BibTeX records: Duncan S. Wong

download as .bib file

@article{DBLP:journals/ett/HuangHWZYWH24,
  author       = {Jiahui Huang and
                  Teng Huang and
                  Huanchun Wei and
                  Jiehua Zhang and
                  Hongyang Yan and
                  Duncan S. Wong and
                  Haibo Hu},
  title        = {zkChain: {A} privacy-preserving model based on zk-SNARKs and hash
                  chain for efficient transfer of assets},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {35},
  number       = {4},
  year         = {2024},
  url          = {https://doi.org/10.1002/ett.4709},
  doi          = {10.1002/ETT.4709},
  timestamp    = {Tue, 16 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ett/HuangHWZYWH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aisp/ChengZPWHZWD23,
  author       = {Xingjiang Cheng and
                  Fuxing Zhang and
                  Yun Peng and
                  Xianmin Wang and
                  Teng Huang and
                  Ziye Zhou and
                  Duncan S. Wong and
                  Changyu Dong},
  editor       = {Jaideep Vaidya and
                  Moncef Gabbouj and
                  Jin Li},
  title        = {A Survey of Privacy Preserving Subgraph Matching Methods},
  booktitle    = {Artificial Intelligence Security and Privacy - First International
                  Conference on Artificial Intelligence Security and Privacy, AIS{\&}P
                  2023, Guangzhou, China, December 3-5, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14509},
  pages        = {98--113},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-9785-5\_8},
  doi          = {10.1007/978-981-99-9785-5\_8},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aisp/ChengZPWHZWD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aisp/YangYFDPWW23,
  author       = {Ruilin Yang and
                  Hui Yang and
                  Jiluan Fan and
                  Changyu Dong and
                  Yan Pang and
                  Duncan S. Wong and
                  Shaowei Wang},
  editor       = {Jaideep Vaidya and
                  Moncef Gabbouj and
                  Jin Li},
  title        = {Personalized Differential Privacy in the Shuffle Model},
  booktitle    = {Artificial Intelligence Security and Privacy - First International
                  Conference on Artificial Intelligence Security and Privacy, AIS{\&}P
                  2023, Guangzhou, China, December 3-5, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14509},
  pages        = {468--482},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-9785-5\_33},
  doi          = {10.1007/978-981-99-9785-5\_33},
  timestamp    = {Sun, 03 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aisp/YangYFDPWW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijis/YangZZCWL22,
  author       = {Jie Yang and
                  Jun Zheng and
                  Zheng Zhang and
                  Q. I. Chen and
                  Duncan S. Wong and
                  Yuanzhang Li},
  title        = {Security of federated learning for cloud-edge intelligence collaborative
                  computing},
  journal      = {Int. J. Intell. Syst.},
  volume       = {37},
  number       = {11},
  pages        = {9290--9308},
  year         = {2022},
  url          = {https://doi.org/10.1002/int.22992},
  doi          = {10.1002/INT.22992},
  timestamp    = {Wed, 06 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijis/YangZZCWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijis/KoeCTAYZW22,
  author       = {Arthur Sandor Voundi Koe and
                  Qi Chen and
                  Juan Tang and
                  Shan Ai and
                  Hongyang Yan and
                  Shiwen Zhang and
                  Duncan S. Wong},
  title        = {Outsourcing multiauthority access control revocation and computations
                  over medical data to mobile cloud},
  journal      = {Int. J. Intell. Syst.},
  volume       = {37},
  number       = {11},
  pages        = {9774--9797},
  year         = {2022},
  url          = {https://doi.org/10.1002/int.23009},
  doi          = {10.1002/INT.23009},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijis/KoeCTAYZW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiuYWNWKL22,
  author       = {Zhen Liu and
                  Guomin Yang and
                  Duncan S. Wong and
                  Khoa Nguyen and
                  Huaxiong Wang and
                  Xiaorong Ke and
                  Yining Liu},
  title        = {Secure Deterministic Wallet and Stealth Address: Key-Insulated and
                  Privacy-Preserving Signature Scheme With Publicly Derived Public Key},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {5},
  pages        = {2934--2951},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2021.3078463},
  doi          = {10.1109/TDSC.2021.3078463},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiuYWNWKL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/LiuHW21,
  author       = {Zhen Liu and
                  Qiong Huang and
                  Duncan S. Wong},
  title        = {On Enabling Attribute-Based Encryption to Be Traceable Against Traitors},
  journal      = {Comput. J.},
  volume       = {64},
  number       = {4},
  pages        = {575--598},
  year         = {2021},
  url          = {https://doi.org/10.1093/comjnl/bxaa082},
  doi          = {10.1093/COMJNL/BXAA082},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/LiuHW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/YangXWZW21,
  author       = {Anjia Yang and
                  Jia Xu and
                  Jian Weng and
                  Jianying Zhou and
                  Duncan S. Wong},
  title        = {Lightweight and Privacy-Preserving Delegatable Proofs of Storage with
                  Data Dynamics in Cloud Storage},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {9},
  number       = {1},
  pages        = {212--225},
  year         = {2021},
  url          = {https://doi.org/10.1109/TCC.2018.2851256},
  doi          = {10.1109/TCC.2018.2851256},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/YangXWZW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/PhanABCDGGHKLLM20,
  author       = {Raphael C.{-}W. Phan and
                  Masayuki Abe and
                  Lynn Batten and
                  Jung Hee Cheon and
                  Ed Dawson and
                  Steven D. Galbraith and
                  Jian Guo and
                  Lucas C. K. Hui and
                  Kwangjo Kim and
                  Xuejia Lai and
                  Dong Hoon Lee and
                  Mitsuru Matsui and
                  Tsutomu Matsumoto and
                  Shiho Moriai and
                  Phong Q. Nguyen and
                  Dingyi Pei and
                  Duong Hieu Phan and
                  Josef Pieprzyk and
                  Huaxiong Wang and
                  Hank Wolfe and
                  Duncan S. Wong and
                  Tzong{-}Chen Wu and
                  Bo{-}Yin Yang and
                  Siu{-}Ming Yiu and
                  Yu Yu and
                  Jianying Zhou},
  title        = {Advances in security research in the Asiacrypt region},
  journal      = {Commun. {ACM}},
  volume       = {63},
  number       = {4},
  pages        = {76--81},
  year         = {2020},
  url          = {https://doi.org/10.1145/3378428},
  doi          = {10.1145/3378428},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/PhanABCDGGHKLLM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/XuGSZLWW20,
  author       = {Guangquan Xu and
                  Bingjiang Guo and
                  Chunhua Su and
                  Xi Zheng and
                  Kaitai Liang and
                  Duncan S. Wong and
                  Hao Wang},
  title        = {Am {I} eclipsed? {A} smart detector of eclipse attacks for Ethereum},
  journal      = {Comput. Secur.},
  volume       = {88},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2019.101604},
  doi          = {10.1016/J.COSE.2019.101604},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/XuGSZLWW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tetc/ZhuangYHWY20,
  author       = {Yunhui Zhuang and
                  Anjia Yang and
                  Gerhard P. Hancke and
                  Duncan S. Wong and
                  Guomin Yang},
  title        = {Energy-Efficient Distance-Bounding with Residual Charge Computation},
  journal      = {{IEEE} Trans. Emerg. Top. Comput.},
  volume       = {8},
  number       = {2},
  pages        = {365--376},
  year         = {2020},
  url          = {https://doi.org/10.1109/TETC.2017.2761702},
  doi          = {10.1109/TETC.2017.2761702},
  timestamp    = {Wed, 15 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tetc/ZhuangYHWY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/JLCMR2020/LinMLW20,
  author       = {Zhi Lin and
                  Weizhi Meng and
                  Wenjuan Li and
                  Duncan S. Wong},
  editor       = {Richard Jiang and
                  Chang{-}Tsun Li and
                  Danny Crookes and
                  Weizhi Meng and
                  Christophe Rosenberger},
  title        = {Developing Cloud-Based Intelligent Touch Behavioral Authentication
                  on Mobile Phones},
  booktitle    = {Deep Biometrics},
  series       = {Unsupervised and Semi-Supervised Learning},
  pages        = {141--159},
  publisher    = {Springer International Publishing},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-32583-1\_7},
  doi          = {10.1007/978-3-030-32583-1\_7},
  timestamp    = {Sat, 09 Apr 2022 12:20:04 +0200},
  biburl       = {https://dblp.org/rec/books/sp/JLCMR2020/LinMLW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/LiuNYWW19,
  author       = {Zhen Liu and
                  Khoa Nguyen and
                  Guomin Yang and
                  Huaxiong Wang and
                  Duncan S. Wong},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {A Lattice-Based Linkable Ring Signature Supporting Stealth Addresses},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {726--746},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_35},
  doi          = {10.1007/978-3-030-29959-0\_35},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/LiuNYWW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/LiuYWNW19,
  author       = {Zhen Liu and
                  Guomin Yang and
                  Duncan S. Wong and
                  Khoa Nguyen and
                  Huaxiong Wang},
  title        = {Key-Insulated and Privacy-Preserving Signature Scheme with Publicly
                  Derived Public Key},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2019, Stockholm, Sweden, June 17-19, 2019},
  pages        = {215--230},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EuroSP.2019.00025},
  doi          = {10.1109/EUROSP.2019.00025},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosp/LiuYWNW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/YangZWHWY18,
  author       = {Anjia Yang and
                  Yunhui Zhuang and
                  Jian Weng and
                  Gerhard P. Hancke and
                  Duncan S. Wong and
                  Guomin Yang},
  title        = {Exploring relationship between indistinguishability-based and unpredictability-based
                  {RFID} privacy models},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {82},
  pages        = {315--326},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.future.2017.12.044},
  doi          = {10.1016/J.FUTURE.2017.12.044},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/YangZWHWY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LiCCHWL18,
  author       = {Jin Li and
                  Xiaofeng Chen and
                  Sherman S. M. Chow and
                  Qiong Huang and
                  Duncan S. Wong and
                  Zheli Liu},
  title        = {Multi-authority fine-grained access control with accountability and
                  its application in cloud},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {112},
  pages        = {89--96},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jnca.2018.03.006},
  doi          = {10.1016/J.JNCA.2018.03.006},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/LiCCHWL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/MengWWWX18,
  author       = {Weizhi Meng and
                  Yu Wang and
                  Duncan S. Wong and
                  Sheng Wen and
                  Yang Xiang},
  title        = {\emph{TouchWB}: Touch behavioral user authentication based on web
                  browsing on smartphones},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {117},
  pages        = {1--9},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jnca.2018.05.010},
  doi          = {10.1016/J.JNCA.2018.05.010},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/MengWWWX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/HuTWZ18,
  author       = {Xing Hu and
                  Chunming Tang and
                  Duncan S. Wong and
                  Xianghan Zheng},
  title        = {Efficient pairing-free {PRE} schemes for multimedia data sharing in
                  IoT},
  journal      = {Multim. Tools Appl.},
  volume       = {77},
  number       = {14},
  pages        = {18327--18354},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11042-017-5387-1},
  doi          = {10.1007/S11042-017-5387-1},
  timestamp    = {Fri, 22 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/HuTWZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/MengLW18a,
  author       = {Weizhi Meng and
                  Wenjuan Li and
                  Duncan S. Wong},
  title        = {Enhancing touch behavioral authentication via cost-based intelligent
                  mechanism on smartphones},
  journal      = {Multim. Tools Appl.},
  volume       = {77},
  number       = {23},
  pages        = {30167--30185},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11042-018-6094-2},
  doi          = {10.1007/S11042-018-6094-2},
  timestamp    = {Thu, 18 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/MengLW18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/YangPM0W18,
  author       = {Anjia Yang and
                  Elena Pagnin and
                  Aikaterini Mitrokotsa and
                  Gerhard P. Hancke and
                  Duncan S. Wong},
  title        = {Two-Hop Distance-Bounding Protocols: Keep Your Friends Close},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {17},
  number       = {7},
  pages        = {1723--1736},
  year         = {2018},
  url          = {https://doi.org/10.1109/TMC.2017.2771769},
  doi          = {10.1109/TMC.2017.2771769},
  timestamp    = {Tue, 10 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/YangPM0W18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuYWNW18,
  author       = {Zhen Liu and
                  Guomin Yang and
                  Duncan S. Wong and
                  Khoa Nguyen and
                  Huaxiong Wang},
  title        = {Key-Insulated and Privacy-Preserving Signature Scheme with Publicly
                  Derived Public Key},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {956},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/956},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuYWNW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuW18,
  author       = {Zhen Liu and
                  Duncan S. Wong},
  title        = {On Enabling Attribute-Based Encryption to Be Traceable against Traitors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {963},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/963},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ZhangCLWLY17,
  author       = {Yinghui Zhang and
                  Xiaofeng Chen and
                  Jin Li and
                  Duncan S. Wong and
                  Hui Li and
                  Ilsun You},
  title        = {Ensuring attribute privacy protection and fast decryption for outsourced
                  data security in mobile cloud computing},
  journal      = {Inf. Sci.},
  volume       = {379},
  pages        = {42--61},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ins.2016.04.015},
  doi          = {10.1016/J.INS.2016.04.015},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/ZhangCLWLY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/LiYLCHW17,
  author       = {Jin Li and
                  Hongyang Yan and
                  Zheli Liu and
                  Xiaofeng Chen and
                  Xinyi Huang and
                  Duncan S. Wong},
  title        = {Location-Sharing Systems With Enhanced Privacy in Mobile Online Social
                  Networks},
  journal      = {{IEEE} Syst. J.},
  volume       = {11},
  number       = {2},
  pages        = {439--448},
  year         = {2017},
  url          = {https://doi.org/10.1109/JSYST.2015.2415835},
  doi          = {10.1109/JSYST.2015.2415835},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/LiYLCHW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GuoMSHWV17,
  author       = {Fuchun Guo and
                  Yi Mu and
                  Willy Susilo and
                  Homer Hsing and
                  Duncan S. Wong and
                  Vijay Varadharajan},
  title        = {Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight
                  Devices},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {2},
  pages        = {211--220},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2445760},
  doi          = {10.1109/TDSC.2015.2445760},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/GuoMSHWV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XieWWTCF17,
  author       = {Qi Xie and
                  Duncan S. Wong and
                  Guilin Wang and
                  Xiao Tan and
                  Kefei Chen and
                  Liming Fang},
  title        = {Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated
                  Key Exchange Protocol With Extended Security Model},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {6},
  pages        = {1382--1392},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2659640},
  doi          = {10.1109/TIFS.2017.2659640},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XieWWTCF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/BaekHBWJY17,
  author       = {Joonsang Baek and
                  Eman Hableel and
                  Young{-}Ji Byon and
                  Duncan S. Wong and
                  Kitae Jang and
                  Hwasoo Yeo},
  title        = {How to Protect {ADS-B:} Confidentiality Framework and Efficient Realization
                  Based on Staged Identity-Based Encryption},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {18},
  number       = {3},
  pages        = {690--700},
  year         = {2017},
  url          = {https://doi.org/10.1109/TITS.2016.2586301},
  doi          = {10.1109/TITS.2016.2586301},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tits/BaekHBWJY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/YangTBW17,
  author       = {Anjia Yang and
                  Xiao Tan and
                  Joonsang Baek and
                  Duncan S. Wong},
  title        = {A New {ADS-B} Authentication Framework Based on Efficient Hierarchical
                  Identity-Based Signature with Batch Verification},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {10},
  number       = {2},
  pages        = {165--175},
  year         = {2017},
  url          = {https://doi.org/10.1109/TSC.2015.2459709},
  doi          = {10.1109/TSC.2015.2459709},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/YangTBW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/SchlegelCHW17,
  author       = {Roman Schlegel and
                  Chi{-}Yin Chow and
                  Qiong Huang and
