155--160}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/INFCOMW.2015.7179377}, doi = {10.1109/INFCOMW.2015.7179377}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/HableelBBW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ZhuangHW15, author = {Yunhui Zhuang and Gerhard P. Hancke and Duncan S. Wong}, editor = {Howon Kim and Dooho Choi}, title = {How to Demonstrate Our Presence Without Disclosing Identity? Evidence from a Grouping-Proof Protocol}, booktitle = {Information Security Applications - 16th International Workshop, {WISA} 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9503}, pages = {423--435}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31875-2\_35}, doi = {10.1007/978-3-319-31875-2\_35}, timestamp = {Thu, 02 Mar 2023 10:53:05 +0100}, biburl = {https://dblp.org/rec/conf/wisa/ZhuangHW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuW15, author = {Zhen Liu and Duncan S. Wong}, title = {Traceable {CP-ABE} on Prime Order Groups: Fully Secure and Fully Collusion-resistant Blackbox Traceable}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {850}, year = {2015}, url = {http://eprint.iacr.org/2015/850}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/00010MLW14, author = {Xiaofeng Chen and Jin Li and Jianfeng Ma and Wenjing Lou and Duncan S. Wong}, title = {New and efficient conditional e-payment systems with transferability}, journal = {Future Gener. Comput. Syst.}, volume = {37}, pages = {252--258}, year = {2014}, url = {https://doi.org/10.1016/j.future.2013.07.015}, doi = {10.1016/J.FUTURE.2013.07.015}, timestamp = {Fri, 28 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/00010MLW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/00020HW14, author = {Jin Li and Xiaofeng Chen and Qiong Huang and Duncan S. Wong}, title = {Digital provenance: Enabling secure data forensics in cloud computing}, journal = {Future Gener. Comput. Syst.}, volume = {37}, pages = {259--266}, year = {2014}, url = {https://doi.org/10.1016/j.future.2013.10.006}, doi = {10.1016/J.FUTURE.2013.10.006}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/00020HW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/Xhafa0WP14, author = {Fatos Xhafa and Jin Li and Duncan S. Wong and Francesco Palmieri}, title = {Advances in Security and Privacy in Sensor Networks}, journal = {Int. J. Distributed Sens. Networks}, volume = {10}, year = {2014}, url = {https://doi.org/10.1155/2014/956265}, doi = {10.1155/2014/956265}, timestamp = {Tue, 05 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdsn/Xhafa0WP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/XieHBDW14, author = {Qi Xie and Dongzhao Hong and Mengjie Bao and Na Dong and Duncan S. Wong}, title = {Privacy-Preserving Mobile Roaming Authentication with Security Proof in Global Mobility Networks}, journal = {Int. J. Distributed Sens. Networks}, volume = {10}, year = {2014}, url = {https://doi.org/10.1155/2014/325734}, doi = {10.1155/2014/325734}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/XieHBDW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/WangWH14, author = {Yuan Wang and Duncan S. Wong and Liusheng Huang}, title = {One-Pass Key Establishment Protocol for Wireless Roaming with User Anonymity}, journal = {Int. J. Netw. Secur.}, volume = {16}, number = {2}, pages = {129--142}, year = {2014}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v16-n2/ijns-2014-v16-n2-p129-142.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/WangWH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MengWK14, author = {Weizhi Meng and Duncan S. Wong and Lam{-}for Kwok}, title = {The effect of adaptive mechanism on behavioural biometric based mobile phone authentication}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {2}, pages = {155--166}, year = {2014}, url = {https://doi.org/10.1108/IMCS-09-2013-0062}, doi = {10.1108/IMCS-09-2013-0062}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MengWK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/GrittiSPLW14, author = {Cl{\'{e}}mentine Gritti and Willy Susilo and Thomas Plantard and Kaitai Liang and Duncan S. Wong}, title = {Empowering Personal Health Records with Cloud Computing: How to encrypt with forthcoming fine-grained policies efficiently}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {5}, number = {4}, pages = {3--28}, year = {2014}, url = {https://doi.org/10.22667/JOWUA.2014.12.31.003}, doi = {10.22667/JOWUA.2014.12.31.003}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/GrittiSPLW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/XieTWWBD14, author = {Qi Xie and Xiao Tan and Duncan S. Wong and Guilin Wang and Mengjie Bao and Na Dong}, title = {A practical anonymous authentication protocol for wireless roaming}, journal = {Secur. Commun. Networks}, volume = {7}, number = {8}, pages = {1264--1273}, year = {2014}, url = {https://doi.org/10.1002/sec.858}, doi = {10.1002/SEC.858}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/XieTWWBD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/YangTMSW14, author = {Guomin Yang and Chik How Tan and Yi Mu and Willy Susilo and Duncan S. Wong}, title = {Identity based identification from algebraic coding theory}, journal = {Theor. Comput. Sci.}, volume = {520}, pages = {51--61}, year = {2014}, url = {https://doi.org/10.1016/j.tcs.2013.09.008}, doi = {10.1016/J.TCS.2013.09.008}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/YangTMSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/LiangCTWTZ14, author = {Kaitai Liang and Cheng{-}Kang Chu and Xiao Tan and Duncan S. Wong and Chunming Tang and Jianying Zhou}, title = {Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts}, journal = {Theor. Comput. Sci.}, volume = {539}, pages = {87--105}, year = {2014}, url = {https://doi.org/10.1016/j.tcs.2014.04.027}, doi = {10.1016/J.TCS.2014.04.027}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/LiangCTWTZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/TanHW14, author = {Xiao Tan and Qiong Huang and Duncan S. Wong}, title = {Extending concurrent signature to multiple parties}, journal = {Theor. Comput. Sci.}, volume = {548}, pages = {54--67}, year = {2014}, url = {https://doi.org/10.1016/j.tcs.2014.06.038}, doi = {10.1016/J.TCS.2014.06.038}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/TanHW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GuoMSWV14, author = {Fuchun Guo and Yi Mu and Willy Susilo and Duncan S. Wong and Vijay Varadharajan}, title = {{CP-ABE} With Constant-Size Keys for Lightweight Devices}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {9}, number = {5}, pages = {763--771}, year = {2014}, url = {https://doi.org/10.1109/TIFS.2014.2309858}, doi = {10.1109/TIFS.2014.2309858}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GuoMSWV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiangALSWYPX14, author = {Kaitai Liang and Man Ho Au and Joseph K. Liu and Willy Susilo and Duncan S. Wong and Guomin Yang and Tran Viet Xuan Phuong and Qi Xie}, title = {A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {9}, number = {10}, pages = {1667--1680}, year = {2014}, url = {https://doi.org/10.1109/TIFS.2014.2346023}, doi = {10.1109/TIFS.2014.2346023}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiangALSWYPX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/ChenLHLXW14, author = {Xiaofeng Chen and Jin Li and Xinyi Huang and Jingwei Li and Yang Xiang and Duncan S. Wong}, title = {Secure Outsourced Attribute-Based Signatures}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {25}, number = {12}, pages = {3285--3294}, year = {2014}, url = {https://doi.org/10.1109/TPDS.2013.2295809}, doi = {10.1109/TPDS.2013.2295809}, timestamp = {Thu, 24 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tpds/ChenLHLXW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/LiuCW14, author = {Zhen Liu and Zhenfu Cao and Duncan S. Wong}, editor = {Dongdai Lin and Moti Yung and Jianying Zhou}, title = {Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts}, booktitle = {Information Security and Cryptology - 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8957}, pages = {403--423}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-16745-9\_22}, doi = {10.1007/978-3-319-16745-9\_22}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/LiuCW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/WangWWCQL14, author = {Yujue Wang and Duncan S. Wong and Qianhong Wu and Sherman S. M. Chow and Bo Qin and Jianwei Liu}, editor = {Josh Benaloh}, title = {Practical Distributed Signatures in the Standard Model}, booktitle = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8366}, pages = {307--326}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-04852-9\_16}, doi = {10.1007/978-3-319-04852-9\_16}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/WangWWCQL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/HuangWS14, author = {Qiong Huang and Duncan S. Wong and Willy Susilo}, editor = {Josh Benaloh}, title = {{P2OFE:} Privacy-Preserving Optimistic Fair Exchange of Digital Signatures}, booktitle = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8366}, pages = {367--384}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-04852-9\_19}, doi = {10.1007/978-3-319-04852-9\_19}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/HuangWS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LiangLWS14, author = {Kaitai Liang and Joseph K. Liu and Duncan S. Wong and Willy Susilo}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8712}, pages = {257--272}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11203-9\_15}, doi = {10.1007/978-3-319-11203-9\_15}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/LiangLWS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/WangWWQCLT14, author = {Yujue Wang and Qianhong Wu and Duncan S. Wong and Bo Qin and Sherman S. M. Chow and Zhen Liu and Xiao Tan}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8712}, pages = {326--343}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11203-9\_19}, doi = {10.1007/978-3-319-11203-9\_19}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/WangWWQCLT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsoc/QuWOWB14, author = {Lie Qu and Yan Wang and Mehmet A. Orgun and Duncan S. Wong and Athman Bouguettaya}, editor = {Xavier Franch and Aditya K. Ghose and Grace A. Lewis and Sami Bhiri}, title = {Evaluating Cloud Users' Credibility of Providing Subjective Assessment or Objective Assessment for Cloud Services}, booktitle = {Service-Oriented Computing - 12th International Conference, {ICSOC} 2014, Paris, France, November 3-6, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8831}, pages = {453--461}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45391-9\_36}, doi = {10.1007/978-3-662-45391-9\_36}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icsoc/QuWOWB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/Jiang0LWML14, author = {Tao Jiang and Xiaofeng Chen and Jin Li and Duncan S. Wong and Jianfeng Ma and Joseph K. Liu}, editor = {Xinyi Huang and Jianying Zhou}, title = {{TIMER:} Secure and Reliable Cloud Storage against Data Re-outsourcing}, booktitle = {Information Security Practice and Experience - 10th International Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8434}, pages = {346--358}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06320-1\_26}, doi = {10.1007/978-3-319-06320-1\_26}, timestamp = {Fri, 09 Apr 2021 18:45:22 +0200}, biburl = {https://dblp.org/rec/conf/ispec/Jiang0LWML14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LiangASWYY14, author = {Kaitai Liang and Man Ho Au and Willy Susilo and Duncan S. Wong and Guomin Yang and Yong Yu}, editor = {Xinyi Huang and Jianying Zhou}, title = {An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data Sharing}, booktitle = {Information Security Practice and Experience - 10th International Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8434}, pages = {448--461}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06320-1\_33}, doi = {10.1007/978-3-319-06320-1\_33}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/LiangASWYY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/MengWK14, author = {Yuxin Meng and Duncan S. Wong and Lam{-}for Kwok}, editor = {Yookun Cho and Sung Y. Shin and Sang{-}Wook Kim and Chih{-}Cheng Hung and Jiman Hong}, title = {Design of touch dynamics based user authentication with an adaptive mechanism on mobile phones}, booktitle = {Symposium on Applied Computing, {SAC} 2014, Gyeongju, Republic of Korea - March 24 - 28, 2014}, pages = {1680--1687}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2554850.2554931}, doi = {10.1145/2554850.2554931}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sac/MengWK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XuYZW14, author = {Jia Xu and Anjia Yang and Jianying Zhou and Duncan S. Wong}, title = {Lightweight and Privacy-Preserving Delegatable Proofs of Storage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {395}, year = {2014}, url = {http://eprint.iacr.org/2014/395}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/XuYZW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuW14, author = {Zhen Liu and Duncan S. Wong}, title = {Practical Attribute Based Encryption: Traitor Tracing, Revocation, and Large Universe}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {616}, year = {2014}, url = {http://eprint.iacr.org/2014/616}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuCW14a, author = {Zhen Liu and Zhenfu Cao and Duncan S. Wong}, title = {Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {676}, year = {2014}, url = {http://eprint.iacr.org/2014/676}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuCW14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/BaekVSJW13, author = {Joonsang Baek and Quang Hieu Vu and Abdulhadi Shoufan and Andrew Jones and Duncan S. Wong}, title = {Stateful Public-Key Encryption Schemes Forward-Secure Against State Exposure}, journal = {Comput. J.}, volume = {56}, number = {4}, pages = {497--507}, year = {2013}, url = {https://doi.org/10.1093/comjnl/bxs151}, doi = {10.1093/COMJNL/BXS151}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/BaekVSJW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/HuangWS13, author = {Qiong Huang and Duncan S. Wong and Willy Susilo}, title = {The construction of ambiguous optimistic fair exchange from designated confirmer signature without random oracles}, journal = {Inf. Sci.}, volume = {228}, pages = {222--238}, year = {2013}, url = {https://doi.org/10.1016/j.ins.2012.11.022}, doi = {10.1016/J.INS.2012.11.022}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/HuangWS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itc/XieDTWW13, author = {Qi Xie and Na Dong and Xiao Tan and Duncan S. Wong and Guilin Wang}, title = {Improvement of a Three-Party Password-Based Key Exchange Protocol with Formal Verification}, journal = {Inf. Technol. Control.}, volume = {42}, number = {3}, pages = {231--237}, year = {2013}, url = {https://doi.org/10.5755/j01.itc.42.3.1905}, doi = {10.5755/J01.ITC.42.3.1905}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itc/XieDTWW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/HuangW13, author = {Qiong Huang and Duncan S. Wong}, title = {Short and efficient convertible undeniable signature schemes without random oracles}, journal = {Theor. Comput. Sci.}, volume = {476}, pages = {67--83}, year = {2013}, url = {https://doi.org/10.1016/j.tcs.2013.01.010}, doi = {10.1016/J.TCS.2013.01.010}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/HuangW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuCW13, author = {Zhen Liu and Zhenfu Cao and Duncan S. Wong}, title = {White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {8}, number = {1}, pages = {76--88}, year = {2013}, url = {https://doi.org/10.1109/TIFS.2012.2223683}, doi = {10.1109/TIFS.2012.2223683}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiuCW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SusiloAWW13, author = {Willy Susilo and Man Ho Au and Yang Wang and Duncan S. Wong}, editor = {Colin Boyd and Leonie Simpson}, title = {Fairness in Concurrent Signatures Revisited}, booktitle = {Information Security and Privacy - 18th Australasian Conference, {ACISP} 2013, Brisbane, Australia, July 1-3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7959}, pages = {318--329}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39059-3\_22}, doi = {10.1007/978-3-642-39059-3\_22}, timestamp = {Tue, 09 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SusiloAWW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiuCW13, author = {Zhen Liu and Zhenfu Cao and Duncan S. Wong}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Blackbox traceable {CP-ABE:} how to catch people leaking their keys by selling decryption devices on ebay}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {475--486}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516683}, doi = {10.1145/2508859.2516683}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LiuCW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangCLWL13, author = {Yinghui Zhang and Xiaofeng Chen and Jin Li and Duncan S. Wong and Hui Li}, editor = {Kefei Chen and Qi Xie and Weidong Qiu and Ninghui Li and Wen{-}Guey Tzeng}, title = {Anonymous attribute-based encryption supporting efficient decryption test}, booktitle = {8th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013}, pages = {511--516}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484313.2484381}, doi = {10.1145/2484313.2484381}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangCLWL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/LiuGW13, author = {Zhe Liu and Johann Gro{\ss}sch{\"{a}}dl and Duncan S. Wong}, editor = {Dongdai Lin and Shouhuai Xu and Moti Yung}, title = {Low-Weight Primes for Lightweight Elliptic Curve Cryptography on 8-bit {AVR} Processors}, booktitle = {Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8567}, pages = {217--235}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-12087-4\_14}, doi = {10.1007/978-3-319-12087-4\_14}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/LiuGW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eidwt/RenTWW13, author = {Yan Ren and Chunming Tang and Guilin Wang and Duncan S. Wong}, title = {Accountable Authority Attribute-Based Signature}, booktitle = {2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, Xi'an, Shaanxi, China, September 9-11, 2013}, pages = {773--777}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/EIDWT.2013.97}, doi = {10.1109/EIDWT.2013.97}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eidwt/RenTWW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/LiuWH13, author = {Dennis Y. W. Liu and Duncan S. Wong and Qiong Huang}, editor = {Hyang{-}Sook Lee and Dong{-}Guk Han}, title = {Ambiguous One-Move Nominative Signature Without Random Oracles}, booktitle = {Information Security and Cryptology - {ICISC} 2013 - 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8565}, pages = {325--341}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-12160-4\_20}, doi = {10.1007/978-3-319-12160-4\_20}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/LiuWH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/LiTCW13, author = {Jin Li and Xiao Tan and Xiaofeng Chen and Duncan S. Wong}, title = {An Efficient Proof of Retrievability with Public Auditing in Cloud Computing}, booktitle = {2013 5th International Conference on Intelligent Networking and Collaborative Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013}, pages = {93--98}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/INCoS.2013.185}, doi = {10.1109/INCOS.2013.185}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/incos/LiTCW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/LiangFSW13, author = {Kaitai Liang and Liming Fang and Willy Susilo and Duncan S. Wong}, title = {A Ciphertext-Policy Attribute-Based Proxy Re-encryption with Chosen-Ciphertext Security}, booktitle = {2013 5th International Conference on Intelligent Networking and Collaborative Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013}, pages = {552--559}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/INCoS.2013.103}, doi = {10.1109/INCOS.2013.103}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/incos/LiangFSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/XieBDHW13, author = {Qi Xie and Mengjie Bao and Na Dong and Bin Hu and Duncan S. Wong}, title = {Secure Mobile User Authentication and Key Agreement Protocol with Privacy Protection in Global Mobility Networks}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.23}, doi = {10.1109/ISBAST.2013.23}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/XieBDHW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LiangHSWT13, author = {Kaitai Liang and Qiong Huang and Roman Schlegel and Duncan S. Wong and Chunming Tang}, editor = {Robert H. Deng and Tao Feng}, title = {A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release}, booktitle = {Information Security Practice and Experience - 9th International Conference, {ISPEC} 2013, Lanzhou, China, May 12-14, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7863}, pages = {132--146}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38033-4\_10}, doi = {10.1007/978-3-642-38033-4\_10}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/LiangHSWT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/YangMSW13, author = {Guomin Yang and Yi Mu and Willy Susilo and Duncan S. Wong}, editor = {Robert H. Deng and Tao Feng}, title = {Leakage Resilient Authenticated Key Exchange Secure in the Auxiliary Input Model}, booktitle = {Information Security Practice and Experience - 9th International Conference, {ISPEC} 2013, Lanzhou, China, May 12-14, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7863}, pages = {204--217}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38033-4\_15}, doi = {10.1007/978-3-642-38033-4\_15}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/YangMSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/ZhuangYWYX13, author = {Yunhui Zhuang and Anjia Yang and Duncan S. Wong and Guomin Yang and Qi Xie}, editor = {Javier L{\'{o}}pez and Xinyi Huang and Ravi S. Sandhu}, title = {A Highly Efficient {RFID} Distance Bounding Protocol without Real-Time {PRF} Evaluation}, booktitle = {Network and System Security - 7th International Conference, {NSS} 2013, Madrid, Spain, June 3-4, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7873}, pages = {451--464}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38631-2\_33}, doi = {10.1007/978-3-642-38631-2\_33}, timestamp = {Tue, 09 Feb 2021 08:50:29 +0100}, biburl = {https://dblp.org/rec/conf/nss/ZhuangYWYX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/YangZWY13, author = {Anjia Yang and Yunhui Zhuang and Duncan S. Wong and Guomin Yang}, editor = {Javier L{\'{o}}pez and Xinyi Huang and Ravi S. Sandhu}, title = {A New Unpredictability-Based {RFID} Privacy Model}, booktitle = {Network and System Security - 7th International Conference, {NSS} 2013, Madrid, Spain, June 3-4, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7873}, pages = {479--492}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38631-2\_35}, doi = {10.1007/978-3-642-38631-2\_35}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/YangZWY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiangHSWT13, author = {Kaitai Liang and Qiong Huang and Roman Schlegel and Duncan S. Wong and Chunming Tang}, title = {A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {115}, year = {2013}, url = {http://eprint.iacr.org/2013/115}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LiangHSWT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiangFWS13, author = {Kaitai Liang and Liming Fang and Duncan S. Wong and Willy Susilo}, title = {A Ciphertext-Policy Attribute-Based Proxy Re-Encryption with Chosen-Ciphertext Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {236}, year = {2013}, url = {http://eprint.iacr.org/2013/236}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiangFWS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuWH13, author = {Dennis Y. W. Liu and Duncan S. Wong and Qiong Huang}, title = {Ambiguous One-Move Nominative Signature Without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {711}, year = {2013}, url = {http://eprint.iacr.org/2013/711}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LiuWH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/HuangMSWW12, author = {Xinyi Huang and Yi Mu and Willy Susilo and Duncan S. Wong and Wei Wu}, title = {Certificateless Signatures: New Schemes and Security Models}, journal = {Comput. J.}, volume = {55}, number = {4}, pages = {457--474}, year = {2012}, url = {https://doi.org/10.1093/comjnl/bxr097}, doi = {10.1093/COMJNL/BXR097}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/HuangMSWW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/HuangYWS12, author = {Qiong Huang and Guomin Yang and Duncan S. Wong and Willy Susilo}, title = {A new efficient optimistic fair exchange protocol without random oracles}, journal = {Int. J. Inf. Sec.