                  Duncan S. Wong},
  title        = {Privacy-Preserving Location Sharing Services for Social Networks},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {10},
  number       = {5},
  pages        = {811--825},
  year         = {2017},
  url          = {https://doi.org/10.1109/TSC.2016.2514338},
  doi          = {10.1109/TSC.2016.2514338},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsc/SchlegelCHW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/XieHTW17,
  author       = {Qi Xie and
                  Bin Hu and
                  Xiao Tan and
                  Duncan S. Wong},
  title        = {Chaotic Maps-Based Strong Anonymous Authentication Scheme for Roaming
                  Services in Global Mobility Networks},
  journal      = {Wirel. Pers. Commun.},
  volume       = {96},
  number       = {4},
  pages        = {5881--5896},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11277-017-4452-4},
  doi          = {10.1007/S11277-017-4452-4},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/XieHTW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/closer/LiLLW17,
  author       = {Xiaoyi Li and
                  Kaitai Liang and
                  Zhen Liu and
                  Duncan S. Wong},
  editor       = {Donald Ferguson and
                  V{\'{\i}}ctor M{\'{e}}ndez Mu{\~{n}}oz and
                  Jorge Cardoso and
                  Markus Helfert and
                  Claus Pahl},
  title        = {Attribute based Encryption: Traitor Tracing, Revocation and Fully
                  Security on Prime Order Groups},
  booktitle    = {{CLOSER} 2017 - Proceedings of the 7th International Conference on
                  Cloud Computing and Services Science, Porto, Portugal, April 24-26,
                  2017},
  pages        = {281--292},
  publisher    = {SciTePress},
  year         = {2017},
  timestamp    = {Thu, 03 Feb 2022 09:27:48 +0100},
  biburl       = {https://dblp.org/rec/conf/closer/LiLLW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/BaekWLA16,
  author       = {Joonsang Baek and
                  Duncan S. Wong and
                  Jin Li and
                  Man Ho Au},
  title        = {Efficient Generic Construction of CCA-Secure Identity-Based Encryption
                  from Randomness Extraction},
  journal      = {Comput. J.},
  volume       = {59},
  number       = {4},
  pages        = {508--521},
  year         = {2016},
  url          = {https://doi.org/10.1093/comjnl/bxv070},
  doi          = {10.1093/COMJNL/BXV070},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/BaekWLA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/LiuYYCWS16,
  author       = {Joseph K. Liu and
                  Sze Ling Yeo and
                  Wun{-}She Yap and
                  Sherman S. M. Chow and
                  Duncan S. Wong and
                  Willy Susilo},
  title        = {Faulty Instantiations of Threshold Ring Signature from Threshold Proof-of-Knowledge
                  Protocol},
  journal      = {Comput. J.},
  volume       = {59},
  number       = {7},
  pages        = {945--954},
  year         = {2016},
  url          = {https://doi.org/10.1093/comjnl/bxv098},
  doi          = {10.1093/COMJNL/BXV098},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/LiuYYCWS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/LiuW16,
  author       = {Zhen Liu and
                  Duncan S. Wong},
  title        = {Practical Attribute-Based Encryption: Traitor Tracing, Revocation
                  and Large Universe},
  journal      = {Comput. J.},
  volume       = {59},
  number       = {7},
  pages        = {983--1004},
  year         = {2016},
  url          = {https://doi.org/10.1093/comjnl/bxv101},
  doi          = {10.1093/COMJNL/BXV101},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/LiuW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/WangLLW16,
  author       = {Hao Wang and
                  Zhen Liu and
                  Zhe Liu and
                  Duncan S. Wong},
  title        = {Identity-based aggregate signcryption in the standard model from multilinear
                  maps},
  journal      = {Frontiers Comput. Sci.},
  volume       = {10},
  number       = {4},
  pages        = {741--754},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11704-015-5138-2},
  doi          = {10.1007/S11704-015-5138-2},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fcsc/WangLLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/WangWWQMD16,
  author       = {Yujue Wang and
                  Qianhong Wu and
                  Duncan S. Wong and
                  Bo Qin and
                  Jian Mao and
                  Yong Ding},
  title        = {Provably secure robust optimistic fair exchange of distributed signatures},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {62},
  pages        = {29--39},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.future.2016.03.012},
  doi          = {10.1016/J.FUTURE.2016.03.012},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/WangWWQMD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/XieDWH16,
  author       = {Qi Xie and
                  Na Dong and
                  Duncan S. Wong and
                  Bin Hu},
  title        = {Cryptanalysis and security enhancement of a robust two-factor authentication
                  and key agreement protocol},
  journal      = {Int. J. Commun. Syst.},
  volume       = {29},
  number       = {3},
  pages        = {478--487},
  year         = {2016},
  url          = {https://doi.org/10.1002/dac.2858},
  doi          = {10.1002/DAC.2858},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/XieDWH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/GrittiSPLW16,
  author       = {Cl{\'{e}}mentine Gritti and
                  Willy Susilo and
                  Thomas Plantard and
                  Kaitai Liang and
                  Duncan S. Wong},
  title        = {Broadcast encryption with dealership},
  journal      = {Int. J. Inf. Sec.},
  volume       = {15},
  number       = {3},
  pages        = {271--283},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10207-015-0285-x},
  doi          = {10.1007/S10207-015-0285-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/GrittiSPLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiuW16,
  author       = {Dennis Y. W. Liu and
                  Duncan S. Wong},
  title        = {One-move convertible nominative signature in the standard model},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {12},
  pages        = {1796--1809},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.812},
  doi          = {10.1002/SEC.812},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiuW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/MengLWZ16,
  author       = {Weizhi Meng and
                  Wenjuan Li and
                  Duncan S. Wong and
                  Jianying Zhou},
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {TMGuard: {A} Touch Movement-Based Security Mechanism for Screen Unlock
                  Patterns on Smartphones},
  booktitle    = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  pages        = {629--647},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5\_34},
  doi          = {10.1007/978-3-319-39555-5\_34},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/MengLWZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiuWP16,
  author       = {Zhen Liu and
                  Duncan S. Wong and
                  Jack Poon},
  editor       = {Xiaofeng Chen and
                  XiaoFeng Wang and
                  Xinyi Huang},
  title        = {Dealerless Corporate Key Generation for Identity-Based Encryption
                  Schemes},
  booktitle    = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016},
  pages        = {211--222},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2897845.2897849},
  doi          = {10.1145/2897845.2897849},
  timestamp    = {Mon, 25 Apr 2022 08:42:03 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/LiuWP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/XuYZW16,
  author       = {Jia Xu and
                  Anjia Yang and
                  Jianying Zhou and
                  Duncan S. Wong},
  editor       = {Ioannis G. Askoxylakis and
                  Sotiris Ioannidis and
                  Sokratis K. Katsikas and
                  Catherine Meadows},
  title        = {Lightweight Delegatable Proofs of Storage},
  booktitle    = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research
                  in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9878},
  pages        = {324--343},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45744-4\_16},
  doi          = {10.1007/978-3-319-45744-4\_16},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/XuYZW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispdc/HuTW16,
  author       = {Xing Hu and
                  Chunming Tang and
                  Duncan S. Wong},
  editor       = {Riqing Chen and
                  Chunming Rong and
                  Dan Grigoras},
  title        = {Highly Efficient Proxy Re-encryption Schemes for User-End Encrypted
                  Cloud Data Sharing},
  booktitle    = {15th International Symposium on Parallel and Distributed Computing,
                  {ISPDC} 2016, Fuzhou, China, July 8-10, 2016},
  pages        = {261--268},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISPDC.2016.45},
  doi          = {10.1109/ISPDC.2016.45},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispdc/HuTW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiLLW16,
  author       = {Xiaoyi Li and
                  Kaitai Liang and
                  Zhen Liu and
                  Duncan S. Wong},
  title        = {Attribute Based Encryption: Traitor Tracing, Revocation and Fully
                  Security on Prime Order Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1140},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1140},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiLLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/WangWWQML15,
  author       = {Yujue Wang and
                  Qianhong Wu and
                  Duncan S. Wong and
                  Bo Qin and
                  Yi Mu and
                  Jianwei Liu},
  title        = {Further ideal multipartite access structures from integer polymatroids},
  journal      = {Sci. China Inf. Sci.},
  volume       = {58},
  number       = {7},
  pages        = {1--13},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11432-015-5286-x},
  doi          = {10.1007/S11432-015-5286-X},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/WangWWQML15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/LiangSLW15,
  author       = {Kaitai Liang and
                  Willy Susilo and
                  Joseph K. Liu and
                  Duncan S. Wong},
  title        = {Efficient and Fully {CCA} Secure Conditional Proxy Re-Encryption from
                  Hierarchical Identity-Based Encryption},
  journal      = {Comput. J.},
  volume       = {58},
  number       = {10},
  pages        = {2778--2792},
  year         = {2015},
  url          = {https://doi.org/10.1093/comjnl/bxv050},
  doi          = {10.1093/COMJNL/BXV050},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/LiangSLW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/MengWFZ15,
  author       = {Weizhi Meng and
                  Duncan S. Wong and
                  Steven Furnell and
                  Jianying Zhou},
  title        = {Surveying the Development of Biometric User Authentication on Mobile
                  Phones},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {17},
  number       = {3},
  pages        = {1268--1293},
  year         = {2015},
  url          = {https://doi.org/10.1109/COMST.2014.2386915},
  doi          = {10.1109/COMST.2014.2386915},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsur/MengWFZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/LiangFWS15,
  author       = {Kaitai Liang and
                  Liming Fang and
                  Duncan S. Wong and
                  Willy Susilo},
  title        = {A ciphertext-policy attribute-based proxy re-encryption scheme for
                  data sharing in public clouds},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {27},
  number       = {8},
  pages        = {2004--2027},
  year         = {2015},
  url          = {https://doi.org/10.1002/cpe.3397},
  doi          = {10.1002/CPE.3397},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/LiangFWS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/Jiang00WML15,
  author       = {Tao Jiang and
                  Xiaofeng Chen and
                  Jin Li and
                  Duncan S. Wong and
                  Jianfeng Ma and
                  Joseph K. Liu},
  title        = {Towards secure and reliable cloud storage against data re-outsourcing},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {52},
  pages        = {86--94},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.future.2014.11.002},
  doi          = {10.1016/J.FUTURE.2014.11.002},
  timestamp    = {Fri, 28 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/Jiang00WML15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/LiangALSWYYY15,
  author       = {Kaitai Liang and
                  Man Ho Au and
                  Joseph K. Liu and
                  Willy Susilo and
                  Duncan S. Wong and
                  Guomin Yang and
                  Yong Yu and
                  Anjia Yang},
  title        = {A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption
                  for cloud data sharing},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {52},
  pages        = {95--108},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.future.2014.11.016},
  doi          = {10.1016/J.FUTURE.2014.11.016},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/LiangALSWYYY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcse/SchlegelW15,
  author       = {Roman Schlegel and
                  Duncan S. Wong},
  title        = {Private friends on a social networking site operated by an overly
                  curious {SNP}},
  journal      = {Int. J. Comput. Sci. Eng.},
  volume       = {10},
  number       = {3},
  pages        = {281--292},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJCSE.2015.068836},
  doi          = {10.1504/IJCSE.2015.068836},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcse/SchlegelW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijict/RenTWW15,
  author       = {Yan Ren and
                  Chunming Tang and
                  Guilin Wang and
                  Duncan S. Wong},
  title        = {Attribute-based signature schemes with accountability},
  journal      = {Int. J. Inf. Commun. Technol.},
  volume       = {7},
  number       = {2/3},
  pages        = {141--158},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJICT.2015.068377},
  doi          = {10.1504/IJICT.2015.068377},
  timestamp    = {Fri, 22 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijict/RenTWW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/LiangLLW15,
  author       = {Kaitai Liang and
                  Joseph K. Liu and
                  Rongxing Lu and
                  Duncan S. Wong},
  title        = {Privacy Concerns for Photo Sharing in Online Social Networks},
  journal      = {{IEEE} Internet Comput.},
  volume       = {19},
  number       = {2},
  pages        = {58--63},
  year         = {2015},
  url          = {https://doi.org/10.1109/MIC.2014.107},
  doi          = {10.1109/MIC.2014.107},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/internet/LiangLLW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/HuangWS15,
  author       = {Qiong Huang and
                  Duncan S. Wong and
                  Willy Susilo},
  title        = {How to protect privacy in Optimistic Fair Exchange of digital signatures},
  journal      = {Inf. Sci.},
  volume       = {325},
  pages        = {300--315},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ins.2015.07.032},
  doi          = {10.1016/J.INS.2015.07.032},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/HuangWS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kbs/0002LCXTW15,
  author       = {Jin Li and
                  Zheli Liu and
                  Xiaofeng Chen and
                  Fatos Xhafa and
                  Xiao Tan and
                  Duncan S. Wong},
  title        = {L-EncDB: {A} lightweight framework for privacy-preserving data queries
                  in cloud computing},
  journal      = {Knowl. Based Syst.},
  volume       = {79},
  pages        = {18--26},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.knosys.2014.04.010},
  doi          = {10.1016/J.KNOSYS.2014.04.010},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/kbs/0002LCXTW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/XhafaLZLCW15,
  author       = {Fatos Xhafa and
                  Jingwei Li and
                  Gansen Zhao and
                  Jin Li and
                  Xiaofeng Chen and
                  Duncan S. Wong},
  title        = {Designing cloud-based electronic health record system with attribute-based
                  encryption},
  journal      = {Multim. Tools Appl.},
  volume       = {74},
  number       = {10},
  pages        = {3441--3458},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11042-013-1829-6},
  doi          = {10.1007/S11042-013-1829-6},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/XhafaLZLCW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangWZX15,
  author       = {Yilei Wang and
                  Duncan S. Wong and
                  Chuan Zhao and
                  Qiuliang Xu},
  title        = {Fair two-party computation with rational parties holding private types},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {2},
  pages        = {284--297},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.979},
  doi          = {10.1002/SEC.979},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WangWZX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YangLZWJ15,
  author       = {Anjia Yang and
                  Kaitai Liang and
                  Yunhui Zhuang and
                  Duncan S. Wong and
                  Xiaohua Jia},
  title        = {A new unpredictability-based radio frequency identification forward
                  privacy model and a provably secure construction},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {16},
  pages        = {2836--2849},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1208},
  doi          = {10.1002/SEC.1208},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/YangLZWJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangWS0X15,
  author       = {Yilei Wang and
                  Duncan S. Wong and
                  Willy Susilo and
                  Xiaofeng Chen and
                  Qiuliang Xu},
  title        = {Achieving fairness by sequential equilibrium in rational two-party
                  computation under incomplete information},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3690--3700},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1292},
  doi          = {10.1002/SEC.1292},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WangWS0X15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/LiTCWX15,
  author       = {Jin Li and
                  Xiao Tan and
                  Xiaofeng Chen and
                  Duncan S. Wong and
                  Fatos Xhafa},
  title        = {OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained
                  Devices},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {3},
  number       = {2},
  pages        = {195--205},
  year         = {2015},
  url          = {https://doi.org/10.1109/TCC.2014.2366148},
  doi          = {10.1109/TCC.2014.2366148},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/LiTCWX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/ChenSLWMTT15,