}, volume = {11}, number = {1}, pages = {53--63}, year = {2012}, url = {https://doi.org/10.1007/s10207-011-0152-3}, doi = {10.1007/S10207-011-0152-3}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/HuangYWS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/WongT12, author = {Duncan S. Wong and Xiaojian Tian}, title = {E-mail protocols with perfect forward secrecy}, journal = {Int. J. Secur. Networks}, volume = {7}, number = {1}, pages = {1--5}, year = {2012}, url = {https://doi.org/10.1504/IJSN.2012.048491}, doi = {10.1504/IJSN.2012.048491}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/WongT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/LiZCKW12, author = {Jin Li and Fangguo Zhang and Xiaofeng Chen and Kwangjo Kim and Duncan S. Wong}, title = {Generic security-amplifying methods of ordinary digital signatures}, journal = {Inf. Sci.}, volume = {201}, pages = {128--139}, year = {2012}, url = {https://doi.org/10.1016/j.ins.2012.03.006}, doi = {10.1016/J.INS.2012.03.006}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/LiZCKW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/SchlegelW12, author = {Roman Schlegel and Duncan S. Wong}, title = {Anonymous overlay network supporting authenticated routing}, journal = {Inf. Sci.}, volume = {210}, pages = {99--117}, year = {2012}, url = {https://doi.org/10.1016/j.ins.2012.04.042}, doi = {10.1016/J.INS.2012.04.042}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/SchlegelW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TanW12, author = {Xiao Tan and Duncan S. Wong}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {Generalized First Pre-image Tractable Random Oracle Model and Signature Schemes}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {247--260}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_19}, doi = {10.1007/978-3-642-31448-3\_19}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/TanW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/MengWSK12, author = {Yuxin Meng and Duncan S. Wong and Roman Schlegel and Lam{-}for Kwok}, editor = {Miroslaw Kutylowski and Moti Yung}, title = {Touch Gestures Based Biometric Authentication Scheme for Touchscreen Mobile Phones}, booktitle = {Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7763}, pages = {331--350}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38519-3\_21}, doi = {10.1007/978-3-642-38519-3\_21}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/MengWSK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudcom/TangHWP12, author = {Chunming Tang and Xing Hu and Duncan S. Wong and Dingyi Pei}, title = {An efficient key distribution scheme in cloud computing}, booktitle = {4th {IEEE} International Conference on Cloud Computing Technology and Science Proceedings, CloudCom 2012, Taipei, Taiwan, December 3-6, 2012}, pages = {557--561}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CloudCom.2012.6427608}, doi = {10.1109/CLOUDCOM.2012.6427608}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cloudcom/TangHWP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ChowSW12, author = {Yang{-}Wai Chow and Willy Susilo and Duncan S. Wong}, editor = {Tat Wing Chim and Tsz Hon Yuen}, title = {Enhancing the Perceived Visual Quality of a Size Invariant Visual Cryptography Scheme}, booktitle = {Information and Communications Security - 14th International Conference, {ICICS} 2012, Hong Kong, China, October 29-31, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7618}, pages = {10--21}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34129-8\_2}, doi = {10.1007/978-3-642-34129-8\_2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/ChowSW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/YangZW12, author = {Anjia Yang and Yunhui Zhuang and Duncan S. Wong}, editor = {Tat Wing Chim and Tsz Hon Yuen}, title = {An Efficient Single-Slow-Phase Mutually Authenticated {RFID} Distance Bounding Protocol with Tag Privacy}, booktitle = {Information and Communications Security - 14th International Conference, {ICICS} 2012, Hong Kong, China, October 29-31, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7618}, pages = {285--292}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34129-8\_25}, doi = {10.1007/978-3-642-34129-8\_25}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/YangZW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ZhangXWMY12, author = {Ye Zhang and Chun Jason Xue and Duncan S. Wong and Nikos Mamoulis and Siu{-}Ming Yiu}, editor = {Tat Wing Chim and Tsz Hon Yuen}, title = {Acceleration of Composite Order Bilinear Pairing on Graphics Hardware}, booktitle = {Information and Communications Security - 14th International Conference, {ICICS} 2012, Hong Kong, China, October 29-31, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7618}, pages = {341--348}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34129-8\_31}, doi = {10.1007/978-3-642-34129-8\_31}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/ZhangXWMY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/LiangLTWT12, author = {Kaitai Liang and Zhen Liu and Xiao Tan and Duncan S. Wong and Chunming Tang}, editor = {Taekyoung Kwon and Mun{-}Kyu Lee and Daesung Kwon}, title = {A CCA-Secure Identity-Based Conditional Proxy Re-Encryption without Random Oracles}, booktitle = {Information Security and Cryptology - {ICISC} 2012 - 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7839}, pages = {231--246}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-37682-5\_17}, doi = {10.1007/978-3-642-37682-5\_17}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/LiangLTWT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/SchlegelW12, author = {Roman Schlegel and Duncan S. Wong}, editor = {Li Xu and Elisa Bertino and Yi Mu}, title = {Private Friends on a Social Networking Site Operated by an Overly Curious {SNP}}, booktitle = {Network and System Security - 6th International Conference, {NSS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7645}, pages = {430--444}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34601-9\_33}, doi = {10.1007/978-3-642-34601-9\_33}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/nss/SchlegelW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HuangWS12, author = {Qiong Huang and Duncan S. Wong and Willy Susilo}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {The Construction of Ambiguous Optimistic Fair Exchange from Designated Confirmer Signature without Random Oracles}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {120--137}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_8}, doi = {10.1007/978-3-642-30057-8\_8}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HuangWS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/LiuW12, author = {Dennis Y. W. Liu and Duncan S. Wong}, editor = {Tsuyoshi Takagi and Guilin Wang and Zhiguang Qin and Shaoquan Jiang and Yong Yu}, title = {One-Move Convertible Nominative Signature in the Standard Model}, booktitle = {Provable Security - 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7496}, pages = {2--20}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33272-2\_2}, doi = {10.1007/978-3-642-33272-2\_2}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/LiuW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Liu0W12, author = {Guanfeng Liu and Yan Wang and Duncan S. Wong}, editor = {Geyong Min and Yulei Wu and Lei (Chris) Liu and Xiaolong Jin and Stephen A. Jarvis and Ahmed Yassin Al{-}Dubai}, title = {Multiple QoT Constrained Social Trust Path Selection in Complex Social Networks}, booktitle = {11th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012, Liverpool, United Kingdom, June 25-27, 2012}, pages = {624--631}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/TrustCom.2012.210}, doi = {10.1109/TRUSTCOM.2012.210}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Liu0W12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TanHW12, author = {Xiao Tan and Qiong Huang and Duncan S. Wong}, title = {Concurrent Signature without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {576}, year = {2012}, url = {http://eprint.iacr.org/2012/576}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/TanHW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Li0LJWS12, author = {Jin Li and Xiaofeng Chen and Jingwei Li and Chunfu Jia and Duncan S. Wong and Willy Susilo}, title = {Secure Outsourced Attribute-Based Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {605}, year = {2012}, url = {http://eprint.iacr.org/2012/605}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Li0LJWS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuCW12, author = {Zhen Liu and Zhenfu Cao and Duncan S. Wong}, title = {Expressive Black-box Traceable Ciphertext-Policy Attribute-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {669}, year = {2012}, url = {http://eprint.iacr.org/2012/669}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuCW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/HuangWY11, author = {Qiong Huang and Duncan S. Wong and Guomin Yang}, title = {Heterogeneous Signcryption with Key Privacy}, journal = {Comput. J.}, volume = {54}, number = {4}, pages = {525--536}, year = {2011}, url = {https://doi.org/10.1093/comjnl/bxq095}, doi = {10.1093/COMJNL/BXQ095}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/HuangWY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/HuangYWS11, author = {Qiong Huang and Guomin Yang and Duncan S. Wong and Willy Susilo}, title = {Efficient strong designated verifier signature schemes without random oracle or with non-delegatability}, journal = {Int. J. Inf. Sec.}, volume = {10}, number = {6}, pages = {373--385}, year = {2011}, url = {https://doi.org/10.1007/s10207-011-0146-1}, doi = {10.1007/S10207-011-0146-1}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/HuangYWS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/HuangWS11, author = {Qiong Huang and Duncan S. Wong and Willy Susilo}, title = {Group-oriented fair exchange of signatures}, journal = {Inf. Sci.}, volume = {181}, number = {16}, pages = {3267--3283}, year = {2011}, url = {https://doi.org/10.1016/j.ins.2011.03.024}, doi = {10.1016/J.INS.2011.03.024}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/HuangWS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/HuangYWS11, author = {Qiong Huang and Guomin Yang and Duncan S. Wong and Willy Susilo}, title = {Identity-based strong designated verifier signature revisited}, journal = {J. Syst. Softw.}, volume = {84}, number = {1}, pages = {120--129}, year = {2011}, url = {https://doi.org/10.1016/j.jss.2010.08.057}, doi = {10.1016/J.JSS.2010.08.057}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/HuangYWS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuangWS11, author = {Qiong Huang and Duncan S. Wong and Willy Susilo}, title = {Efficient Designated Confirmer Signature and DCS-Based Ambiguous Optimistic Fair Exchange}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {6}, number = {4}, pages = {1233--1247}, year = {2011}, url = {https://doi.org/10.1109/TIFS.2011.2161290}, doi = {10.1109/TIFS.2011.2161290}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HuangWS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiHCCWX11, author = {Jin Li and Qiong Huang and Xiaofeng Chen and Sherman S. M. Chow and Duncan S. Wong and Dongqing Xie}, editor = {Bruce S. N. Cheung and Lucas Chi Kwong Hui and Ravi S. Sandhu and Duncan S. Wong}, title = {Multi-authority ciphertext-policy attribute-based encryption with accountability}, booktitle = {Proceedings of the 6th {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24, 2011}, pages = {386--390}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1966913.1966964}, doi = {10.1145/1966913.1966964}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiHCCWX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LiuCHWY11, author = {Zhen Liu and Zhenfu Cao and Qiong Huang and Duncan S. Wong and Tsz Hon Yuen}, editor = {Vijay Atluri and Claudia D{\'{\i}}az}, title = {Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles}, booktitle = {Computer Security - {ESORICS} 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6879}, pages = {278--297}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23822-2\_16}, doi = {10.1007/978-3-642-23822-2\_16}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/LiuCHWY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/YangDWTW11, author = {Guomin Yang and Shanshan Duan and Duncan S. Wong and Chik How Tan and Huaxiong Wang}, editor = {George Danezis}, title = {Authenticated Key Exchange under Bad Randomness}, booktitle = {Financial Cryptography and Data Security - 15th International Conference, {FC} 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7035}, pages = {113--126}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27576-0\_10}, doi = {10.1007/978-3-642-27576-0\_10}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/YangDWTW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/WangWH11, author = {Yuan Wang and Duncan S. Wong and Liusheng Huang}, title = {A One-Pass Key Establishment Protocol for Anonymous Wireless Roaming with {PFS}}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2011, Kyoto, Japan, 5-9 June, 2011}, pages = {1--5}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/icc.2011.5962523}, doi = {10.1109/ICC.2011.5962523}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/WangWH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/HuangW11, author = {Qiong Huang and Duncan S. Wong}, editor = {Feng Bao and Jian Weng}, title = {Short Convertible Undeniable Signature in the Standard Model}, booktitle = {Information Security Practice and Experience - 7th International Conference, {ISPEC} 2011, Guangzhou, China, May 30 - June 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6672}, pages = {257--272}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21031-0\_20}, doi = {10.1007/978-3-642-21031-0\_20}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/HuangW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/HuangWSY11, author = {Qiong Huang and Duncan S. Wong and Willy Susilo and Bo Yang}, editor = {Xuejia Lai and Jianying Zhou and Hui Li}, title = {An Efficient Construction of Time-Selective Convertible Undeniable Signatures}, booktitle = {Information Security, 14th International Conference, {ISC} 2011, Xi'an, China, October 26-29, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7001}, pages = {355--371}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24861-0\_24}, doi = {10.1007/978-3-642-24861-0\_24}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/HuangWSY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/YuenWSH11, author = {Tsz Hon Yuen and Duncan S. Wong and Willy Susilo and Qiong Huang}, editor = {Xavier Boyen and Xiaofeng Chen}, title = {Concurrent Signatures with Fully Negotiable Binding Control}, booktitle = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6980}, pages = {170--187}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24316-5\_13}, doi = {10.1007/978-3-642-24316-5\_13}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/YuenWSH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2011asia, editor = {Bruce S. N. Cheung and Lucas Chi Kwong Hui and Ravi S. Sandhu and Duncan S. Wong}, title = {Proceedings of the 6th {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24, 2011}, publisher = {{ACM}}, year = {2011}, isbn = {978-1-4503-0564-8}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2011asia.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangXWMY11, author = {Ye Zhang and Chun Jason Xue and Duncan S. Wong and Nikos Mamoulis and Siu{-}Ming Yiu}, title = {Acceleration of Composite Order Bilinear Pairing on Graphics Hardware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {196}, year = {2011}, url = {http://eprint.iacr.org/2011/196}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangXWMY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YangDWTW11, author = {Guomin Yang and Shanshan Duan and Duncan S. Wong and Chik How Tan and Huaxiong Wang}, title = {Authenticated Key Exchange under Bad Randomness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {688}, year = {2011}, url = {http://eprint.iacr.org/2011/688}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YangDWTW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/LiW10, author = {Chung Ki Li and Duncan S. Wong}, title = {Signcryption from randomness recoverable public key encryption}, journal = {Inf. Sci.}, volume = {180}, number = {4}, pages = {549--559}, year = {2010}, url = {https://doi.org/10.1016/j.ins.2009.10.015}, doi = {10.1016/J.INS.2009.10.015}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/LiW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/LiYWDC10, author = {Chung Ki Li and Guomin Yang and Duncan S. Wong and Xiaotie Deng and Sherman S. M. Chow}, title = {An efficient signcryption scheme with key privacy and its extension to ring signcryption}, journal = {J. Comput. Secur.}, volume = {18}, number = {3}, pages = {451--473}, year = {2010}, url = {https://doi.org/10.3233/JCS-2009-0374}, doi = {10.3233/JCS-2009-0374}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/LiYWDC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/HuangW10, author = {Qiong Huang and Duncan S. Wong}, title = {Generic Certificateless Encryption Secure Against Malicious-but-Passive {KGC} Attacks in the Standard Model}, journal = {J. Comput. Sci. Technol.}, volume = {25}, number = {4}, pages = {807--826}, year = {2010}, url = {https://doi.org/10.1007/s11390-010-9367-4}, doi = {10.1007/S11390-010-9367-4}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcst/HuangW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/twc/YangHWD10, author = {Guomin Yang and Qiong Huang and Duncan S. Wong and Xiaotie Deng}, title = {Universal authentication protocols for anonymous wireless communications}, journal = {{IEEE} Trans. Wirel. Commun.}, volume = {9}, number = {1}, pages = {168--174}, year = {2010}, url = {https://doi.org/10.1109/TWC.2010.01.081219}, doi = {10.1109/TWC.2010.01.081219}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/twc/YangHWD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/YangTHW10, author = {Guomin Yang and Chik How Tan and Qiong Huang and Duncan S. Wong}, editor = {Josef Pieprzyk}, title = {Probabilistic Public Key Encryption with Equality Test}, booktitle = {Topics in Cryptology - {CT-RSA} 2010, The Cryptographers' Track at the {RSA} Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5985}, pages = {119--131}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11925-5\_9}, doi = {10.1007/978-3-642-11925-5\_9}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/YangTHW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pairing/HuangWS10, author = {Qiong Huang and Duncan S. Wong and Willy Susilo}, editor = {Marc Joye and Atsuko Miyaji and Akira Otsuka}, title = {A New Construction of Designated Confirmer Signature and Its Application to Optimistic Fair Exchange - (Extended Abstract)}, booktitle = {Pairing-Based Cryptography - Pairing 2010 - 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6487}, pages = {41--61}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17455-1\_4}, doi = {10.1007/978-3-642-17455-1\_4}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pairing/HuangWS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pairing/ZhangAWHMCY10, author = {Ye Zhang and Man Ho Au and Duncan S. Wong and Qiong Huang and Nikos Mamoulis and David W. Cheung and Siu{-}Ming Yiu}, editor = {Marc Joye and Atsuko Miyaji and Akira Otsuka}, title = {Oblivious Transfer with Access Control : Realizing Disjunction without Duplication}, booktitle = {Pairing-Based Cryptography - Pairing 2010 - 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6487}, pages = {96--115}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17455-1\_7}, doi = {10.1007/978-3-642-17455-1\_7}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pairing/ZhangAWHMCY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/TsangALSW10, author = {Patrick P. Tsang and Man Ho Au and Joseph K. Liu and Willy Susilo and Duncan S. Wong}, editor = {Swee{-}Huay Heng and Kaoru Kurosawa}, title = {A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract)}, booktitle = {Provable Security - 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6402}, pages = {166--183}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16280-0\_11}, doi = {10.1007/978-3-642-16280-0\_11}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/TsangALSW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/WuWL10, author = {Xiaoyu Wu and Duncan S. Wong and Qing Li}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Extended Visual Cryptography Scheme for Color Images with no Pixel Expansion}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {423--426}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 08:40:23 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/WuWL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/XiongWD10, author = {Xiaokang Xiong and Duncan S. Wong and Xiaotie Deng}, title = {TinyPairing: {A} Fast and Lightweight Pairing-Based Cryptographic Library for Wireless Sensor Networks}, booktitle = {2010 {IEEE} Wireless Communications and Networking Conference, {WCNC} 2010, Proceedings, Sydney, Australia, 18-21 April 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WCNC.2010.5506580}, doi = {10.1109/WCNC.2010.5506580}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wcnc/XiongWD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnis/SchlegelW10, author = {Roman Schlegel and Duncan S. Wong}, title = {An efficient routing protocol for anonymous networks}, booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications, Networking and Information Security, {WCNIS} 2010, 25-27 June 2010, Beijing, China}, pages = {349--353}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WCINS.2010.5541798}, doi = {10.1109/WCINS.2010.5541798}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/wcnis/SchlegelW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnis/WangWH10, author = {Yuan Wang and Duncan S. Wong and Liusheng Huang}, title = {One-pass key establishment for anonymous wireless roaming}, booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications, Networking and Information Security, {WCNIS} 2010, 25-27 June 2010, Beijing, China}, pages = {533--537}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WCINS.2010.5541836}, doi = {10.1109/WCINS.2010.5541836}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wcnis/WangWH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ChangWMZ09, author = {Shuang Chang and Duncan S. Wong and Yi Mu and Zhenfeng Zhang}, title = {Certificateless Threshold Ring Signature}, journal = {Inf. Sci.}, volume = {179}, number = {20}, pages = {3685--3696}, year = {2009}, url = {https://doi.org/10.1016/j.ins.2009.06.017}, doi = {10.1016/J.INS.2009.06.017}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/ChangWMZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pr/LeungNW09, author = {Bert W. Leung and Felix Y. Ng and Duncan S. Wong}, title = {On the security of a visual cryptography scheme for color images}, journal = {Pattern Recognit.}, volume = {42}, number = {5}, pages = {929--940}, year = {2009}, url = {https://doi.org/10.1016/j.patcog.2008.08.031}, doi = {10.1016/J.PATCOG.2008.08.031}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pr/LeungNW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soca/WangLWV09, author = {Yan Wang and Kwei{-}Jay Lin and Duncan S. Wong and Vijay Varadharajan}, title = {Trust management towards service-oriented applications}, journal = {Serv. Oriented Comput. Appl.