  author       = {Xiaofeng Chen and
                  Willy Susilo and
                  Jin Li and
                  Duncan S. Wong and
                  Jianfeng Ma and
                  Shaohua Tang and
                  Qiang Tang},
  title        = {Efficient algorithms for secure outsourcing of bilinear pairings},
  journal      = {Theor. Comput. Sci.},
  volume       = {562},
  pages        = {112--121},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.tcs.2014.09.038},
  doi          = {10.1016/J.TCS.2014.09.038},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/ChenSLWMTT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/HuangYWS15,
  author       = {Qiong Huang and
                  Guomin Yang and
                  Duncan S. Wong and
                  Willy Susilo},
  title        = {Ambiguous optimistic fair exchange: Definition and constructions},
  journal      = {Theor. Comput. Sci.},
  volume       = {562},
  pages        = {177--193},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.tcs.2014.09.043},
  doi          = {10.1016/J.TCS.2014.09.043},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/HuangYWS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/TanHW15,
  author       = {Xiao Tan and
                  Qiong Huang and
                  Duncan S. Wong},
  title        = {Concurrent signature without random oracles},
  journal      = {Theor. Comput. Sci.},
  volume       = {562},
  pages        = {194--212},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.tcs.2014.09.044},
  doi          = {10.1016/J.TCS.2014.09.044},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/TanHW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/WangWWCQLD15,
  author       = {Yujue Wang and
                  Duncan S. Wong and
                  Qianhong Wu and
                  Sherman S. M. Chow and
                  Bo Qin and
                  Jianwei Liu and
                  Yong Ding},
  title        = {Practical (fully) distributed signatures provably secure in the standard
                  model},
  journal      = {Theor. Comput. Sci.},
  volume       = {595},
  pages        = {143--158},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.tcs.2015.06.029},
  doi          = {10.1016/J.TCS.2015.06.029},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/WangWWCQLD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuCW15a,
  author       = {Zhen Liu and
                  Zhenfu Cao and
                  Duncan S. Wong},
  title        = {Traceable {CP-ABE:} How to Trace Decryption Devices Found in the Wild},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {1},
  pages        = {55--68},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2363562},
  doi          = {10.1109/TIFS.2014.2363562},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuCW15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenHLMLW15,
  author       = {Xiaofeng Chen and
                  Xinyi Huang and
                  Jin Li and
                  Jianfeng Ma and
                  Wenjing Lou and
                  Duncan S. Wong},
  title        = {New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear
                  Equations},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {1},
  pages        = {69--78},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2363765},
  doi          = {10.1109/TIFS.2014.2363765},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenHLMLW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/SchlegelCHW15,
  author       = {Roman Schlegel and
                  Chi{-}Yin Chow and
                  Qiong Huang and
                  Duncan S. Wong},
  title        = {User-Defined Privacy Grid System for Continuous Location-Based Services},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {14},
  number       = {10},
  pages        = {2158--2172},
  year         = {2015},
  url          = {https://doi.org/10.1109/TMC.2015.2388488},
  doi          = {10.1109/TMC.2015.2388488},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmc/SchlegelCHW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LiuW15,
  author       = {Zhen Liu and
                  Duncan S. Wong},
  editor       = {Tal Malkin and
                  Vladimir Kolesnikov and
                  Allison Bishop Lewko and
                  Michalis Polychronakis},
  title        = {Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing,
                  Revocation, and Large Universe},
  booktitle    = {Applied Cryptography and Network Security - 13th International Conference,
                  {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9092},
  pages        = {127--146},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28166-7\_7},
  doi          = {10.1007/978-3-319-28166-7\_7},
  timestamp    = {Tue, 25 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/LiuW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/LiuW15,
  author       = {Zhen Liu and
                  Duncan S. Wong},
  editor       = {Sihan Qing and
                  Eiji Okamoto and
                  Kwangjo Kim and
                  Dongmei Liu},
  title        = {Traceable {CP-ABE} on Prime Order Groups: Fully Secure and Fully Collusion-Resistant
                  Blackbox Traceable},
  booktitle    = {Information and Communications Security - 17th International Conference,
                  {ICICS} 2015, Beijing, China, December 9-11, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9543},
  pages        = {109--124},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-29814-6\_10},
  doi          = {10.1007/978-3-319-29814-6\_10},
  timestamp    = {Wed, 12 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/LiuW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/HableelBBW15,
  author       = {Eman Hableel and
                  Joonsang Baek and
                  Young{-}Ji Byon and
                  Duncan S. Wong},
  title        = {How to protect {ADS-B:} Confidentiality framework for future air traffic
                  communication},
  booktitle    = {2015 {IEEE} Conference on Computer Communications Workshops, {INFOCOM}
                  Workshops, Hong Kong, China, April 26 - May 1, 2015},
  pages        = {155--160},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/INFCOMW.2015.7179377},
  doi          = {10.1109/INFCOMW.2015.7179377},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/HableelBBW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ZhuangHW15,
  author       = {Yunhui Zhuang and
                  Gerhard P. Hancke and
                  Duncan S. Wong},
  editor       = {Howon Kim and
                  Dooho Choi},
  title        = {How to Demonstrate Our Presence Without Disclosing Identity? Evidence
                  from a Grouping-Proof Protocol},
  booktitle    = {Information Security Applications - 16th International Workshop, {WISA}
                  2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9503},
  pages        = {423--435},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31875-2\_35},
  doi          = {10.1007/978-3-319-31875-2\_35},
  timestamp    = {Thu, 02 Mar 2023 10:53:05 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/ZhuangHW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuW15,
  author       = {Zhen Liu and
                  Duncan S. Wong},
  title        = {Traceable {CP-ABE} on Prime Order Groups: Fully Secure and Fully Collusion-resistant
                  Blackbox Traceable},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {850},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/850},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/00010MLW14,
  author       = {Xiaofeng Chen and
                  Jin Li and
                  Jianfeng Ma and
                  Wenjing Lou and
                  Duncan S. Wong},
  title        = {New and efficient conditional e-payment systems with transferability},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {37},
  pages        = {252--258},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.future.2013.07.015},
  doi          = {10.1016/J.FUTURE.2013.07.015},
  timestamp    = {Fri, 28 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/00010MLW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/00020HW14,
  author       = {Jin Li and
                  Xiaofeng Chen and
                  Qiong Huang and
                  Duncan S. Wong},
  title        = {Digital provenance: Enabling secure data forensics in cloud computing},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {37},
  pages        = {259--266},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.future.2013.10.006},
  doi          = {10.1016/J.FUTURE.2013.10.006},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/00020HW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/Xhafa0WP14,
  author       = {Fatos Xhafa and
                  Jin Li and
                  Duncan S. Wong and
                  Francesco Palmieri},
  title        = {Advances in Security and Privacy in Sensor Networks},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {10},
  year         = {2014},
  url          = {https://doi.org/10.1155/2014/956265},
  doi          = {10.1155/2014/956265},
  timestamp    = {Tue, 05 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdsn/Xhafa0WP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/XieHBDW14,
  author       = {Qi Xie and
                  Dongzhao Hong and
                  Mengjie Bao and
                  Na Dong and
                  Duncan S. Wong},
  title        = {Privacy-Preserving Mobile Roaming Authentication with Security Proof
                  in Global Mobility Networks},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {10},
  year         = {2014},
  url          = {https://doi.org/10.1155/2014/325734},
  doi          = {10.1155/2014/325734},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/XieHBDW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WangWH14,
  author       = {Yuan Wang and
                  Duncan S. Wong and
                  Liusheng Huang},
  title        = {One-Pass Key Establishment Protocol for Wireless Roaming with User
                  Anonymity},
  journal      = {Int. J. Netw. Secur.},
  volume       = {16},
  number       = {2},
  pages        = {129--142},
  year         = {2014},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v16-n2/ijns-2014-v16-n2-p129-142.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/WangWH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MengWK14,
  author       = {Weizhi Meng and
                  Duncan S. Wong and
                  Lam{-}for Kwok},
  title        = {The effect of adaptive mechanism on behavioural biometric based mobile
                  phone authentication},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {2},
  pages        = {155--166},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-09-2013-0062},
  doi          = {10.1108/IMCS-09-2013-0062},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MengWK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/GrittiSPLW14,
  author       = {Cl{\'{e}}mentine Gritti and
                  Willy Susilo and
                  Thomas Plantard and
                  Kaitai Liang and
                  Duncan S. Wong},
  title        = {Empowering Personal Health Records with Cloud Computing: How to encrypt
                  with forthcoming fine-grained policies efficiently},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {5},
  number       = {4},
  pages        = {3--28},
  year         = {2014},
  url          = {https://doi.org/10.22667/JOWUA.2014.12.31.003},
  doi          = {10.22667/JOWUA.2014.12.31.003},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/GrittiSPLW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/XieTWWBD14,
  author       = {Qi Xie and
                  Xiao Tan and
                  Duncan S. Wong and
                  Guilin Wang and
                  Mengjie Bao and
                  Na Dong},
  title        = {A practical anonymous authentication protocol for wireless roaming},
  journal      = {Secur. Commun. Networks},
  volume       = {7},
  number       = {8},
  pages        = {1264--1273},
  year         = {2014},
  url          = {https://doi.org/10.1002/sec.858},
  doi          = {10.1002/SEC.858},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/XieTWWBD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/YangTMSW14,
  author       = {Guomin Yang and
                  Chik How Tan and
                  Yi Mu and
                  Willy Susilo and
                  Duncan S. Wong},
  title        = {Identity based identification from algebraic coding theory},
  journal      = {Theor. Comput. Sci.},
  volume       = {520},
  pages        = {51--61},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.tcs.2013.09.008},
  doi          = {10.1016/J.TCS.2013.09.008},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/YangTMSW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/LiangCTWTZ14,
  author       = {Kaitai Liang and
                  Cheng{-}Kang Chu and
                  Xiao Tan and
                  Duncan S. Wong and
                  Chunming Tang and
                  Jianying Zhou},
  title        = {Chosen-ciphertext secure multi-hop identity-based conditional proxy
                  re-encryption with constant-size ciphertexts},
  journal      = {Theor. Comput. Sci.},
  volume       = {539},
  pages        = {87--105},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.tcs.2014.04.027},
  doi          = {10.1016/J.TCS.2014.04.027},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/LiangCTWTZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/TanHW14,
  author       = {Xiao Tan and
                  Qiong Huang and
                  Duncan S. Wong},
  title        = {Extending concurrent signature to multiple parties},
  journal      = {Theor. Comput. Sci.},
  volume       = {548},
  pages        = {54--67},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.tcs.2014.06.038},
  doi          = {10.1016/J.TCS.2014.06.038},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/TanHW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GuoMSWV14,
  author       = {Fuchun Guo and
                  Yi Mu and
                  Willy Susilo and
                  Duncan S. Wong and
                  Vijay Varadharajan},
  title        = {{CP-ABE} With Constant-Size Keys for Lightweight Devices},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {9},
  number       = {5},
  pages        = {763--771},
  year         = {2014},
  url          = {https://doi.org/10.1109/TIFS.2014.2309858},
  doi          = {10.1109/TIFS.2014.2309858},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GuoMSWV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiangALSWYPX14,
  author       = {Kaitai Liang and
                  Man Ho Au and
                  Joseph K. Liu and
                  Willy Susilo and
                  Duncan S. Wong and
                  Guomin Yang and
                  Tran Viet Xuan Phuong and
                  Qi Xie},
  title        = {A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public
                  Cloud Data Sharing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {9},
  number       = {10},
  pages        = {1667--1680},
  year         = {2014},
  url          = {https://doi.org/10.1109/TIFS.2014.2346023},
  doi          = {10.1109/TIFS.2014.2346023},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiangALSWYPX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/ChenLHLXW14,
  author       = {Xiaofeng Chen and
                  Jin Li and
                  Xinyi Huang and
                  Jingwei Li and
                  Yang Xiang and
                  Duncan S. Wong},
  title        = {Secure Outsourced Attribute-Based Signatures},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {25},
  number       = {12},
  pages        = {3285--3294},
  year         = {2014},
  url          = {https://doi.org/10.1109/TPDS.2013.2295809},
  doi          = {10.1109/TPDS.2013.2295809},
  timestamp    = {Thu, 24 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tpds/ChenLHLXW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/LiuCW14,
  author       = {Zhen Liu and
                  Zhenfu Cao and
                  Duncan S. Wong},
  editor       = {Dongdai Lin and
                  Moti Yung and
                  Jianying Zhou},
  title        = {Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption
                  with Sub-linear Size Ciphertexts},
  booktitle    = {Information Security and Cryptology - 10th International Conference,
                  Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8957},
  pages        = {403--423},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-16745-9\_22},
  doi          = {10.1007/978-3-319-16745-9\_22},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/LiuCW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/WangWWCQL14,
  author       = {Yujue Wang and
                  Duncan S. Wong and
                  Qianhong Wu and
                  Sherman S. M. Chow and
                  Bo Qin and
                  Jianwei Liu},
  editor       = {Josh Benaloh},
  title        = {Practical Distributed Signatures in the Standard Model},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at
                  the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8366},
  pages        = {307--326},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04852-9\_16},
  doi          = {10.1007/978-3-319-04852-9\_16},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/WangWWCQL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/HuangWS14,
  author       = {Qiong Huang and
                  Duncan S. Wong and
                  Willy Susilo},
  editor       = {Josh Benaloh},
  title        = {{P2OFE:} Privacy-Preserving Optimistic Fair Exchange of Digital Signatures},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at
                  the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8366},
  pages        = {367--384},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04852-9\_19},
  doi          = {10.1007/978-3-319-04852-9\_19},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/HuangWS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/LiangLWS14,
  author       = {Kaitai Liang and
                  Joseph K. Liu and
                  Duncan S. Wong and
                  Willy Susilo},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption
                  Scheme for Public Clouds Data Sharing},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8712},
  pages        = {257--272},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11203-9\_15},
  doi          = {10.1007/978-3-319-11203-9\_15},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/LiangLWS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/WangWWQCLT14,
  author       = {Yujue Wang and
                  Qianhong Wu and
                  Duncan S. Wong and
                  Bo Qin and
                  Sherman S. M. Chow and
                  Zhen Liu and
                  Xiao Tan},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {Securely Outsourcing Exponentiations with Single Untrusted Program
                  for Cloud Storage},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8712},
  pages        = {326--343},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11203-9\_19},
  doi          = {10.1007/978-3-319-11203-9\_19},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/WangWWQCLT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsoc/QuWOWB14,
  author       = {Lie Qu and
                  Yan Wang and
                  Mehmet A. Orgun and
                  Duncan S. Wong and
                  Athman Bouguettaya},
  editor       = {Xavier Franch and