}, volume = {3}, number = {2}, pages = {129--146}, year = {2009}, url = {https://doi.org/10.1007/s11761-008-0035-2}, doi = {10.1007/S11761-008-0035-2}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/soca/WangLWV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cocoon/YuenHMSWY09, author = {Tsz Hon Yuen and Qiong Huang and Yi Mu and Willy Susilo and Duncan S. Wong and Guomin Yang}, editor = {Hung Q. Ngo}, title = {Efficient Non-interactive Range Proof}, booktitle = {Computing and Combinatorics, 15th Annual International Conference, {COCOON} 2009, Niagara Falls, NY, USA, July 13-15, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5609}, pages = {138--147}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02882-3\_15}, doi = {10.1007/978-3-642-02882-3\_15}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cocoon/YuenHMSWY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/SchlegelW09, author = {Roman Schlegel and Duncan S. Wong}, editor = {Dominik Slezak and Tai{-}Hoon Kim and Alan Chin{-}Chen Chang and Thanos Vasilakos and Mingchu Li and Kouichi Sakurai}, title = {Monotonically Increasing Bit Vector for Authenticated Anonymous Routing}, booktitle = {Communication and Networking - International Conference, {FGCN/ACN} 2009, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings}, series = {Communications in Computer and Information Science}, volume = {56}, pages = {89--96}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10844-0\_12}, doi = {10.1007/978-3-642-10844-0\_12}, timestamp = {Tue, 23 May 2017 01:07:31 +0200}, biburl = {https://dblp.org/rec/conf/fgit/SchlegelW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/JinWX09, author = {Haimin Jin and Duncan S. Wong and Yinlong Xu}, editor = {Dominik Slezak and Tai{-}Hoon Kim and Wai{-}Chi Fang and Kirk P. Arnett}, title = {Efficient Group Signature with Forward Secure Revocation}, booktitle = {Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings}, series = {Communications in Computer and Information Science}, volume = {58}, pages = {124--131}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10847-1\_16}, doi = {10.1007/978-3-642-10847-1\_16}, timestamp = {Tue, 23 May 2017 01:07:31 +0200}, biburl = {https://dblp.org/rec/conf/fgit/JinWX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/ThorncharoensriHSAMW09, author = {Pairat Thorncharoensri and Qiong Huang and Willy Susilo and Man Ho Au and Yi Mu and Duncan S. Wong}, editor = {Dominik Slezak and Tai{-}Hoon Kim and Wai{-}Chi Fang and Kirk P. Arnett}, title = {Escrowed Deniable Identification Schemes}, booktitle = {Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings}, series = {Communications in Computer and Information Science}, volume = {58}, pages = {234--241}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10847-1\_29}, doi = {10.1007/978-3-642-10847-1\_29}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/ThorncharoensriHSAMW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nca/XiongWD09, author = {Xiaokang Xiong and Duncan S. Wong and Xiaotie Deng}, title = {TinyPairing: Computing Tate Pairing on Sensor Nodes with Higher Speed and Less Memory}, booktitle = {Proceedings of The Eighth {IEEE} International Symposium on Networking Computing and Applications, {NCA} 2009, July 9-11, 2009, Cambridge, Massachusetts, {USA}}, pages = {187--194}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/NCA.2009.30}, doi = {10.1109/NCA.2009.30}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nca/XiongWD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SchlegelW09, author = {Roman Schlegel and Duncan S. Wong}, title = {Low Latency High Bandwidth Anonymous Overlay Network with Anonymous Routing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {294}, year = {2009}, url = {http://eprint.iacr.org/2009/294}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SchlegelW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuangWS09, author = {Qiong Huang and Duncan S. Wong and Willy Susilo}, title = {Group-Oriented Fair Exchange of Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {324}, year = {2009}, url = {http://eprint.iacr.org/2009/324}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HuangWS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuangSW09, author = {Qiong Huang and Willy Susilo and Duncan S. Wong}, title = {Non-delegatable Identity-based Designated Verifier Signature}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {367}, year = {2009}, url = {http://eprint.iacr.org/2009/367}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HuangSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuangW09, author = {Qiong Huang and Duncan S. Wong}, title = {New Constructions of Convertible Undeniable Signature Schemes without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {517}, year = {2009}, url = {http://eprint.iacr.org/2009/517}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/HuangW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuangYWS09, author = {Qiong Huang and Guomin Yang and Duncan S. Wong and Willy Susilo}, title = {Efficient Strong Designated Verifier Signature Schemes without Random Oracles or Delegatability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {518}, year = {2009}, url = {http://eprint.iacr.org/2009/518}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HuangYWS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/HuangW08, author = {Qiong Huang and Duncan S. Wong}, title = {On the relation among various security models for certificateless cryptography}, journal = {Int. J. Appl. Cryptogr.}, volume = {1}, number = {2}, pages = {108--119}, year = {2008}, url = {https://doi.org/10.1504/IJACT.2008.021084}, doi = {10.1504/IJACT.2008.021084}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijact/HuangW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/HuangLW08, author = {Qiong Huang and Dennis Y. W. Liu and Duncan S. Wong}, title = {An efficient one-move Nominative Signature scheme}, journal = {Int. J. Appl. Cryptogr.}, volume = {1}, number = {2}, pages = {133--143}, year = {2008}, url = {https://doi.org/10.1504/IJACT.2008.021086}, doi = {10.1504/IJACT.2008.021086}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijact/HuangLW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LiuW08, author = {Joseph K. Liu and Duncan S. Wong}, title = {Solutions to Key Exposure Problem in Ring Signature}, journal = {Int. J. Netw. Secur.}, volume = {6}, number = {2}, pages = {170--180}, year = {2008}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v6-n2/ijns-2008-v6-n2-p170-180.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/LiuW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isem/WangWLV08, author = {Yan Wang and Duncan S. Wong and Kwei{-}Jay Lin and Vijay Varadharajan}, title = {Evaluating transaction trust and risk levels in peer-to-peer e-commerce environments}, journal = {Inf. Syst. {E} Bus. Manag.}, volume = {6}, number = {1}, pages = {25--48}, year = {2008}, url = {https://doi.org/10.1007/s10257-007-0056-y}, doi = {10.1007/S10257-007-0056-Y}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isem/WangWLV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/YangWWD08, author = {Guomin Yang and Duncan S. Wong and Huaxiong Wang and Xiaotie Deng}, title = {Two-factor mutual authentication based on smart cards and passwords}, journal = {J. Comput. Syst. Sci.}, volume = {74}, number = {7}, pages = {1160--1172}, year = {2008}, url = {https://doi.org/10.1016/j.jcss.2008.04.002}, doi = {10.1016/J.JCSS.2008.04.002}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcss/YangWWD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/HuangWLZ08, author = {Qiong Huang and Duncan S. Wong and Jin Li and Yiming Zhao}, title = {Generic Transformation from Weakly to Strongly Unforgeable Signatures}, journal = {J. Comput. Sci. Technol.}, volume = {23}, number = {2}, pages = {240--252}, year = {2008}, url = {https://doi.org/10.1007/s11390-008-9126-y}, doi = {10.1007/S11390-008-9126-Y}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcst/HuangWLZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jucs/ChenSWWDLMMMPPS08, author = {Liqun Chen and Willy Susilo and Huaxiong Wang and Duncan S. Wong and Ed Dawson and Xuejia Lai and Masahiro Mambo and Atsuko Miyaji and Yi Mu and David Pointcheval and Bart Preneel and Nigel P. Smart}, title = {Cryptography in Computer System Security}, journal = {J. Univers. Comput. Sci.}, volume = {14}, number = {3}, pages = {314--317}, year = {2008}, url = {http://www.jucs.org/jucs\_14\_3/cryptography\_in\_computer\_system}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jucs/ChenSWWDLMMMPPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jucs/YangWD08, author = {Guomin Yang and Duncan S. Wong and Xiaotie Deng}, title = {Formal Security Definition and Efficient Construction for Roaming with a Privacy-Preserving Extension}, journal = {J. Univers. Comput. Sci.}, volume = {14}, number = {3}, pages = {441--462}, year = {2008}, url = {https://doi.org/10.3217/jucs-014-03-0441}, doi = {10.3217/JUCS-014-03-0441}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jucs/YangWD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mis/WangWW08, author = {Yan Wang and Duncan S. Wong and Huaxiong Wang}, title = {Employ a mobile agent for making a payment}, journal = {Mob. Inf. Syst.}, volume = {4}, number = {1}, pages = {51--68}, year = {2008}, url = {https://doi.org/10.1155/2008/402519}, doi = {10.1155/2008/402519}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mis/WangWW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/YangCWDW08, author = {Guomin Yang and Jing Chen and Duncan S. Wong and Xiaotie Deng and Dongsheng Wang}, title = {A new framework for the design and analysis of identity-based identification schemes}, journal = {Theor. Comput. Sci.}, volume = {407}, number = {1-3}, pages = {370--388}, year = {2008}, url = {https://doi.org/10.1016/j.tcs.2008.07.001}, doi = {10.1016/J.TCS.2008.07.001}, timestamp = {Mon, 29 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/YangCWDW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/WangW08, author = {Huaxiong Wang and Duncan S. Wong}, title = {On Secret Reconstruction in Secret Sharing Schemes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {54}, number = {1}, pages = {473--480}, year = {2008}, url = {https://doi.org/10.1109/TIT.2007.911179}, doi = {10.1109/TIT.2007.911179}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/WangW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/AuHLSWY08, author = {Man Ho Au and Qiong Huang and Joseph K. Liu and Willy Susilo and Duncan S. Wong and Guomin Yang}, editor = {Steven M. Bellovin and Rosario Gennaro and Angelos D. Keromytis and Moti Yung}, title = {Traceable and Retrievable Identity-Based Encryption}, booktitle = {Applied Cryptography and Network Security, 6th International Conference, {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5037}, pages = {94--110}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68914-0\_6}, doi = {10.1007/978-3-540-68914-0\_6}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/AuHLSWY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LiKZW08, author = {Jin Li and Kwangjo Kim and Fangguo Zhang and Duncan S. Wong}, editor = {Steven M. Bellovin and Rosario Gennaro and Angelos D. Keromytis and Moti Yung}, title = {Generic Security-Amplifying Methods of Ordinary Digital Signatures}, booktitle = {Applied Cryptography and Network Security, 6th International Conference, {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5037}, pages = {224--241}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68914-0\_14}, doi = {10.1007/978-3-540-68914-0\_14}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/LiKZW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/HuangYWS08, author = {Qiong Huang and Guomin Yang and Duncan S. Wong and Willy Susilo}, editor = {Josef Pieprzyk}, title = {Ambiguous Optimistic Fair Exchange}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5350}, pages = {74--89}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89255-7\_6}, doi = {10.1007/978-3-540-89255-7\_6}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/HuangYWS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/HuangYWS08, author = {Qiong Huang and Guomin Yang and Duncan S. Wong and Willy Susilo}, editor = {Tal Malkin}, title = {Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles}, booktitle = {Topics in Cryptology - {CT-RSA} 2008, The Cryptographers' Track at the {RSA} Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4964}, pages = {106--120}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79263-5\_7}, doi = {10.1007/978-3-540-79263-5\_7}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/HuangYWS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ChowLW08, author = {Sherman S. M. Chow and Joseph K. Liu and Duncan S. Wong}, title = {Robust Receipt-Free Election System with Ballot Secrecy and Verifiability}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2008, San Diego, California, USA, 10th February - 13th February 2008}, publisher = {The Internet Society}, year = {2008}, url = {https://www.ndss-symposium.org/ndss2008/robust-receipt-free-election-system-ballot-secrecy-and-verifiability/}, timestamp = {Mon, 01 Feb 2021 08:42:15 +0100}, biburl = {https://dblp.org/rec/conf/ndss/ChowLW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cans/2008, editor = {Matthew K. Franklin and Lucas Chi Kwong Hui and Duncan S. Wong}, title = {Cryptology and Network Security, 7th International Conference, {CANS} 2008, Hong-Kong, China, December 2-4, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5339}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89641-8}, doi = {10.1007/978-3-540-89641-8}, isbn = {978-3-540-89640-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JiangCWWD08, author = {Junjie Jiang and Jing Chen and Jian Wang and Duncan S. Wong and Xiaotie Deng}, title = {High Performance Architecture for Elliptic Curve Scalar Multiplication over GF(2\({}^{\mbox{m}}\))}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {66}, year = {2008}, url = {http://eprint.iacr.org/2008/066}, timestamp = {Thu, 21 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JiangCWWD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JinWX08, author = {Haimin Jin and Duncan S. Wong and Yinlong Xu}, title = {Complexity Analysis of a Fast Modular Multiexponentiation Algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {210}, year = {2008}, url = {http://eprint.iacr.org/2008/210}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JinWX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeungNW08, author = {Bert W. Leung and Felix Y. Ng and Duncan S. Wong}, title = {On the Security of a Visual Cryptography Scheme for Color Images}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {223}, year = {2008}, url = {http://eprint.iacr.org/2008/223}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeungNW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HuWZD07, author = {Bessie C. Hu and Duncan S. Wong and Zhenfeng Zhang and Xiaotie Deng}, title = {Certificateless signature: a new security model and an improved generic construction}, journal = {Des. Codes Cryptogr.}, volume = {42}, number = {2}, pages = {109--126}, year = {2007}, url = {https://doi.org/10.1007/s10623-006-9022-9}, doi = {10.1007/S10623-006-9022-9}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/HuWZD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/TianZW07, author = {Xiaojian Tian and Robert W. Zhu and Duncan S. Wong}, title = {Improved Efficient Remote User Authentication Schemes}, journal = {Int. J. Netw. Secur.}, volume = {4}, number = {2}, pages = {149--154}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n2/ijns-2007-v4-n2-p149-154.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/TianZW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LiuW07, author = {Joseph K. Liu and Duncan S. Wong}, title = {A More Efficient Instantiation of Witness-Indistinguishable Signature}, journal = {Int. J. Netw. Secur.}, volume = {5}, number = {2}, pages = {199--204}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v5-n2/ijns-2007-v5-n2-p199-204.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/LiuW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/LiuLMSW07, author = {Dennis Y. W. Liu and Joseph K. Liu and Yi Mu and Willy Susilo and Duncan S. Wong}, title = {Revocable Ring Signature}, journal = {J. Comput. Sci. Technol.}, volume = {22}, number = {6}, pages = {785--794}, year = {2007}, url = {https://doi.org/10.1007/s11390-007-9096-5}, doi = {10.1007/S11390-007-9096-5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcst/LiuLMSW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/ZhuYW07, author = {Robert W. Zhu and Guomin Yang and Duncan S. Wong}, title = {An efficient identity-based key exchange protocol with {KGS} forward secrecy for low-power devices}, journal = {Theor. Comput. Sci.}, volume = {378}, number = {2}, pages = {198--207}, year = {2007}, url = {https://doi.org/10.1016/j.tcs.2007.02.021}, doi = {10.1016/J.TCS.2007.02.021}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/ZhuYW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/twc/YangWD07, author = {Guomin Yang and Duncan S. Wong and Xiaotie Deng}, title = {Anonymous and Authenticated Key Exchange for Roaming Networks}, journal = {{IEEE} Trans. Wirel. Commun.}, volume = {6}, number = {9}, pages = {3461--3472}, year = {2007}, url = {https://doi.org/10.1109/TWC.2007.06020042}, doi = {10.1109/TWC.2007.06020042}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/twc/YangWD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HuangW07, author = {Qiong Huang and Duncan S. Wong}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Generic Certificateless Key Encapsulation Mechanism}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {215--229}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_17}, doi = {10.1007/978-3-540-73458-1\_17}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/HuangW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HuangMSWW07, author = {Xinyi Huang and Yi Mu and Willy Susilo and Duncan S. Wong and Wei Wu}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Certificateless Signature Revisited}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {308--322}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_23}, doi = {10.1007/978-3-540-73458-1\_23}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HuangMSWW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/HuangWZ07, author = {Qiong Huang and Duncan S. Wong and Yiming Zhao}, editor = {Jonathan Katz and Moti Yung}, title = {Generic Transformation to Strongly Unforgeable Signatures}, booktitle = {Applied Cryptography and Network Security, 5th International Conference, {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4521}, pages = {1--17}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72738-5\_1}, doi = {10.1007/978-3-540-72738-5\_1}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/HuangWZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/YangCWDW07, author = {Guomin Yang and Jing Chen and Duncan S. Wong and Xiaotie Deng and Dongsheng Wang}, editor = {Jonathan Katz and Moti Yung}, title = {A More Natural Way to Construct Identity-Based Identification Schemes}, booktitle = {Applied Cryptography and Network Security, 5th International Conference, {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4521}, pages = {307--322}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72738-5\_20}, doi = {10.1007/978-3-540-72738-5\_20}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/YangCWDW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/GuoWWH07, author = {Lifeng Guo and Guilin Wang and Duncan S. Wong and Lei Hu}, editor = {Selim Aissi and Hamid R. Arabnia}, title = {Further Discussions on the Security of a Nominative Signature Scheme}, booktitle = {Proceedings of the 2007 International Conference on Security {\&} Management, {SAM} 2007, Las Vegas, Nevada, USA, June 25-28, 2007}, pages = {566--572}, publisher = {{CSREA} Press}, year = {2007}, timestamp = {Wed, 12 Dec 2007 16:45:17 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/GuoWWH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/LiYWDC07, author = {Chung Ki Li and Guomin Yang and Duncan S. Wong and Xiaotie Deng and Sherman S. M. Chow}, editor = {Javier L{\'{o}}pez and Pierangela Samarati and Josep L. Ferrer}, title = {An Efficient Signcryption Scheme with Key Privacy}, booktitle = {Public Key Infrastructure, 4th European {PKI} Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4582}, pages = {78--93}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73408-6\_6}, doi = {10.1007/978-3-540-73408-6\_6}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/europki/LiYWDC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/HuWHYD07, author = {Bessie C. Hu and Duncan S. Wong and Qiong Huang and Guomin Yang and Xiaotie Deng}, editor = {Javier L{\'{o}}pez and Pierangela Samarati and Josep L. Ferrer}, title = {Time Capsule Signature: Efficient and Provably Secure Constructions}, booktitle = {Public Key Infrastructure, 4th European {PKI} Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4582}, pages = {126--142}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73408-6\_9}, doi = {10.1007/978-3-540-73408-6\_9}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/europki/HuWHYD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/ChowW07, author = {Sherman S. M. Chow and Duncan S. Wong}, editor = {Javier L{\'{o}}pez and Pierangela Samarati and Josep L. Ferrer}, title = {Anonymous Identification and Designated-Verifiers Signatures from Insecure Batch Verification}, booktitle = {Public Key Infrastructure, 4th European {PKI} Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4582}, pages = {203--219}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73408-6\_15}, doi = {10.1007/978-3-540-73408-6\_15}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/europki/ChowW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icebe/WangWLV07, author = {Yan Wang and Duncan S. Wong and Kwei{-}Jay Lin and Vijay Varadharajan}, editor = {S. C. Cheung and Yinsheng Li and Kuo{-}Ming Chao and Muhammad Younas and Jen{-}Yao Chung}, title = {The Design of {A} Rule-based and Event-driven Trust Management Framework}, booktitle = {Proceedings of {ICEBE} 2007, {IEEE} International Conference on e-Business Engineering and the Workshops {SOAIC} 2007, {SOSE} 2007, {SOKM} 2007, 24-26 October, 2007, Hong Kong, China}, pages = {97--104}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICEBE.2007.28}, doi = {10.1109/ICEBE.2007.28}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icebe/WangWLV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/JinWX07, author = {Haimin Jin and Duncan S. Wong and Yinlong Xu}, editor = {Sihan Qing and Hideki Imai and Guilin Wang}, title = {An Efficient Password-Only Two-Server Authenticated Key Exchange System}, booktitle = {Information and Communications Security, 9th International Conference, {ICICS} 2007, Zhengzhou, China, December 12-15, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4861}, pages = {44--56}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77048-0\_4}, doi = {10.1007/978-3-540-77048-0\_4}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/JinWX07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LiuWHWHMS07, author = {Dennis Y. W. Liu and Duncan S. Wong and Xinyi Huang and Guilin Wang and Qiong Huang and Yi Mu and Willy Susilo}, editor = {Sihan Qing and Hideki Imai and Guilin Wang}, title = {Formal Definition and Construction of Nominative Signature}, booktitle = {Information and Communications Security, 9th International Conference, {ICICS} 2007, Zhengzhou, China, December 12-15, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4861}, pages = {57--68}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77048-0\_5}, doi = {10.1007/978-3-540-77048-0\_5}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/LiuWHWHMS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/HuangW07, author = {Qiong Huang and Duncan S. Wong}, editor = {Atsuko Miyaji and Hiroaki Kikuchi and Kai Rannenberg}, title = {Generic Certificateless Encryption in the Standard Model}, booktitle = {Advances in Information and Computer Security, Second International Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4752}, pages = {278--291}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75651-4\_19}, doi = {10.1007/978-3-540-75651-4\_19}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/HuangW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/LiuCWM07, author = {Dennis Y. W. Liu and Shuang Chang and Duncan S. Wong and Yi Mu}, editor = {Atsuko Miyaji and Hiroaki Kikuchi and Kai Rannenberg}, title = {Nominative Signature from Ring Signature}, booktitle = {Advances in Information and Computer Security, Second International Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4752}, pages = {396--411}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75651-4\_27}, doi = {10.1007/978-3-540-75651-4\_27}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/LiuCWM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/WangBWB07, author = {Guilin Wang and Joonsang Baek and Duncan S. Wong and Feng Bao}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {43--60}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_4}, doi = {10.1007/978-3-540-71677-8\_4}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/WangBWB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/LiuCW07, author = {Dennis Y. W. Liu and Shuang Chang and Duncan S. Wong}, editor = {Javier Hernando and Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek}, title = {A More Efficient Convertible Nominative Signature}, booktitle = {{SECRYPT} 2007, Proceedings of the International Conference on Security and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {214--221}, publisher = {{INSTICC} Press}, year = {2007}, timestamp = {Fri, 04 Sep 2009 13:27:09 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/LiuCW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ispec/2007, editor = {Ed Dawson and Duncan S. Wong}, title = {Information Security Practice and Experience, Third International Conference, {ISPEC} 2007, Hong Kong, China, May 7-9, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4464}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72163-5}, doi = {10.1007/978-3-540-72163-5}, isbn = {978-3-540-72159-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuWHWHMS07, author = {Dennis Y. W. Liu and Duncan S. Wong and Xinyi Huang and Guilin Wang and Qiong Huang and Yi Mu and Willy Susilo}, title = {Nominative Signature: Application, Security Model and Construction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {69}, year = {2007}, url = {http://eprint.iacr.org/2007/069}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuWHWHMS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuangW07, author = {Qiong Huang and Duncan S. Wong}, title = {Generic Certificateless Encryption in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {95}, year = {2007}, url = {http://eprint.iacr.org/2007/095}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/HuangW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuWHYD07, author = {Bessie C. Hu and Duncan S. Wong and Qiong Huang and Guomin Yang and Xiaotie Deng}, title = {Time Capsule Signature: Efficient and Provably Secure Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {146}, year = {2007}, url = {http://eprint.iacr.org/2007/146}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HuWHYD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuHW07, author = {Dennis Y. W. Liu and Qiong Huang and Duncan S. Wong}, title = {An Efficient One-move Nominative Signature Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {260}, year = {2007}, url = {http://eprint.iacr.org/2007/260}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LiuHW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YangWHD07, author = {Guomin Yang and Duncan S. Wong and Qiong Huang and Xiaotie Deng}, title = {A New Security Definition for Public Key Encryption Schemes and Its Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {319}, year = {2007}, url = {http://eprint.iacr.org/2007/319}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YangWHD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LongPWW06, author = {Shoulun Long and Josef Pieprzyk and Huaxiong Wang and Duncan S. Wong}, title = {Generalised Cumulative Arrays in Secret Sharing}, journal = {Des. Codes Cryptogr.