                  Aditya K. Ghose and
                  Grace A. Lewis and
                  Sami Bhiri},
  title        = {Evaluating Cloud Users' Credibility of Providing Subjective Assessment
                  or Objective Assessment for Cloud Services},
  booktitle    = {Service-Oriented Computing - 12th International Conference, {ICSOC}
                  2014, Paris, France, November 3-6, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8831},
  pages        = {453--461},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45391-9\_36},
  doi          = {10.1007/978-3-662-45391-9\_36},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icsoc/QuWOWB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/Jiang0LWML14,
  author       = {Tao Jiang and
                  Xiaofeng Chen and
                  Jin Li and
                  Duncan S. Wong and
                  Jianfeng Ma and
                  Joseph K. Liu},
  editor       = {Xinyi Huang and
                  Jianying Zhou},
  title        = {{TIMER:} Secure and Reliable Cloud Storage against Data Re-outsourcing},
  booktitle    = {Information Security Practice and Experience - 10th International
                  Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8434},
  pages        = {346--358},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06320-1\_26},
  doi          = {10.1007/978-3-319-06320-1\_26},
  timestamp    = {Fri, 09 Apr 2021 18:45:22 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/Jiang0LWML14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/LiangASWYY14,
  author       = {Kaitai Liang and
                  Man Ho Au and
                  Willy Susilo and
                  Duncan S. Wong and
                  Guomin Yang and
                  Yong Yu},
  editor       = {Xinyi Huang and
                  Jianying Zhou},
  title        = {An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption
                  for Cloud Data Sharing},
  booktitle    = {Information Security Practice and Experience - 10th International
                  Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8434},
  pages        = {448--461},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06320-1\_33},
  doi          = {10.1007/978-3-319-06320-1\_33},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/LiangASWYY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/MengWK14,
  author       = {Yuxin Meng and
                  Duncan S. Wong and
                  Lam{-}for Kwok},
  editor       = {Yookun Cho and
                  Sung Y. Shin and
                  Sang{-}Wook Kim and
                  Chih{-}Cheng Hung and
                  Jiman Hong},
  title        = {Design of touch dynamics based user authentication with an adaptive
                  mechanism on mobile phones},
  booktitle    = {Symposium on Applied Computing, {SAC} 2014, Gyeongju, Republic of
                  Korea - March 24 - 28, 2014},
  pages        = {1680--1687},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2554850.2554931},
  doi          = {10.1145/2554850.2554931},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/MengWK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XuYZW14,
  author       = {Jia Xu and
                  Anjia Yang and
                  Jianying Zhou and
                  Duncan S. Wong},
  title        = {Lightweight and Privacy-Preserving Delegatable Proofs of Storage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {395},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/395},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/XuYZW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuW14,
  author       = {Zhen Liu and
                  Duncan S. Wong},
  title        = {Practical Attribute Based Encryption: Traitor Tracing, Revocation,
                  and Large Universe},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {616},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/616},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuCW14a,
  author       = {Zhen Liu and
                  Zhenfu Cao and
                  Duncan S. Wong},
  title        = {Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption
                  with Sub-linear Size Ciphertexts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {676},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/676},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuCW14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/BaekVSJW13,
  author       = {Joonsang Baek and
                  Quang Hieu Vu and
                  Abdulhadi Shoufan and
                  Andrew Jones and
                  Duncan S. Wong},
  title        = {Stateful Public-Key Encryption Schemes Forward-Secure Against State
                  Exposure},
  journal      = {Comput. J.},
  volume       = {56},
  number       = {4},
  pages        = {497--507},
  year         = {2013},
  url          = {https://doi.org/10.1093/comjnl/bxs151},
  doi          = {10.1093/COMJNL/BXS151},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/BaekVSJW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/HuangWS13,
  author       = {Qiong Huang and
                  Duncan S. Wong and
                  Willy Susilo},
  title        = {The construction of ambiguous optimistic fair exchange from designated
                  confirmer signature without random oracles},
  journal      = {Inf. Sci.},
  volume       = {228},
  pages        = {222--238},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ins.2012.11.022},
  doi          = {10.1016/J.INS.2012.11.022},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/HuangWS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itc/XieDTWW13,
  author       = {Qi Xie and
                  Na Dong and
                  Xiao Tan and
                  Duncan S. Wong and
                  Guilin Wang},
  title        = {Improvement of a Three-Party Password-Based Key Exchange Protocol
                  with Formal Verification},
  journal      = {Inf. Technol. Control.},
  volume       = {42},
  number       = {3},
  pages        = {231--237},
  year         = {2013},
  url          = {https://doi.org/10.5755/j01.itc.42.3.1905},
  doi          = {10.5755/J01.ITC.42.3.1905},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itc/XieDTWW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/HuangW13,
  author       = {Qiong Huang and
                  Duncan S. Wong},
  title        = {Short and efficient convertible undeniable signature schemes without
                  random oracles},
  journal      = {Theor. Comput. Sci.},
  volume       = {476},
  pages        = {67--83},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.tcs.2013.01.010},
  doi          = {10.1016/J.TCS.2013.01.010},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/HuangW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuCW13,
  author       = {Zhen Liu and
                  Zhenfu Cao and
                  Duncan S. Wong},
  title        = {White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting
                  Any Monotone Access Structures},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {8},
  number       = {1},
  pages        = {76--88},
  year         = {2013},
  url          = {https://doi.org/10.1109/TIFS.2012.2223683},
  doi          = {10.1109/TIFS.2012.2223683},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuCW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SusiloAWW13,
  author       = {Willy Susilo and
                  Man Ho Au and
                  Yang Wang and
                  Duncan S. Wong},
  editor       = {Colin Boyd and
                  Leonie Simpson},
  title        = {Fairness in Concurrent Signatures Revisited},
  booktitle    = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
                  2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7959},
  pages        = {318--329},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39059-3\_22},
  doi          = {10.1007/978-3-642-39059-3\_22},
  timestamp    = {Tue, 09 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SusiloAWW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiuCW13,
  author       = {Zhen Liu and
                  Zhenfu Cao and
                  Duncan S. Wong},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {Blackbox traceable {CP-ABE:} how to catch people leaking their keys
                  by selling decryption devices on ebay},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {475--486},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516683},
  doi          = {10.1145/2508859.2516683},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/LiuCW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangCLWL13,
  author       = {Yinghui Zhang and
                  Xiaofeng Chen and
                  Jin Li and
                  Duncan S. Wong and
                  Hui Li},
  editor       = {Kefei Chen and
                  Qi Xie and
                  Weidong Qiu and
                  Ninghui Li and
                  Wen{-}Guey Tzeng},
  title        = {Anonymous attribute-based encryption supporting efficient decryption
                  test},
  booktitle    = {8th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013},
  pages        = {511--516},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484313.2484381},
  doi          = {10.1145/2484313.2484381},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangCLWL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/LiuGW13,
  author       = {Zhe Liu and
                  Johann Gro{\ss}sch{\"{a}}dl and
                  Duncan S. Wong},
  editor       = {Dongdai Lin and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Low-Weight Primes for Lightweight Elliptic Curve Cryptography on 8-bit
                  {AVR} Processors},
  booktitle    = {Information Security and Cryptology - 9th International Conference,
                  Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8567},
  pages        = {217--235},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-12087-4\_14},
  doi          = {10.1007/978-3-319-12087-4\_14},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/LiuGW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eidwt/RenTWW13,
  author       = {Yan Ren and
                  Chunming Tang and
                  Guilin Wang and
                  Duncan S. Wong},
  title        = {Accountable Authority Attribute-Based Signature},
  booktitle    = {2013 Fourth International Conference on Emerging Intelligent Data
                  and Web Technologies, Xi'an, Shaanxi, China, September 9-11, 2013},
  pages        = {773--777},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/EIDWT.2013.97},
  doi          = {10.1109/EIDWT.2013.97},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eidwt/RenTWW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/LiuWH13,
  author       = {Dennis Y. W. Liu and
                  Duncan S. Wong and
                  Qiong Huang},
  editor       = {Hyang{-}Sook Lee and
                  Dong{-}Guk Han},
  title        = {Ambiguous One-Move Nominative Signature Without Random Oracles},
  booktitle    = {Information Security and Cryptology - {ICISC} 2013 - 16th International
                  Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8565},
  pages        = {325--341},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-12160-4\_20},
  doi          = {10.1007/978-3-319-12160-4\_20},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/LiuWH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/LiTCW13,
  author       = {Jin Li and
                  Xiao Tan and
                  Xiaofeng Chen and
                  Duncan S. Wong},
  title        = {An Efficient Proof of Retrievability with Public Auditing in Cloud
                  Computing},
  booktitle    = {2013 5th International Conference on Intelligent Networking and Collaborative
                  Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013},
  pages        = {93--98},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/INCoS.2013.185},
  doi          = {10.1109/INCOS.2013.185},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/incos/LiTCW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/LiangFSW13,
  author       = {Kaitai Liang and
                  Liming Fang and
                  Willy Susilo and
                  Duncan S. Wong},
  title        = {A Ciphertext-Policy Attribute-Based Proxy Re-encryption with Chosen-Ciphertext
                  Security},
  booktitle    = {2013 5th International Conference on Intelligent Networking and Collaborative
                  Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013},
  pages        = {552--559},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/INCoS.2013.103},
  doi          = {10.1109/INCOS.2013.103},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/incos/LiangFSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/XieBDHW13,
  author       = {Qi Xie and
                  Mengjie Bao and
                  Na Dong and
                  Bin Hu and
                  Duncan S. Wong},
  title        = {Secure Mobile User Authentication and Key Agreement Protocol with
                  Privacy Protection in Global Mobility Networks},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.23},
  doi          = {10.1109/ISBAST.2013.23},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/XieBDHW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/LiangHSWT13,
  author       = {Kaitai Liang and
                  Qiong Huang and
                  Roman Schlegel and
                  Duncan S. Wong and
                  Chunming Tang},
  editor       = {Robert H. Deng and
                  Tao Feng},
  title        = {A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release},
  booktitle    = {Information Security Practice and Experience - 9th International Conference,
                  {ISPEC} 2013, Lanzhou, China, May 12-14, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7863},
  pages        = {132--146},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38033-4\_10},
  doi          = {10.1007/978-3-642-38033-4\_10},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/LiangHSWT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/YangMSW13,
  author       = {Guomin Yang and
                  Yi Mu and
                  Willy Susilo and
                  Duncan S. Wong},
  editor       = {Robert H. Deng and
                  Tao Feng},
  title        = {Leakage Resilient Authenticated Key Exchange Secure in the Auxiliary
                  Input Model},
  booktitle    = {Information Security Practice and Experience - 9th International Conference,
                  {ISPEC} 2013, Lanzhou, China, May 12-14, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7863},
  pages        = {204--217},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38033-4\_15},
  doi          = {10.1007/978-3-642-38033-4\_15},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/YangMSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/ZhuangYWYX13,
  author       = {Yunhui Zhuang and
                  Anjia Yang and
                  Duncan S. Wong and
                  Guomin Yang and
                  Qi Xie},
  editor       = {Javier L{\'{o}}pez and
                  Xinyi Huang and
                  Ravi S. Sandhu},
  title        = {A Highly Efficient {RFID} Distance Bounding Protocol without Real-Time
                  {PRF} Evaluation},
  booktitle    = {Network and System Security - 7th International Conference, {NSS}
                  2013, Madrid, Spain, June 3-4, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7873},
  pages        = {451--464},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38631-2\_33},
  doi          = {10.1007/978-3-642-38631-2\_33},
  timestamp    = {Tue, 09 Feb 2021 08:50:29 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/ZhuangYWYX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/YangZWY13,
  author       = {Anjia Yang and
                  Yunhui Zhuang and
                  Duncan S. Wong and
                  Guomin Yang},
  editor       = {Javier L{\'{o}}pez and
                  Xinyi Huang and
                  Ravi S. Sandhu},
  title        = {A New Unpredictability-Based {RFID} Privacy Model},
  booktitle    = {Network and System Security - 7th International Conference, {NSS}
                  2013, Madrid, Spain, June 3-4, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7873},
  pages        = {479--492},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38631-2\_35},
  doi          = {10.1007/978-3-642-38631-2\_35},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/YangZWY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiangHSWT13,
  author       = {Kaitai Liang and
                  Qiong Huang and
                  Roman Schlegel and
                  Duncan S. Wong and
                  Chunming Tang},
  title        = {A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {115},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/115},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LiangHSWT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiangFWS13,
  author       = {Kaitai Liang and
                  Liming Fang and
                  Duncan S. Wong and
                  Willy Susilo},
  title        = {A Ciphertext-Policy Attribute-Based Proxy Re-Encryption with Chosen-Ciphertext
                  Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {236},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/236},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiangFWS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuWH13,
  author       = {Dennis Y. W. Liu and
                  Duncan S. Wong and
                  Qiong Huang},
  title        = {Ambiguous One-Move Nominative Signature Without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {711},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/711},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuWH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/HuangMSWW12,
  author       = {Xinyi Huang and
                  Yi Mu and
                  Willy Susilo and
                  Duncan S. Wong and
                  Wei Wu},
  title        = {Certificateless Signatures: New Schemes and Security Models},
  journal      = {Comput. J.},
  volume       = {55},
  number       = {4},
  pages        = {457--474},
  year         = {2012},
  url          = {https://doi.org/10.1093/comjnl/bxr097},
  doi          = {10.1093/COMJNL/BXR097},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/HuangMSWW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/HuangYWS12,
  author       = {Qiong Huang and
                  Guomin Yang and
                  Duncan S. Wong and
                  Willy Susilo},
  title        = {A new efficient optimistic fair exchange protocol without random oracles},
  journal      = {Int. J. Inf. Sec.},
  volume       = {11},
  number       = {1},
  pages        = {53--63},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10207-011-0152-3},
  doi          = {10.1007/S10207-011-0152-3},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/HuangYWS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/WongT12,
  author       = {Duncan S. Wong and
                  Xiaojian Tian},
  title        = {E-mail protocols with perfect forward secrecy},
  journal      = {Int. J. Secur. Networks},
  volume       = {7},
  number       = {1},
  pages        = {1--5},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJSN.2012.048491},
  doi          = {10.1504/IJSN.2012.048491},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/WongT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LiZCKW12,
  author       = {Jin Li and
                  Fangguo Zhang and
                  Xiaofeng Chen and
                  Kwangjo Kim and
                  Duncan S. Wong},