}, volume = {40}, number = {2}, pages = {191--209}, year = {2006}, url = {https://doi.org/10.1007/s10623-006-0007-5}, doi = {10.1007/S10623-006-0007-5}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LongPWW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/ZhuWL06, author = {Robert W. Zhu and Duncan S. Wong and Chan H. Lee}, title = {Cryptanalysis of a suite of deniable authentication protocols}, journal = {{IEEE} Commun. Lett.}, volume = {10}, number = {6}, pages = {504--506}, year = {2006}, url = {https://doi.org/10.1109/LCOMM.2006.1638630}, doi = {10.1109/LCOMM.2006.1638630}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icl/ZhuWL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijfcs/Safavi-NainiWW06, author = {Reihaneh Safavi{-}Naini and Huaxiong Wang and Duncan S. Wong}, title = {Resilient Lkh: Secure Multicast Key Distribution Schemes}, journal = {Int. J. Found. Comput. Sci.}, volume = {17}, number = {5}, pages = {1205--1222}, year = {2006}, url = {https://doi.org/10.1142/S0129054106004340}, doi = {10.1142/S0129054106004340}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijfcs/Safavi-NainiWW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijfcs/LiuW06, author = {Joseph K. Liu and Duncan S. Wong}, title = {Enhanced Security Models and a Generic Construction Approach for Linkable Ring Signature}, journal = {Int. J. Found. Comput. Sci.}, volume = {17}, number = {6}, pages = {1403--1422}, year = {2006}, url = {https://doi.org/10.1142/S0129054106004480}, doi = {10.1142/S0129054106004480}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijfcs/LiuW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HuWZD06, author = {Bessie C. Hu and Duncan S. Wong and Zhenfeng Zhang and Xiaotie Deng}, editor = {Lynn Margaret Batten and Reihaneh Safavi{-}Naini}, title = {Key Replacement Attack Against a Generic Construction of Certificateless Signature}, booktitle = {Information Security and Privacy, 11th Australasian Conference, {ACISP} 2006, Melbourne, Australia, July 3-5, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4058}, pages = {235--246}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11780656\_20}, doi = {10.1007/11780656\_20}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HuWZD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ZhangWXF06, author = {Zhenfeng Zhang and Duncan S. Wong and Jing Xu and Dengguo Feng}, editor = {Jianying Zhou and Moti Yung and Feng Bao}, title = {Certificateless Public-Key Signature: Security Model and Efficient Construction}, booktitle = {Applied Cryptography and Network Security, 4th International Conference, {ACNS} 2006, Singapore, June 6-9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3989}, pages = {293--308}, year = {2006}, url = {https://doi.org/10.1007/11767480\_20}, doi = {10.1007/11767480\_20}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/ZhangWXF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/TianW06, author = {Xiaojian Tian and Duncan S. Wong}, editor = {David Pointcheval}, title = {Session Corruption Attack and Improvements on Encryption Based MT-Authenticators}, booktitle = {Topics in Cryptology - {CT-RSA} 2006, The Cryptographers' Track at the {RSA} Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3860}, pages = {34--51}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11605805\_3}, doi = {10.1007/11605805\_3}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/TianW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/YangWWD06, author = {Guomin Yang and Duncan S. Wong and Huaxiong Wang and Xiaotie Deng}, editor = {Peng Ning and Sihan Qing and Ninghui Li}, title = {Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper)}, booktitle = {Information and Communications Security, 8th International Conference, {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4307}, pages = {82--91}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935308\_7}, doi = {10.1007/11935308\_7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/YangWWD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/AuLYW06, author = {Man Ho Au and Joseph K. Liu and Tsz Hon Yuen and Duncan S. Wong}, editor = {Hiroshi Yoshiura and Kouichi Sakurai and Kai Rannenberg and Yuko Murayama and Shin{-}ichi Kawamura}, title = {ID-Based Ring Signature Scheme Secure in the Standard Model}, booktitle = {Advances in Information and Computer Security, First International Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4266}, pages = {1--16}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11908739\_1}, doi = {10.1007/11908739\_1}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/AuLYW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/LiuSW06, author = {Joseph K. Liu and Willy Susilo and Duncan S. Wong}, editor = {Hiroshi Yoshiura and Kouichi Sakurai and Kai Rannenberg and Yuko Murayama and Shin{-}ichi Kawamura}, title = {Ring Signature with Designated Linkability}, booktitle = {Advances in Information and Computer Security, First International Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4266}, pages = {104--119}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11908739\_8}, doi = {10.1007/11908739\_8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/LiuSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/YangWDW06, author = {Guomin Yang and Duncan S. Wong and Xiaotie Deng and Huaxiong Wang}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {Anonymous Signature Schemes}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {347--363}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_23}, doi = {10.1007/11745853\_23}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/YangWDW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoWW06, author = {Lifeng Guo and Guilin Wang and Duncan S. Wong}, title = {Further Discussions on the Security of a Nominative Signature Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {7}, year = {2006}, url = {http://eprint.iacr.org/2006/007}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuoWW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AuCLMWY06, author = {Man Ho Au and Jing Chen and Joseph K. Liu and Yi Mu and Duncan S. Wong and Guomin Yang}, title = {Malicious {KGC} Attacks in Certificateless Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {255}, year = {2006}, url = {http://eprint.iacr.org/2006/255}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AuCLMWY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YangWWD06, author = {Guomin Yang and Duncan S. Wong and Huaxiong Wang and Xiaotie Deng}, title = {Formal Analysis and Systematic Construction of Two-factor Authentication Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {270}, year = {2006}, url = {http://eprint.iacr.org/2006/270}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YangWWD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuangWZ06, author = {Qiong Huang and Duncan S. Wong and Yiming Zhao}, title = {Generic Transformation to Strongly Unforgeable Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {346}, year = {2006}, url = {http://eprint.iacr.org/2006/346}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/HuangWZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AuLYW06a, author = {Man Ho Au and Joseph K. Liu and Tsz Hon Yuen and Duncan S. Wong}, title = {Practical Hierarchical Identity Based Encryption and Signature schemes Without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {368}, year = {2006}, url = {http://eprint.iacr.org/2006/368}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AuLYW06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/TianWZ05, author = {Xiaojian Tian and Duncan S. Wong and Robert W. Zhu}, title = {Analysis and improvement of an authenticated key exchange protocol for sensor networks}, journal = {{IEEE} Commun. Lett.}, volume = {9}, number = {11}, pages = {970--972}, year = {2005}, url = {https://doi.org/10.1109/LCOMM.2005.11006}, doi = {10.1109/LCOMM.2005.11006}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icl/TianWZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YangWD05, author = {Guomin Yang and Duncan S. Wong and Xiaotie Deng}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Deposit-Case Attack Against Secure Roaming}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {417--428}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_35}, doi = {10.1007/11506157\_35}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YangWD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/YangWD05, author = {Guomin Yang and Duncan S. Wong and Xiaotie Deng}, editor = {John Ioannidis and Angelos D. Keromytis and Moti Yung}, title = {Efficient Anonymous Roaming and Its Security Analysis}, booktitle = {Applied Cryptography and Network Security, Third International Conference, {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3531}, pages = {334--349}, year = {2005}, url = {https://doi.org/10.1007/11496137\_23}, doi = {10.1007/11496137\_23}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/YangWD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/WongW05, author = {Jonathan Wong and Duncan S. Wong}, editor = {Hamid R. Arabnia}, title = {Known Session Key Attack Against a Collection of Signcryption Schemes}, booktitle = {Proceedings of The 2005 International Conference on Security and Management, {SAM} 2005, Las Vegas, Nevada, USA, June 20-23, 2005}, pages = {119--126}, publisher = {{CSREA} Press}, year = {2005}, timestamp = {Wed, 06 Dec 2006 10:55:26 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/WongW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/LiuTW05, author = {Joseph K. Liu and Patrick P. Tsang and Duncan S. Wong}, editor = {Refik Molva and Gene Tsudik and Dirk Westhoff}, title = {Efficient Verifiable Ring Encryption for Ad Hoc Groups}, booktitle = {Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, {ESAS} 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3813}, pages = {1--13}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11601494\_1}, doi = {10.1007/11601494\_1}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/esas/LiuTW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/LiuTW05, author = {Joseph K. Liu and Patrick P. Tsang and Duncan S. Wong}, editor = {David W. Chadwick and Gansen Zhao}, title = {Recoverable and Untraceable E-Cash}, booktitle = {Public Key Infrastructure, Second European {PKI} Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3545}, pages = {206--214}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11533733\_14}, doi = {10.1007/11533733\_14}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/europki/LiuTW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/LiuW05, author = {Joseph K. Liu and Duncan S. Wong}, editor = {Osvaldo Gervasi and Marina L. Gavrilova and Vipin Kumar and Antonio Lagan{\`{a}} and Heow Pueh Lee and Youngsong Mun and David Taniar and Chih Jeng Kenneth Tan}, title = {Linkable Ring Signatures: Security Models and New Schemes}, booktitle = {Computational Science and Its Applications - {ICCSA} 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3481}, pages = {614--623}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11424826\_65}, doi = {10.1007/11424826\_65}, timestamp = {Thu, 28 Apr 2022 16:17:38 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/LiuW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/LiuTWZ05, author = {Joseph K. Liu and Patrick P. Tsang and Duncan S. Wong and Robert W. Zhu}, editor = {Dongho Won and Seungjoo Kim}, title = {Universal Custodian-Hiding Verifiable Encryption for Discrete Logarithms}, booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3935}, pages = {389--409}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11734727\_31}, doi = {10.1007/11734727\_31}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/LiuTWZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icn/WongCZ05, author = {Duncan S. Wong and Agnes Hui Chan and Feng Zhu}, editor = {Pascal Lorenz and Petre Dini}, title = {Password Authenticated Key Exchange for Resource-Constrained Wireless Communications (Extended Abstract)}, booktitle = {Networking - {ICN} 2005, 4th International Conference on Networking, ReunionIsland, France, April 17-21, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3421}, pages = {827--834}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31957-3\_93}, doi = {10.1007/978-3-540-31957-3\_93}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/icn/WongCZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LiuW05, author = {Joseph K. Liu and Duncan S. Wong}, editor = {Robert H. Deng and Feng Bao and HweeHwa Pang and Jianying Zhou}, title = {A Restricted Multi-show Credential System and Its Application on E-Voting}, booktitle = {Information Security Practice and Experience, First International Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3439}, pages = {268--279}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31979-5\_23}, doi = {10.1007/978-3-540-31979-5\_23}, timestamp = {Wed, 25 Sep 2019 18:12:57 +0200}, biburl = {https://dblp.org/rec/conf/ispec/LiuW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/YangWD05, author = {Guomin Yang and Duncan S. Wong and Xiaotie Deng}, editor = {Jianying Zhou and Javier L{\'{o}}pez and Robert H. Deng and Feng Bao}, title = {Analysis and Improvement of a Signcryption Scheme with Key Privacy}, booktitle = {Information Security, 8th International Conference, {ISC} 2005, Singapore, September 20-23, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3650}, pages = {218--232}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11556992\_16}, doi = {10.1007/11556992\_16}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/YangWD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/Wong05, author = {Duncan S. Wong}, title = {Security Analysis of Two Anonymous Authentication Protocols for Distributed Wireless Networks}, booktitle = {3rd {IEEE} Conference on Pervasive Computing and Communications Workshops (PerCom 2005 Workshops), 8-12 March 2005, Kauai Island, HI, {USA}}, pages = {284--288}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/PERCOMW.2005.70}, doi = {10.1109/PERCOMW.2005.70}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/Wong05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/LiuWW05, author = {Joseph K. Liu and Sandy H. Wong and Duncan S. Wong}, editor = {Ry{\^{o}}ichi Sasaki and Sihan Qing and Eiji Okamoto and Hiroshi Yoshiura}, title = {Transferable E-Cash Revisit}, booktitle = {Security and Privacy in the Age of Ubiquitous Computing, {IFIP} {TC11} 20th International Conference on Information Security {(SEC} 2005), May 30 - June 1, 2005, Chiba, Japan}, series = {{IFIP}}, volume = {181}, pages = {171--188}, publisher = {Springer}, year = {2005}, timestamp = {Fri, 19 May 2017 01:25:10 +0200}, biburl = {https://dblp.org/rec/conf/sec/LiuWW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wine/ZhuYW05, author = {Robert W. Zhu and Guomin Yang and Duncan S. Wong}, editor = {Xiaotie Deng and Yinyu Ye}, title = {An Efficient Identity-Based Key Exchange Protocol with {KGS} Forward Secrecy for Low-Power Devices}, booktitle = {Internet and Network Economics, First International Workshop, {WINE} 2005, Hong Kong, China, December 15-17, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3828}, pages = {500--509}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11600930\_50}, doi = {10.1007/11600930\_50}, timestamp = {Sun, 18 Dec 2022 19:02:44 +0100}, biburl = {https://dblp.org/rec/conf/wine/ZhuYW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TsangALSW05, author = {Patrick P. Tsang and Man Ho Au and Joseph K. Liu and Willy Susilo and Duncan S. Wong}, title = {A Suite of Non-Pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {326}, year = {2005}, url = {http://eprint.iacr.org/2005/326}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TsangALSW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YangWDW05, author = {Guomin Yang and Duncan S. Wong and Xiaotie Deng and Huaxiong Wang}, title = {Anonymous Signature Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {407}, year = {2005}, url = {http://eprint.iacr.org/2005/407}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YangWDW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuW05, author = {Joseph K. Liu and Duncan S. Wong}, title = {Solutions to Key Exposure Problem in Ring Signature}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {427}, year = {2005}, url = {http://eprint.iacr.org/2005/427}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhuTW05, author = {Robert W. Zhu and Xiaojian Tian and Duncan S. Wong}, title = {Enhancing CK-Model for Key Compromise Impersonation Resilience and Identity-based Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {455}, year = {2005}, url = {http://eprint.iacr.org/2005/455}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhuTW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiuWW04, author = {Joseph K. Liu and Victor K. Wei and Duncan S. Wong}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (Extended Abstract)}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {325--335}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_28}, doi = {10.1007/978-3-540-27800-9\_28}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LiuWW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/LiuW04, author = {Joseph K. Liu and Duncan S. Wong}, editor = {Choonsik Park and Seongtaek Chee}, title = {On the Security Models of (Threshold) Ring Signature Schemes}, booktitle = {Information Security and Cryptology - {ICISC} 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3506}, pages = {204--217}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11496618\_16}, doi = {10.1007/11496618\_16}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/LiuW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/TsangWCALW04, author = {Patrick P. Tsang and Victor K. Wei and Tony K. Chan and Man Ho Au and Joseph K. Liu and Duncan S. Wong}, editor = {Anne Canteaut and Kapalee Viswanathan}, title = {Separable Linkable Threshold Ring Signatures}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2004, 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3348}, pages = {384--398}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30556-9\_30}, doi = {10.1007/978-3-540-30556-9\_30}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/TsangWCALW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LiuWW04, author = {Joseph K. Liu and Victor K. Wei and Duncan S. Wong}, editor = {Chae Hoon Lim and Moti Yung}, title = {Custodian-Hiding Verifiable Encryption}, booktitle = {Information Security Applications, 5th International Workshop, {WISA} 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3325}, pages = {51--64}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-31815-6\_5}, doi = {10.1007/978-3-540-31815-6\_5}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LiuWW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuWW04, author = {Joseph K. Liu and Victor K. Wei and Duncan S. Wong}, title = {Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {27}, year = {2004}, url = {http://eprint.iacr.org/2004/027}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuWW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuWW04a, author = {Joseph K. Liu and Victor K. Wei and Duncan S. Wong}, title = {Custodian-Hiding Verifiable Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {28}, year = {2004}, url = {http://eprint.iacr.org/2004/028}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuWW04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TsangWCALW04, author = {Patrick P. Tsang and Victor K. Wei and Tony K. Chan and Man Ho Au and Joseph K. Liu and Duncan S. Wong}, title = {Separable Linkable Threshold Ring Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {267}, year = {2004}, url = {http://eprint.iacr.org/2004/267}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TsangWCALW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/WongFLW03, author = {Duncan S. Wong and Karyin Fung and Joseph K. Liu and Victor K. Wei}, editor = {Sihan Qing and Dieter Gollmann and Jianying Zhou}, title = {On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of {RST}}, booktitle = {Information and Communications Security, 5th International Conference, {ICICS} 2003, Huhehaote, China, October 10-13, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2836}, pages = {34--46}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39927-8\_4}, doi = {10.1007/978-3-540-39927-8\_4}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/icics/WongFLW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/LiuWW03, author = {Joseph K. Liu and Victor K. Wei and Duncan S. Wong}, editor = {Jong In Lim and Dong Hoon Lee}, title = {A Separable Threshold Ring Signature Scheme}, booktitle = {Information Security and Cryptology - {ICISC} 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2971}, pages = {12--26}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24691-6\_2}, doi = {10.1007/978-3-540-24691-6\_2}, timestamp = {Thu, 17 Nov 2022 14:05:51 +0100}, biburl = {https://dblp.org/rec/conf/icisc/LiuWW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/WongCZ03, author = {Duncan S. Wong and Agnes Hui Chan and Feng Zhu}, editor = {Thomas Johansson and Subhamoy Maitra}, title = {More Efficient Password Authenticated Key Exchange Based on {RSA}}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2003, 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2904}, pages = {375--387}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24582-7\_28}, doi = {10.1007/978-3-540-24582-7\_28}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/WongCZ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigmobile/Wong02, author = {Duncan S. Wong}, title = {An optimized authentication protocol for mobile network reconsidered}, journal = {{ACM} {SIGMOBILE} Mob. Comput. Commun. Rev.}, volume = {6}, number = {4}, pages = {74--76}, year = {2002}, url = {https://doi.org/10.1145/643550.643562}, doi = {10.1145/643550.643562}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigmobile/Wong02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/ZhuWCY02, author = {Feng Zhu and Duncan S. Wong and Agnes Hui Chan and Robbie Ye}, editor = {Agnes Hui Chan and Virgil D. Gligor}, title = {Password Authenticated Key Exchange Based on {RSA} for Imbalanced Wireless Networks}, booktitle = {Information Security, 5th International Conference, {ISC} 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2433}, pages = {150--161}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45811-5\_11}, doi = {10.1007/3-540-45811-5\_11}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/ZhuWCY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WongFC01, author = {Duncan S. Wong and Hector Ho Fuentes and Agnes Hui Chan}, title = {The Performance Measurement of Cryptographic Primitives on Palm Devices}, booktitle = {17th Annual Computer Security Applications Conference {(ACSAC} 2001), 11-14 December 2001, New Orleans, Louisiana, {USA}}, pages = {92--101}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ACSAC.2001.991525}, doi = {10.1109/ACSAC.2001.991525}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WongFC01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/WongC01, author = {Duncan S. Wong and Agnes Hui Chan}, editor = {Colin Boyd}, title = {Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2248}, pages = {272--289}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45682-1\_17}, doi = {10.1007/3-540-45682-1\_17}, timestamp = {Tue, 01 Jun 2021 15:22:33 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/WongC01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.