  title        = {Generic security-amplifying methods of ordinary digital signatures},
  journal      = {Inf. Sci.},
  volume       = {201},
  pages        = {128--139},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.ins.2012.03.006},
  doi          = {10.1016/J.INS.2012.03.006},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/LiZCKW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/SchlegelW12,
  author       = {Roman Schlegel and
                  Duncan S. Wong},
  title        = {Anonymous overlay network supporting authenticated routing},
  journal      = {Inf. Sci.},
  volume       = {210},
  pages        = {99--117},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.ins.2012.04.042},
  doi          = {10.1016/J.INS.2012.04.042},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/SchlegelW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TanW12,
  author       = {Xiao Tan and
                  Duncan S. Wong},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {Generalized First Pre-image Tractable Random Oracle Model and Signature
                  Schemes},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {247--260},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_19},
  doi          = {10.1007/978-3-642-31448-3\_19},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/TanW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/MengWSK12,
  author       = {Yuxin Meng and
                  Duncan S. Wong and
                  Roman Schlegel and
                  Lam{-}for Kwok},
  editor       = {Miroslaw Kutylowski and
                  Moti Yung},
  title        = {Touch Gestures Based Biometric Authentication Scheme for Touchscreen
                  Mobile Phones},
  booktitle    = {Information Security and Cryptology - 8th International Conference,
                  Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7763},
  pages        = {331--350},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38519-3\_21},
  doi          = {10.1007/978-3-642-38519-3\_21},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/MengWSK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcom/TangHWP12,
  author       = {Chunming Tang and
                  Xing Hu and
                  Duncan S. Wong and
                  Dingyi Pei},
  title        = {An efficient key distribution scheme in cloud computing},
  booktitle    = {4th {IEEE} International Conference on Cloud Computing Technology
                  and Science Proceedings, CloudCom 2012, Taipei, Taiwan, December 3-6,
                  2012},
  pages        = {557--561},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CloudCom.2012.6427608},
  doi          = {10.1109/CLOUDCOM.2012.6427608},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cloudcom/TangHWP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ChowSW12,
  author       = {Yang{-}Wai Chow and
                  Willy Susilo and
                  Duncan S. Wong},
  editor       = {Tat Wing Chim and
                  Tsz Hon Yuen},
  title        = {Enhancing the Perceived Visual Quality of a Size Invariant Visual
                  Cryptography Scheme},
  booktitle    = {Information and Communications Security - 14th International Conference,
                  {ICICS} 2012, Hong Kong, China, October 29-31, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7618},
  pages        = {10--21},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34129-8\_2},
  doi          = {10.1007/978-3-642-34129-8\_2},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/ChowSW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/YangZW12,
  author       = {Anjia Yang and
                  Yunhui Zhuang and
                  Duncan S. Wong},
  editor       = {Tat Wing Chim and
                  Tsz Hon Yuen},
  title        = {An Efficient Single-Slow-Phase Mutually Authenticated {RFID} Distance
                  Bounding Protocol with Tag Privacy},
  booktitle    = {Information and Communications Security - 14th International Conference,
                  {ICICS} 2012, Hong Kong, China, October 29-31, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7618},
  pages        = {285--292},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34129-8\_25},
  doi          = {10.1007/978-3-642-34129-8\_25},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/YangZW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ZhangXWMY12,
  author       = {Ye Zhang and
                  Chun Jason Xue and
                  Duncan S. Wong and
                  Nikos Mamoulis and
                  Siu{-}Ming Yiu},
  editor       = {Tat Wing Chim and
                  Tsz Hon Yuen},
  title        = {Acceleration of Composite Order Bilinear Pairing on Graphics Hardware},
  booktitle    = {Information and Communications Security - 14th International Conference,
                  {ICICS} 2012, Hong Kong, China, October 29-31, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7618},
  pages        = {341--348},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34129-8\_31},
  doi          = {10.1007/978-3-642-34129-8\_31},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/ZhangXWMY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/LiangLTWT12,
  author       = {Kaitai Liang and
                  Zhen Liu and
                  Xiao Tan and
                  Duncan S. Wong and
                  Chunming Tang},
  editor       = {Taekyoung Kwon and
                  Mun{-}Kyu Lee and
                  Daesung Kwon},
  title        = {A CCA-Secure Identity-Based Conditional Proxy Re-Encryption without
                  Random Oracles},
  booktitle    = {Information Security and Cryptology - {ICISC} 2012 - 15th International
                  Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7839},
  pages        = {231--246},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37682-5\_17},
  doi          = {10.1007/978-3-642-37682-5\_17},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/LiangLTWT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/SchlegelW12,
  author       = {Roman Schlegel and
                  Duncan S. Wong},
  editor       = {Li Xu and
                  Elisa Bertino and
                  Yi Mu},
  title        = {Private Friends on a Social Networking Site Operated by an Overly
                  Curious {SNP}},
  booktitle    = {Network and System Security - 6th International Conference, {NSS}
                  2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7645},
  pages        = {430--444},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34601-9\_33},
  doi          = {10.1007/978-3-642-34601-9\_33},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/SchlegelW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HuangWS12,
  author       = {Qiong Huang and
                  Duncan S. Wong and
                  Willy Susilo},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {The Construction of Ambiguous Optimistic Fair Exchange from Designated
                  Confirmer Signature without Random Oracles},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {120--137},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_8},
  doi          = {10.1007/978-3-642-30057-8\_8},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HuangWS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/LiuW12,
  author       = {Dennis Y. W. Liu and
                  Duncan S. Wong},
  editor       = {Tsuyoshi Takagi and
                  Guilin Wang and
                  Zhiguang Qin and
                  Shaoquan Jiang and
                  Yong Yu},
  title        = {One-Move Convertible Nominative Signature in the Standard Model},
  booktitle    = {Provable Security - 6th International Conference, ProvSec 2012, Chengdu,
                  China, September 26-28, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7496},
  pages        = {2--20},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33272-2\_2},
  doi          = {10.1007/978-3-642-33272-2\_2},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/LiuW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Liu0W12,
  author       = {Guanfeng Liu and
                  Yan Wang and
                  Duncan S. Wong},
  editor       = {Geyong Min and
                  Yulei Wu and
                  Lei (Chris) Liu and
                  Xiaolong Jin and
                  Stephen A. Jarvis and
                  Ahmed Yassin Al{-}Dubai},
  title        = {Multiple QoT Constrained Social Trust Path Selection in Complex Social
                  Networks},
  booktitle    = {11th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2012, Liverpool, United
                  Kingdom, June 25-27, 2012},
  pages        = {624--631},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/TrustCom.2012.210},
  doi          = {10.1109/TRUSTCOM.2012.210},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Liu0W12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TanHW12,
  author       = {Xiao Tan and
                  Qiong Huang and
                  Duncan S. Wong},
  title        = {Concurrent Signature without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {576},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/576},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/TanHW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Li0LJWS12,
  author       = {Jin Li and
                  Xiaofeng Chen and
                  Jingwei Li and
                  Chunfu Jia and
                  Duncan S. Wong and
                  Willy Susilo},
  title        = {Secure Outsourced Attribute-Based Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {605},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/605},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Li0LJWS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuCW12,
  author       = {Zhen Liu and
                  Zhenfu Cao and
                  Duncan S. Wong},
  title        = {Expressive Black-box Traceable Ciphertext-Policy Attribute-Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {669},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/669},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuCW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/HuangWY11,
  author       = {Qiong Huang and
                  Duncan S. Wong and
                  Guomin Yang},
  title        = {Heterogeneous Signcryption with Key Privacy},
  journal      = {Comput. J.},
  volume       = {54},
  number       = {4},
  pages        = {525--536},
  year         = {2011},
  url          = {https://doi.org/10.1093/comjnl/bxq095},
  doi          = {10.1093/COMJNL/BXQ095},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/HuangWY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/HuangYWS11,
  author       = {Qiong Huang and
                  Guomin Yang and
                  Duncan S. Wong and
                  Willy Susilo},
  title        = {Efficient strong designated verifier signature schemes without random
                  oracle or with non-delegatability},
  journal      = {Int. J. Inf. Sec.},
  volume       = {10},
  number       = {6},
  pages        = {373--385},
  year         = {2011},
  url          = {https://doi.org/10.1007/s10207-011-0146-1},
  doi          = {10.1007/S10207-011-0146-1},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/HuangYWS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/HuangWS11,
  author       = {Qiong Huang and
                  Duncan S. Wong and
                  Willy Susilo},
  title        = {Group-oriented fair exchange of signatures},
  journal      = {Inf. Sci.},
  volume       = {181},
  number       = {16},
  pages        = {3267--3283},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.ins.2011.03.024},
  doi          = {10.1016/J.INS.2011.03.024},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/HuangWS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/HuangYWS11,
  author       = {Qiong Huang and
                  Guomin Yang and
                  Duncan S. Wong and
                  Willy Susilo},
  title        = {Identity-based strong designated verifier signature revisited},
  journal      = {J. Syst. Softw.},
  volume       = {84},
  number       = {1},
  pages        = {120--129},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.jss.2010.08.057},
  doi          = {10.1016/J.JSS.2010.08.057},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jss/HuangYWS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuangWS11,
  author       = {Qiong Huang and
                  Duncan S. Wong and
                  Willy Susilo},
  title        = {Efficient Designated Confirmer Signature and DCS-Based Ambiguous Optimistic
                  Fair Exchange},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {6},
  number       = {4},
  pages        = {1233--1247},
  year         = {2011},
  url          = {https://doi.org/10.1109/TIFS.2011.2161290},
  doi          = {10.1109/TIFS.2011.2161290},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HuangWS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiHCCWX11,
  author       = {Jin Li and
                  Qiong Huang and
                  Xiaofeng Chen and
                  Sherman S. M. Chow and
                  Duncan S. Wong and
                  Dongqing Xie},
  editor       = {Bruce S. N. Cheung and
                  Lucas Chi Kwong Hui and
                  Ravi S. Sandhu and
                  Duncan S. Wong},
  title        = {Multi-authority ciphertext-policy attribute-based encryption with
                  accountability},
  booktitle    = {Proceedings of the 6th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24,
                  2011},
  pages        = {386--390},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1966913.1966964},
  doi          = {10.1145/1966913.1966964},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LiHCCWX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/LiuCHWY11,
  author       = {Zhen Liu and
                  Zhenfu Cao and
                  Qiong Huang and
                  Duncan S. Wong and
                  Tsz Hon Yuen},
  editor       = {Vijay Atluri and
                  Claudia D{\'{\i}}az},
  title        = {Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption
                  without Random Oracles},
  booktitle    = {Computer Security - {ESORICS} 2011 - 16th European Symposium on Research
                  in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6879},
  pages        = {278--297},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23822-2\_16},
  doi          = {10.1007/978-3-642-23822-2\_16},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/LiuCHWY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/YangDWTW11,
  author       = {Guomin Yang and
                  Shanshan Duan and
                  Duncan S. Wong and
                  Chik How Tan and
                  Huaxiong Wang},
  editor       = {George Danezis},
  title        = {Authenticated Key Exchange under Bad Randomness},
  booktitle    = {Financial Cryptography and Data Security - 15th International Conference,
                  {FC} 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7035},
  pages        = {113--126},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27576-0\_10},
  doi          = {10.1007/978-3-642-27576-0\_10},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/YangDWTW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/WangWH11,
  author       = {Yuan Wang and
                  Duncan S. Wong and
                  Liusheng Huang},
  title        = {A One-Pass Key Establishment Protocol for Anonymous Wireless Roaming
                  with {PFS}},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2011, Kyoto, Japan, 5-9 June, 2011},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/icc.2011.5962523},
  doi          = {10.1109/ICC.2011.5962523},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/WangWH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/HuangW11,
  author       = {Qiong Huang and
                  Duncan S. Wong},
  editor       = {Feng Bao and
                  Jian Weng},
  title        = {Short Convertible Undeniable Signature in the Standard Model},
  booktitle    = {Information Security Practice and Experience - 7th International Conference,
                  {ISPEC} 2011, Guangzhou, China, May 30 - June 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6672},
  pages        = {257--272},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21031-0\_20},
  doi          = {10.1007/978-3-642-21031-0\_20},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/HuangW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/HuangWSY11,
  author       = {Qiong Huang and
                  Duncan S. Wong and
                  Willy Susilo and
                  Bo Yang},
  editor       = {Xuejia Lai and
                  Jianying Zhou and
                  Hui Li},
  title        = {An Efficient Construction of Time-Selective Convertible Undeniable
                  Signatures},
  booktitle    = {Information Security, 14th International Conference, {ISC} 2011, Xi'an,
                  China, October 26-29, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7001},
  pages        = {355--371},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24861-0\_24},
  doi          = {10.1007/978-3-642-24861-0\_24},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/HuangWSY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/YuenWSH11,
  author       = {Tsz Hon Yuen and
                  Duncan S. Wong and
                  Willy Susilo and
                  Qiong Huang},
  editor       = {Xavier Boyen and
                  Xiaofeng Chen},
  title        = {Concurrent Signatures with Fully Negotiable Binding Control},
  booktitle    = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an,
                  China, October 16-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6980},
  pages        = {170--187},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24316-5\_13},
  doi          = {10.1007/978-3-642-24316-5\_13},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/YuenWSH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2011asia,
  editor       = {Bruce S. N. Cheung and
                  Lucas Chi Kwong Hui and
                  Ravi S. Sandhu and
                  Duncan S. Wong},
  title        = {Proceedings of the 6th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24,
                  2011},
  publisher    = {{ACM}},
  year         = {2011},
  isbn         = {978-1-4503-0564-8},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2011asia.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangXWMY11,
  author       = {Ye Zhang and
                  Chun Jason Xue and
                  Duncan S. Wong and
                  Nikos Mamoulis and
                  Siu{-}Ming Yiu},
  title        = {Acceleration of Composite Order Bilinear Pairing on Graphics Hardware},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {196},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/196},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangXWMY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangDWTW11,
  author       = {Guomin Yang and
                  Shanshan Duan and
                  Duncan S. Wong and
                  Chik How Tan and
                  Huaxiong Wang},
  title        = {Authenticated Key Exchange under Bad Randomness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {688},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/688},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YangDWTW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LiW10,
  author       = {Chung Ki Li and
                  Duncan S. Wong},
  title        = {Signcryption from randomness recoverable public key encryption},
  journal      = {Inf. Sci.},
  volume       = {180},
  number       = {4},
  pages        = {549--559},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.ins.2009.10.015},
  doi          = {10.1016/J.INS.2009.10.015},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/LiW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/LiYWDC10,
  author       = {Chung Ki Li and
                  Guomin Yang and
                  Duncan S. Wong and
                  Xiaotie Deng and
                  Sherman S. M. Chow},
  title        = {An efficient signcryption scheme with key privacy and its extension
                  to ring signcryption},
  journal      = {J. Comput. Secur.},
  volume       = {18},
  number       = {3},
  pages        = {451--473},
  year         = {2010},
  url          = {https://doi.org/10.3233/JCS-2009-0374},
  doi          = {10.3233/JCS-2009-0374},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/LiYWDC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/HuangW10,
  author       = {Qiong Huang and
                  Duncan S. Wong},
  title        = {Generic Certificateless Encryption Secure Against Malicious-but-Passive
                  {KGC} Attacks in the Standard Model},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {25},
  number       = {4},
  pages        = {807--826},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11390-010-9367-4},
  doi          = {10.1007/S11390-010-9367-4},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcst/HuangW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/YangHWD10,
  author       = {Guomin Yang and
                  Qiong Huang and
                  Duncan S. Wong and
                  Xiaotie Deng},
  title        = {Universal authentication protocols for anonymous wireless communications},
  journal      = {{IEEE} Trans. Wirel. Commun.},
  volume       = {9},
  number       = {1},
  pages        = {168--174},
  year         = {2010},
  url          = {https://doi.org/10.1109/TWC.2010.01.081219},
  doi          = {10.1109/TWC.2010.01.081219},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/twc/YangHWD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/YangTHW10,
  author       = {Guomin Yang and
                  Chik How Tan and
                  Qiong Huang and
                  Duncan S. Wong},
  editor       = {Josef Pieprzyk},
  title        = {Probabilistic Public Key Encryption with Equality Test},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2010, The Cryptographers' Track at
                  the {RSA} Conference 2010, San Francisco, CA, USA, March 1-5, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5985},
  pages        = {119--131},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11925-5\_9},
  doi          = {10.1007/978-3-642-11925-5\_9},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/YangTHW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/HuangWS10,
  author       = {Qiong Huang and
                  Duncan S. Wong and
                  Willy Susilo},
  editor       = {Marc Joye and
                  Atsuko Miyaji and
                  Akira Otsuka},
  title        = {A New Construction of Designated Confirmer Signature and Its Application
                  to Optimistic Fair Exchange - (Extended Abstract)},
  booktitle    = {Pairing-Based Cryptography - Pairing 2010 - 4th International Conference,
                  Yamanaka Hot Spring, Japan, December 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6487},
  pages        = {41--61},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17455-1\_4},
  doi          = {10.1007/978-3-642-17455-1\_4},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/HuangWS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/ZhangAWHMCY10,
  author       = {Ye Zhang and
                  Man Ho Au and
                  Duncan S. Wong and
                  Qiong Huang and
                  Nikos Mamoulis and
                  David W. Cheung and
                  Siu{-}Ming Yiu},
  editor       = {Marc Joye and
                  Atsuko Miyaji and
                  Akira Otsuka},
  title        = {Oblivious Transfer with Access Control : Realizing Disjunction without
                  Duplication},
  booktitle    = {Pairing-Based Cryptography - Pairing 2010 - 4th International Conference,
                  Yamanaka Hot Spring, Japan, December 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6487},
  pages        = {96--115},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17455-1\_7},
  doi          = {10.1007/978-3-642-17455-1\_7},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/ZhangAWHMCY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/TsangALSW10,
  author       = {Patrick P. Tsang and
                  Man Ho Au and
                  Joseph K. Liu and
                  Willy Susilo and
                  Duncan S. Wong},
  editor       = {Swee{-}Huay Heng and
                  Kaoru Kurosawa},
  title        = {A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with
                  Different Levels of Anonymity (Extended Abstract)},
  booktitle    = {Provable Security - 4th International Conference, ProvSec 2010, Malacca,
                  Malaysia, October 13-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6402},
  pages        = {166--183},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16280-0\_11},
  doi          = {10.1007/978-3-642-16280-0\_11},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/TsangALSW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/WuWL10,
  author       = {Xiaoyu Wu and
                  Duncan S. Wong and
                  Qing Li},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Extended Visual Cryptography Scheme for Color Images with no Pixel
                  Expansion},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {423--426},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 08:40:23 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/WuWL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/XiongWD10,
  author       = {Xiaokang Xiong and
                  Duncan S. Wong and
                  Xiaotie Deng},
  title        = {TinyPairing: {A} Fast and Lightweight Pairing-Based Cryptographic
                  Library for Wireless Sensor Networks},
  booktitle    = {2010 {IEEE} Wireless Communications and Networking Conference, {WCNC}
                  2010, Proceedings, Sydney, Australia, 18-21 April 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WCNC.2010.5506580},
  doi          = {10.1109/WCNC.2010.5506580},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wcnc/XiongWD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/SchlegelW10,
  author       = {Roman Schlegel and
                  Duncan S. Wong},
  title        = {An efficient routing protocol for anonymous networks},
  booktitle    = {Proceedings of the {IEEE} International Conference on Wireless Communications,
                  Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
                  Beijing, China},
  pages        = {349--353},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WCINS.2010.5541798},
  doi          = {10.1109/WCINS.2010.5541798},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnis/SchlegelW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/WangWH10,
  author       = {Yuan Wang and
                  Duncan S. Wong and
                  Liusheng Huang},
  title        = {One-pass key establishment for anonymous wireless roaming},
  booktitle    = {Proceedings of the {IEEE} International Conference on Wireless Communications,
                  Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
                  Beijing, China},
  pages        = {533--537},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WCINS.2010.5541836},
  doi          = {10.1109/WCINS.2010.5541836},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnis/WangWH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ChangWMZ09,
  author       = {Shuang Chang and
                  Duncan S. Wong and
                  Yi Mu and
                  Zhenfeng Zhang},
  title        = {Certificateless Threshold Ring Signature},
  journal      = {Inf. Sci.},
  volume       = {179},
  number       = {20},
  pages        = {3685--3696},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.ins.2009.06.017},
  doi          = {10.1016/J.INS.2009.06.017},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/ChangWMZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pr/LeungNW09,
  author       = {Bert W. Leung and
                  Felix Y. Ng and
                  Duncan S. Wong},
  title        = {On the security of a visual cryptography scheme for color images},
  journal      = {Pattern Recognit.},
  volume       = {42},
  number       = {5},
  pages        = {929--940},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.patcog.2008.08.031},
  doi          = {10.1016/J.PATCOG.2008.08.031},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pr/LeungNW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soca/WangLWV09,
  author       = {Yan Wang and
                  Kwei{-}Jay Lin and
                  Duncan S. Wong and
                  Vijay Varadharajan},
  title        = {Trust management towards service-oriented applications},
  journal      = {Serv. Oriented Comput. Appl.},
  volume       = {3},
  number       = {2},
  pages        = {129--146},
  year         = {2009},
  url          = {https://doi.org/10.1007/s11761-008-0035-2},
  doi          = {10.1007/S11761-008-0035-2},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/soca/WangLWV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cocoon/YuenHMSWY09,
  author       = {Tsz Hon Yuen and
                  Qiong Huang and
                  Yi Mu and
                  Willy Susilo and
                  Duncan S. Wong and
                  Guomin Yang},
  editor       = {Hung Q. Ngo},
  title        = {Efficient Non-interactive Range Proof},
  booktitle    = {Computing and Combinatorics, 15th Annual International Conference,
                  {COCOON} 2009, Niagara Falls, NY, USA, July 13-15, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5609},
  pages        = {138--147},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02882-3\_15},
  doi          = {10.1007/978-3-642-02882-3\_15},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cocoon/YuenHMSWY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/SchlegelW09,
  author       = {Roman Schlegel and
                  Duncan S. Wong},
  editor       = {Dominik Slezak and
                  Tai{-}Hoon Kim and
                  Alan Chin{-}Chen Chang and
                  Thanos Vasilakos and
                  Mingchu Li and
                  Kouichi Sakurai},
  title        = {Monotonically Increasing Bit Vector for Authenticated Anonymous Routing},
  booktitle    = {Communication and Networking - International Conference, {FGCN/ACN}
                  2009, Held as Part of the Future Generation Information Technology
                  Conference, {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009.
                  Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {56},
  pages        = {89--96},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10844-0\_12},
  doi          = {10.1007/978-3-642-10844-0\_12},
  timestamp    = {Tue, 23 May 2017 01:07:31 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/SchlegelW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/JinWX09,
  author       = {Haimin Jin and
                  Duncan S. Wong and
                  Yinlong Xu},
  editor       = {Dominik Slezak and
                  Tai{-}Hoon Kim and
                  Wai{-}Chi Fang and
                  Kirk P. Arnett},
  title        = {Efficient Group Signature with Forward Secure Revocation},
  booktitle    = {Security Technology - International Conference, SecTech 2009, Held
                  as Part of the Future Generation Information Technology Conference,
                  {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {58},
  pages        = {124--131},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10847-1\_16},
  doi          = {10.1007/978-3-642-10847-1\_16},
  timestamp    = {Tue, 23 May 2017 01:07:31 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/JinWX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/ThorncharoensriHSAMW09,
  author       = {Pairat Thorncharoensri and
                  Qiong Huang and
                  Willy Susilo and
                  Man Ho Au and
                  Yi Mu and
                  Duncan S. Wong},
  editor       = {Dominik Slezak and
                  Tai{-}Hoon Kim and
                  Wai{-}Chi Fang and
                  Kirk P. Arnett},
  title        = {Escrowed Deniable Identification Schemes},
  booktitle    = {Security Technology - International Conference, SecTech 2009, Held
                  as Part of the Future Generation Information Technology Conference,
                  {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {58},
  pages        = {234--241},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10847-1\_29},
  doi          = {10.1007/978-3-642-10847-1\_29},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/ThorncharoensriHSAMW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nca/XiongWD09,
  author       = {Xiaokang Xiong and
                  Duncan S. Wong and
                  Xiaotie Deng},
  title        = {TinyPairing: Computing Tate Pairing on Sensor Nodes with Higher Speed
                  and Less Memory},
  booktitle    = {Proceedings of The Eighth {IEEE} International Symposium on Networking
                  Computing and Applications, {NCA} 2009, July 9-11, 2009, Cambridge,
                  Massachusetts, {USA}},
  pages        = {187--194},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/NCA.2009.30},
  doi          = {10.1109/NCA.2009.30},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nca/XiongWD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SchlegelW09,
  author       = {Roman Schlegel and
                  Duncan S. Wong},
  title        = {Low Latency High Bandwidth Anonymous Overlay Network with Anonymous
                  Routing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {294},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/294},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SchlegelW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuangWS09,
  author       = {Qiong Huang and
                  Duncan S. Wong and
                  Willy Susilo},
  title        = {Group-Oriented Fair Exchange of Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {324},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/324},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuangWS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuangSW09,
  author       = {Qiong Huang and
                  Willy Susilo and
                  Duncan S. Wong},
  title        = {Non-delegatable Identity-based Designated Verifier Signature},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {367},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/367},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuangSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuangW09,
  author       = {Qiong Huang and
                  Duncan S. Wong},
  title        = {New Constructions of Convertible Undeniable Signature Schemes without
                  Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {517},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/517},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HuangW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuangYWS09,
  author       = {Qiong Huang and
                  Guomin Yang and
                  Duncan S. Wong and
                  Willy Susilo},
  title        = {Efficient Strong Designated Verifier Signature Schemes without Random
                  Oracles or Delegatability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {518},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/518},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuangYWS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/HuangW08,
  author       = {Qiong Huang and
                  Duncan S. Wong},
  title        = {On the relation among various security models for certificateless
                  cryptography},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {1},
  number       = {2},
  pages        = {108--119},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJACT.2008.021084},
  doi          = {10.1504/IJACT.2008.021084},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijact/HuangW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/HuangLW08,
  author       = {Qiong Huang and
                  Dennis Y. W. Liu and
                  Duncan S. Wong},
  title        = {An efficient one-move Nominative Signature scheme},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {1},
  number       = {2},
  pages        = {133--143},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJACT.2008.021086},
  doi          = {10.1504/IJACT.2008.021086},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijact/HuangLW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LiuW08,
  author       = {Joseph K. Liu and
                  Duncan S. Wong},
  title        = {Solutions to Key Exposure Problem in Ring Signature},
  journal      = {Int. J. Netw. Secur.},
  volume       = {6},
  number       = {2},
  pages        = {170--180},
  year         = {2008},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v6-n2/ijns-2008-v6-n2-p170-180.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LiuW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isem/WangWLV08,
  author       = {Yan Wang and
                  Duncan S. Wong and
                  Kwei{-}Jay Lin and
                  Vijay Varadharajan},
  title        = {Evaluating transaction trust and risk levels in peer-to-peer e-commerce
                  environments},
  journal      = {Inf. Syst. {E} Bus. Manag.},
  volume       = {6},
  number       = {1},
  pages        = {25--48},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10257-007-0056-y},
  doi          = {10.1007/S10257-007-0056-Y},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isem/WangWLV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/YangWWD08,
  author       = {Guomin Yang and
                  Duncan S. Wong and
                  Huaxiong Wang and
                  Xiaotie Deng},
  title        = {Two-factor mutual authentication based on smart cards and passwords},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {74},
  number       = {7},
  pages        = {1160--1172},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.jcss.2008.04.002},
  doi          = {10.1016/J.JCSS.2008.04.002},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcss/YangWWD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/HuangWLZ08,
  author       = {Qiong Huang and
                  Duncan S. Wong and
                  Jin Li and
                  Yiming Zhao},
  title        = {Generic Transformation from Weakly to Strongly Unforgeable Signatures},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {23},
  number       = {2},
  pages        = {240--252},
  year         = {2008},
  url          = {https://doi.org/10.1007/s11390-008-9126-y},
  doi          = {10.1007/S11390-008-9126-Y},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcst/HuangWLZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/ChenSWWDLMMMPPS08,
  author       = {Liqun Chen and
                  Willy Susilo and
                  Huaxiong Wang and
                  Duncan S. Wong and
                  Ed Dawson and
                  Xuejia Lai and
                  Masahiro Mambo and
                  Atsuko Miyaji and
                  Yi Mu and
                  David Pointcheval and
                  Bart Preneel and
                  Nigel P. Smart},
  title        = {Cryptography in Computer System Security},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {14},
  number       = {3},
  pages        = {314--317},
  year         = {2008},
  url          = {http://www.jucs.org/jucs\_14\_3/cryptography\_in\_computer\_system},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jucs/ChenSWWDLMMMPPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/YangWD08,
  author       = {Guomin Yang and
                  Duncan S. Wong and
                  Xiaotie Deng},
  title        = {Formal Security Definition and Efficient Construction for Roaming
                  with a Privacy-Preserving Extension},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {14},
  number       = {3},
  pages        = {441--462},
  year         = {2008},
  url          = {https://doi.org/10.3217/jucs-014-03-0441},
  doi          = {10.3217/JUCS-014-03-0441},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jucs/YangWD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mis/WangWW08,
  author       = {Yan Wang and
                  Duncan S. Wong and
                  Huaxiong Wang},
  title        = {Employ a mobile agent for making a payment},
  journal      = {Mob. Inf. Syst.},
  volume       = {4},
  number       = {1},
  pages        = {51--68},
  year         = {2008},
  url          = {https://doi.org/10.1155/2008/402519},
  doi          = {10.1155/2008/402519},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mis/WangWW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/YangCWDW08,
  author       = {Guomin Yang and
                  Jing Chen and
                  Duncan S. Wong and
                  Xiaotie Deng and
                  Dongsheng Wang},
  title        = {A new framework for the design and analysis of identity-based identification
                  schemes},
  journal      = {Theor. Comput. Sci.},
  volume       = {407},
  number       = {1-3},
  pages        = {370--388},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.tcs.2008.07.001},
  doi          = {10.1016/J.TCS.2008.07.001},
  timestamp    = {Mon, 29 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/YangCWDW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/WangW08,
  author       = {Huaxiong Wang and
                  Duncan S. Wong},
  title        = {On Secret Reconstruction in Secret Sharing Schemes},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {54},
  number       = {1},
  pages        = {473--480},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIT.2007.911179},
  doi          = {10.1109/TIT.2007.911179},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/WangW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/AuHLSWY08,
  author       = {Man Ho Au and
                  Qiong Huang and
                  Joseph K. Liu and
                  Willy Susilo and
                  Duncan S. Wong and
                  Guomin Yang},
  editor       = {Steven M. Bellovin and
                  Rosario Gennaro and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Traceable and Retrievable Identity-Based Encryption},
  booktitle    = {Applied Cryptography and Network Security, 6th International Conference,
                  {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5037},
  pages        = {94--110},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68914-0\_6},
  doi          = {10.1007/978-3-540-68914-0\_6},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/AuHLSWY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LiKZW08,
  author       = {Jin Li and
                  Kwangjo Kim and
                  Fangguo Zhang and
                  Duncan S. Wong},
  editor       = {Steven M. Bellovin and
                  Rosario Gennaro and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Generic Security-Amplifying Methods of Ordinary Digital Signatures},
  booktitle    = {Applied Cryptography and Network Security, 6th International Conference,
                  {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5037},
  pages        = {224--241},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68914-0\_14},
  doi          = {10.1007/978-3-540-68914-0\_14},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/LiKZW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/HuangYWS08,
  author       = {Qiong Huang and
                  Guomin Yang and
                  Duncan S. Wong and
                  Willy Susilo},
  editor       = {Josef Pieprzyk},
  title        = {Ambiguous Optimistic Fair Exchange},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Melbourne, Australia, December 7-11, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5350},
  pages        = {74--89},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89255-7\_6},
  doi          = {10.1007/978-3-540-89255-7\_6},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/HuangYWS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/HuangYWS08,
  author       = {Qiong Huang and
                  Guomin Yang and
                  Duncan S. Wong and
                  Willy Susilo},
  editor       = {Tal Malkin},
  title        = {Efficient Optimistic Fair Exchange Secure in the Multi-user Setting
                  and Chosen-Key Model without Random Oracles},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2008, The Cryptographers' Track at
                  the {RSA} Conference 2008, San Francisco, CA, USA, April 8-11, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4964},
  pages        = {106--120},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79263-5\_7},
  doi          = {10.1007/978-3-540-79263-5\_7},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/HuangYWS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ChowLW08,
  author       = {Sherman S. M. Chow and
                  Joseph K. Liu and
                  Duncan S. Wong},
  title        = {Robust Receipt-Free Election System with Ballot Secrecy and Verifiability},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2008, San Diego, California, USA, 10th February - 13th February
                  2008},
  publisher    = {The Internet Society},
  year         = {2008},
  url          = {https://www.ndss-symposium.org/ndss2008/robust-receipt-free-election-system-ballot-secrecy-and-verifiability/},
  timestamp    = {Mon, 01 Feb 2021 08:42:15 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/ChowLW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cans/2008,
  editor       = {Matthew K. Franklin and
                  Lucas Chi Kwong Hui and
                  Duncan S. Wong},
  title        = {Cryptology and Network Security, 7th International Conference, {CANS}
                  2008, Hong-Kong, China, December 2-4, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5339},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89641-8},
  doi          = {10.1007/978-3-540-89641-8},
  isbn         = {978-3-540-89640-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JiangCWWD08,
  author       = {Junjie Jiang and
                  Jing Chen and
                  Jian Wang and
                  Duncan S. Wong and
                  Xiaotie Deng},
  title        = {High Performance Architecture for Elliptic Curve Scalar Multiplication
                  over GF(2\({}^{\mbox{m}}\))},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {66},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/066},
  timestamp    = {Thu, 21 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JiangCWWD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JinWX08,
  author       = {Haimin Jin and
                  Duncan S. Wong and
                  Yinlong Xu},
  title        = {Complexity Analysis of a Fast Modular Multiexponentiation Algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {210},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/210},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JinWX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeungNW08,
  author       = {Bert W. Leung and
                  Felix Y. Ng and
                  Duncan S. Wong},
  title        = {On the Security of a Visual Cryptography Scheme for Color Images},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {223},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/223},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeungNW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HuWZD07,
  author       = {Bessie C. Hu and
                  Duncan S. Wong and
                  Zhenfeng Zhang and
                  Xiaotie Deng},
  title        = {Certificateless signature: a new security model and an improved generic
                  construction},
  journal      = {Des. Codes Cryptogr.},
  volume       = {42},
  number       = {2},
  pages        = {109--126},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10623-006-9022-9},
  doi          = {10.1007/S10623-006-9022-9},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/HuWZD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/TianZW07,
  author       = {Xiaojian Tian and
                  Robert W. Zhu and
                  Duncan S. Wong},
  title        = {Improved Efficient Remote User Authentication Schemes},
  journal      = {Int. J. Netw. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {149--154},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n2/ijns-2007-v4-n2-p149-154.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/TianZW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LiuW07,
  author       = {Joseph K. Liu and
                  Duncan S. Wong},
  title        = {A More Efficient Instantiation of Witness-Indistinguishable Signature},
  journal      = {Int. J. Netw. Secur.},
  volume       = {5},
  number       = {2},
  pages        = {199--204},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v5-n2/ijns-2007-v5-n2-p199-204.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LiuW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/LiuLMSW07,
  author       = {Dennis Y. W. Liu and
                  Joseph K. Liu and
                  Yi Mu and
                  Willy Susilo and
                  Duncan S. Wong},
  title        = {Revocable Ring Signature},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {22},
  number       = {6},
  pages        = {785--794},
  year         = {2007},
  url          = {https://doi.org/10.1007/s11390-007-9096-5},
  doi          = {10.1007/S11390-007-9096-5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcst/LiuLMSW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/ZhuYW07,
  author       = {Robert W. Zhu and
                  Guomin Yang and
                  Duncan S. Wong},
  title        = {An efficient identity-based key exchange protocol with {KGS} forward
                  secrecy for low-power devices},
  journal      = {Theor. Comput. Sci.},
  volume       = {378},
  number       = {2},
  pages        = {198--207},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.tcs.2007.02.021},
  doi          = {10.1016/J.TCS.2007.02.021},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/ZhuYW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/YangWD07,
  author       = {Guomin Yang and
                  Duncan S. Wong and
                  Xiaotie Deng},
  title        = {Anonymous and Authenticated Key Exchange for Roaming Networks},
  journal      = {{IEEE} Trans. Wirel. Commun.},
  volume       = {6},
  number       = {9},
  pages        = {3461--3472},
  year         = {2007},
  url          = {https://doi.org/10.1109/TWC.2007.06020042},
  doi          = {10.1109/TWC.2007.06020042},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/twc/YangWD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HuangW07,
  author       = {Qiong Huang and
                  Duncan S. Wong},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {Generic Certificateless Key Encapsulation Mechanism},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {215--229},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_17},
  doi          = {10.1007/978-3-540-73458-1\_17},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/HuangW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HuangMSWW07,
  author       = {Xinyi Huang and
                  Yi Mu and
                  Willy Susilo and
                  Duncan S. Wong and
                  Wei Wu},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {Certificateless Signature Revisited},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {308--322},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_23},
  doi          = {10.1007/978-3-540-73458-1\_23},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HuangMSWW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/HuangWZ07,
  author       = {Qiong Huang and
                  Duncan S. Wong and
                  Yiming Zhao},
  editor       = {Jonathan Katz and
                  Moti Yung},
  title        = {Generic Transformation to Strongly Unforgeable Signatures},
  booktitle    = {Applied Cryptography and Network Security, 5th International Conference,
                  {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4521},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72738-5\_1},
  doi          = {10.1007/978-3-540-72738-5\_1},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/HuangWZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/YangCWDW07,
  author       = {Guomin Yang and
                  Jing Chen and
                  Duncan S. Wong and
                  Xiaotie Deng and
                  Dongsheng Wang},
  editor       = {Jonathan Katz and
                  Moti Yung},
  title        = {A More Natural Way to Construct Identity-Based Identification Schemes},
  booktitle    = {Applied Cryptography and Network Security, 5th International Conference,
                  {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4521},
  pages        = {307--322},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72738-5\_20},
  doi          = {10.1007/978-3-540-72738-5\_20},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/YangCWDW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/GuoWWH07,
  author       = {Lifeng Guo and
                  Guilin Wang and
                  Duncan S. Wong and
                  Lei Hu},
  editor       = {Selim Aissi and
                  Hamid R. Arabnia},
  title        = {Further Discussions on the Security of a Nominative Signature Scheme},
  booktitle    = {Proceedings of the 2007 International Conference on Security {\&}
                  Management, {SAM} 2007, Las Vegas, Nevada, USA, June 25-28, 2007},
  pages        = {566--572},
  publisher    = {{CSREA} Press},
  year         = {2007},
  timestamp    = {Wed, 12 Dec 2007 16:45:17 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/GuoWWH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/LiYWDC07,
  author       = {Chung Ki Li and
                  Guomin Yang and
                  Duncan S. Wong and
                  Xiaotie Deng and
                  Sherman S. M. Chow},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati and
                  Josep L. Ferrer},
  title        = {An Efficient Signcryption Scheme with Key Privacy},
  booktitle    = {Public Key Infrastructure, 4th European {PKI} Workshop: Theory and
                  Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4582},
  pages        = {78--93},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73408-6\_6},
  doi          = {10.1007/978-3-540-73408-6\_6},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/LiYWDC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/HuWHYD07,
  author       = {Bessie C. Hu and
                  Duncan S. Wong and
                  Qiong Huang and
                  Guomin Yang and
                  Xiaotie Deng},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati and
                  Josep L. Ferrer},
  title        = {Time Capsule Signature: Efficient and Provably Secure Constructions},
  booktitle    = {Public Key Infrastructure, 4th European {PKI} Workshop: Theory and
                  Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4582},
  pages        = {126--142},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73408-6\_9},
  doi          = {10.1007/978-3-540-73408-6\_9},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/HuWHYD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/ChowW07,
  author       = {Sherman S. M. Chow and
                  Duncan S. Wong},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati and
                  Josep L. Ferrer},
  title        = {Anonymous Identification and Designated-Verifiers Signatures from
                  Insecure Batch Verification},
  booktitle    = {Public Key Infrastructure, 4th European {PKI} Workshop: Theory and
                  Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4582},
  pages        = {203--219},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73408-6\_15},
  doi          = {10.1007/978-3-540-73408-6\_15},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/europki/ChowW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icebe/WangWLV07,
  author       = {Yan Wang and
                  Duncan S. Wong and
                  Kwei{-}Jay Lin and
                  Vijay Varadharajan},
  editor       = {S. C. Cheung and
                  Yinsheng Li and
                  Kuo{-}Ming Chao and
                  Muhammad Younas and
                  Jen{-}Yao Chung},
  title        = {The Design of {A} Rule-based and Event-driven Trust Management Framework},
  booktitle    = {Proceedings of {ICEBE} 2007, {IEEE} International Conference on e-Business
                  Engineering and the Workshops {SOAIC} 2007, {SOSE} 2007, {SOKM} 2007,
                  24-26 October, 2007, Hong Kong, China},
  pages        = {97--104},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICEBE.2007.28},
  doi          = {10.1109/ICEBE.2007.28},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icebe/WangWLV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/JinWX07,
  author       = {Haimin Jin and
                  Duncan S. Wong and
                  Yinlong Xu},
  editor       = {Sihan Qing and
                  Hideki Imai and
                  Guilin Wang},
  title        = {An Efficient Password-Only Two-Server Authenticated Key Exchange System},
  booktitle    = {Information and Communications Security, 9th International Conference,
                  {ICICS} 2007, Zhengzhou, China, December 12-15, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4861},
  pages        = {44--56},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77048-0\_4},
  doi          = {10.1007/978-3-540-77048-0\_4},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/JinWX07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/LiuWHWHMS07,
  author       = {Dennis Y. W. Liu and
                  Duncan S. Wong and
                  Xinyi Huang and
                  Guilin Wang and
                  Qiong Huang and
                  Yi Mu and
                  Willy Susilo},
  editor       = {Sihan Qing and
                  Hideki Imai and
                  Guilin Wang},
  title        = {Formal Definition and Construction of Nominative Signature},
  booktitle    = {Information and Communications Security, 9th International Conference,
                  {ICICS} 2007, Zhengzhou, China, December 12-15, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4861},
  pages        = {57--68},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77048-0\_5},
  doi          = {10.1007/978-3-540-77048-0\_5},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/LiuWHWHMS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/HuangW07,
  author       = {Qiong Huang and
                  Duncan S. Wong},
  editor       = {Atsuko Miyaji and
                  Hiroaki Kikuchi and
                  Kai Rannenberg},
  title        = {Generic Certificateless Encryption in the Standard Model},
  booktitle    = {Advances in Information and Computer Security, Second International
                  Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4752},
  pages        = {278--291},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75651-4\_19},
  doi          = {10.1007/978-3-540-75651-4\_19},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/HuangW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/LiuCWM07,
  author       = {Dennis Y. W. Liu and
                  Shuang Chang and
                  Duncan S. Wong and
                  Yi Mu},
  editor       = {Atsuko Miyaji and
                  Hiroaki Kikuchi and
                  Kai Rannenberg},
  title        = {Nominative Signature from Ring Signature},
  booktitle    = {Advances in Information and Computer Security, Second International
                  Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4752},
  pages        = {396--411},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75651-4\_27},
  doi          = {10.1007/978-3-540-75651-4\_27},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/LiuCWM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/WangBWB07,
  author       = {Guilin Wang and
                  Joonsang Baek and
                  Duncan S. Wong and
                  Feng Bao},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {On the Generic and Efficient Constructions of Secure Designated Confirmer
                  Signatures},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {43--60},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_4},
  doi          = {10.1007/978-3-540-71677-8\_4},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/WangBWB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/LiuCW07,
  author       = {Dennis Y. W. Liu and
                  Shuang Chang and
                  Duncan S. Wong},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {A More Efficient Convertible Nominative Signature},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {214--221},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 13:27:09 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/LiuCW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ispec/2007,
  editor       = {Ed Dawson and
                  Duncan S. Wong},
  title        = {Information Security Practice and Experience, Third International
                  Conference, {ISPEC} 2007, Hong Kong, China, May 7-9, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4464},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72163-5},
  doi          = {10.1007/978-3-540-72163-5},
  isbn         = {978-3-540-72159-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuWHWHMS07,
  author       = {Dennis Y. W. Liu and
                  Duncan S. Wong and
                  Xinyi Huang and
                  Guilin Wang and
                  Qiong Huang and
                  Yi Mu and
                  Willy Susilo},
  title        = {Nominative Signature: Application, Security Model and Construction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {69},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/069},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuWHWHMS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuangW07,
  author       = {Qiong Huang and
                  Duncan S. Wong},
  title        = {Generic Certificateless Encryption in the Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {95},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/095},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HuangW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuWHYD07,
  author       = {Bessie C. Hu and
                  Duncan S. Wong and
                  Qiong Huang and
                  Guomin Yang and
                  Xiaotie Deng},
  title        = {Time Capsule Signature: Efficient and Provably Secure Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {146},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/146},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuWHYD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuHW07,
  author       = {Dennis Y. W. Liu and
                  Qiong Huang and
                  Duncan S. Wong},
  title        = {An Efficient One-move Nominative Signature Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {260},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/260},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuHW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangWHD07,
  author       = {Guomin Yang and
                  Duncan S. Wong and
                  Qiong Huang and
                  Xiaotie Deng},
  title        = {A New Security Definition for Public Key Encryption Schemes and Its
                  Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {319},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/319},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YangWHD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LongPWW06,
  author       = {Shoulun Long and
                  Josef Pieprzyk and
                  Huaxiong Wang and
                  Duncan S. Wong},
  title        = {Generalised Cumulative Arrays in Secret Sharing},
  journal      = {Des. Codes Cryptogr.},
  volume       = {40},
  number       = {2},
  pages        = {191--209},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10623-006-0007-5},
  doi          = {10.1007/S10623-006-0007-5},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LongPWW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/ZhuWL06,
  author       = {Robert W. Zhu and
                  Duncan S. Wong and
                  Chan H. Lee},
  title        = {Cryptanalysis of a suite of deniable authentication protocols},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {10},
  number       = {6},
  pages        = {504--506},
  year         = {2006},
  url          = {https://doi.org/10.1109/LCOMM.2006.1638630},
  doi          = {10.1109/LCOMM.2006.1638630},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icl/ZhuWL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijfcs/Safavi-NainiWW06,
  author       = {Reihaneh Safavi{-}Naini and
                  Huaxiong Wang and
                  Duncan S. Wong},
  title        = {Resilient Lkh: Secure Multicast Key Distribution Schemes},
  journal      = {Int. J. Found. Comput. Sci.},
  volume       = {17},
  number       = {5},
  pages        = {1205--1222},
  year         = {2006},
  url          = {https://doi.org/10.1142/S0129054106004340},
  doi          = {10.1142/S0129054106004340},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijfcs/Safavi-NainiWW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijfcs/LiuW06,
  author       = {Joseph K. Liu and
                  Duncan S. Wong},
  title        = {Enhanced Security Models and a Generic Construction Approach for Linkable
                  Ring Signature},
  journal      = {Int. J. Found. Comput. Sci.},
  volume       = {17},
  number       = {6},
  pages        = {1403--1422},
  year         = {2006},
  url          = {https://doi.org/10.1142/S0129054106004480},
  doi          = {10.1142/S0129054106004480},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijfcs/LiuW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HuWZD06,
  author       = {Bessie C. Hu and
                  Duncan S. Wong and
                  Zhenfeng Zhang and
                  Xiaotie Deng},
  editor       = {Lynn Margaret Batten and
                  Reihaneh Safavi{-}Naini},
  title        = {Key Replacement Attack Against a Generic Construction of Certificateless
                  Signature},
  booktitle    = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
                  2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4058},
  pages        = {235--246},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11780656\_20},
  doi          = {10.1007/11780656\_20},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HuWZD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ZhangWXF06,
  author       = {Zhenfeng Zhang and
                  Duncan S. Wong and
                  Jing Xu and
                  Dengguo Feng},
  editor       = {Jianying Zhou and
                  Moti Yung and
                  Feng Bao},
  title        = {Certificateless Public-Key Signature: Security Model and Efficient
                  Construction},
  booktitle    = {Applied Cryptography and Network Security, 4th International Conference,
                  {ACNS} 2006, Singapore, June 6-9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3989},
  pages        = {293--308},
  year         = {2006},
  url          = {https://doi.org/10.1007/11767480\_20},
  doi          = {10.1007/11767480\_20},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/ZhangWXF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/TianW06,
  author       = {Xiaojian Tian and
                  Duncan S. Wong},
  editor       = {David Pointcheval},
  title        = {Session Corruption Attack and Improvements on Encryption Based MT-Authenticators},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2006, The Cryptographers' Track at
                  the {RSA} Conference 2006, San Jose, CA, USA, February 13-17, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3860},
  pages        = {34--51},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11605805\_3},
  doi          = {10.1007/11605805\_3},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/TianW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/YangWWD06,
  author       = {Guomin Yang and
                  Duncan S. Wong and
                  Huaxiong Wang and
                  Xiaotie Deng},
  editor       = {Peng Ning and
                  Sihan Qing and
                  Ninghui Li},
  title        = {Formal Analysis and Systematic Construction of Two-Factor Authentication
                  Scheme (Short Paper)},
  booktitle    = {Information and Communications Security, 8th International Conference,
                  {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4307},
  pages        = {82--91},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935308\_7},
  doi          = {10.1007/11935308\_7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/YangWWD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/AuLYW06,
  author       = {Man Ho Au and
                  Joseph K. Liu and
                  Tsz Hon Yuen and
                  Duncan S. Wong},
  editor       = {Hiroshi Yoshiura and
                  Kouichi Sakurai and
                  Kai Rannenberg and
                  Yuko Murayama and
                  Shin{-}ichi Kawamura},
  title        = {ID-Based Ring Signature Scheme Secure in the Standard Model},
  booktitle    = {Advances in Information and Computer Security, First International
                  Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4266},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11908739\_1},
  doi          = {10.1007/11908739\_1},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/AuLYW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/LiuSW06,
  author       = {Joseph K. Liu and
                  Willy Susilo and
                  Duncan S. Wong},
  editor       = {Hiroshi Yoshiura and
                  Kouichi Sakurai and
                  Kai Rannenberg and
                  Yuko Murayama and
                  Shin{-}ichi Kawamura},
  title        = {Ring Signature with Designated Linkability},
  booktitle    = {Advances in Information and Computer Security, First International
                  Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4266},
  pages        = {104--119},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11908739\_8},
  doi          = {10.1007/11908739\_8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/LiuSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/YangWDW06,
  author       = {Guomin Yang and
                  Duncan S. Wong and
                  Xiaotie Deng and
                  Huaxiong Wang},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {Anonymous Signature Schemes},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {347--363},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_23},
  doi          = {10.1007/11745853\_23},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/YangWDW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoWW06,
  author       = {Lifeng Guo and
                  Guilin Wang and
                  Duncan S. Wong},
  title        = {Further Discussions on the Security of a Nominative Signature Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {7},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/007},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoWW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AuCLMWY06,
  author       = {Man Ho Au and
                  Jing Chen and
                  Joseph K. Liu and
                  Yi Mu and
                  Duncan S. Wong and
                  Guomin Yang},
  title        = {Malicious {KGC} Attacks in Certificateless Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {255},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/255},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AuCLMWY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangWWD06,
  author       = {Guomin Yang and
                  Duncan S. Wong and
                  Huaxiong Wang and
                  Xiaotie Deng},
  title        = {Formal Analysis and Systematic Construction of Two-factor Authentication
                  Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {270},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/270},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YangWWD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuangWZ06,
  author       = {Qiong Huang and
                  Duncan S. Wong and
                  Yiming Zhao},
  title        = {Generic Transformation to Strongly Unforgeable Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {346},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/346},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HuangWZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AuLYW06a,
  author       = {Man Ho Au and
                  Joseph K. Liu and
                  Tsz Hon Yuen and
                  Duncan S. Wong},
  title        = {Practical Hierarchical Identity Based Encryption and Signature schemes
                  Without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {368},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/368},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AuLYW06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/TianWZ05,
  author       = {Xiaojian Tian and
                  Duncan S. Wong and
                  Robert W. Zhu},
  title        = {Analysis and improvement of an authenticated key exchange protocol
                  for sensor networks},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {9},
  number       = {11},
  pages        = {970--972},
  year         = {2005},
  url          = {https://doi.org/10.1109/LCOMM.2005.11006},
  doi          = {10.1109/LCOMM.2005.11006},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icl/TianWZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YangWD05,
  author       = {Guomin Yang and
                  Duncan S. Wong and
                  Xiaotie Deng},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Deposit-Case Attack Against Secure Roaming},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {417--428},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_35},
  doi          = {10.1007/11506157\_35},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YangWD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/YangWD05,
  author       = {Guomin Yang and
                  Duncan S. Wong and
                  Xiaotie Deng},
  editor       = {John Ioannidis and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Efficient Anonymous Roaming and Its Security Analysis},
  booktitle    = {Applied Cryptography and Network Security, Third International Conference,
                  {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3531},
  pages        = {334--349},
  year         = {2005},
  url          = {https://doi.org/10.1007/11496137\_23},
  doi          = {10.1007/11496137\_23},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/YangWD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/WongW05,
  author       = {Jonathan Wong and
                  Duncan S. Wong},
  editor       = {Hamid R. Arabnia},
  title        = {Known Session Key Attack Against a Collection of Signcryption Schemes},
  booktitle    = {Proceedings of The 2005 International Conference on Security and Management,
                  {SAM} 2005, Las Vegas, Nevada, USA, June 20-23, 2005},
  pages        = {119--126},
  publisher    = {{CSREA} Press},
  year         = {2005},
  timestamp    = {Wed, 06 Dec 2006 10:55:26 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/WongW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/LiuTW05,
  author       = {Joseph K. Liu and
                  Patrick P. Tsang and
                  Duncan S. Wong},
  editor       = {Refik Molva and
                  Gene Tsudik and
                  Dirk Westhoff},
  title        = {Efficient Verifiable Ring Encryption for Ad Hoc Groups},
  booktitle    = {Security and Privacy in Ad-hoc and Sensor Networks, Second European
                  Workshop, {ESAS} 2005, Visegrad, Hungary, July 13-14, 2005, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3813},
  pages        = {1--13},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11601494\_1},
  doi          = {10.1007/11601494\_1},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/LiuTW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/LiuTW05,
  author       = {Joseph K. Liu and
                  Patrick P. Tsang and
                  Duncan S. Wong},
  editor       = {David W. Chadwick and
                  Gansen Zhao},
  title        = {Recoverable and Untraceable E-Cash},
  booktitle    = {Public Key Infrastructure, Second European {PKI} Workshop: Research
                  and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1,
                  2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3545},
  pages        = {206--214},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11533733\_14},
  doi          = {10.1007/11533733\_14},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/LiuTW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/LiuW05,
  author       = {Joseph K. Liu and
                  Duncan S. Wong},
  editor       = {Osvaldo Gervasi and
                  Marina L. Gavrilova and
                  Vipin Kumar and
                  Antonio Lagan{\`{a}} and
                  Heow Pueh Lee and
                  Youngsong Mun and
                  David Taniar and
                  Chih Jeng Kenneth Tan},
  title        = {Linkable Ring Signatures: Security Models and New Schemes},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2005, International
                  Conference, Singapore, May 9-12, 2005, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3481},
  pages        = {614--623},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11424826\_65},
  doi          = {10.1007/11424826\_65},
  timestamp    = {Thu, 28 Apr 2022 16:17:38 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/LiuW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/LiuTWZ05,
  author       = {Joseph K. Liu and
                  Patrick P. Tsang and
                  Duncan S. Wong and
                  Robert W. Zhu},
  editor       = {Dongho Won and
                  Seungjoo Kim},
  title        = {Universal Custodian-Hiding Verifiable Encryption for Discrete Logarithms},
  booktitle    = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3935},
  pages        = {389--409},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11734727\_31},
  doi          = {10.1007/11734727\_31},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/LiuTWZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icn/WongCZ05,
  author       = {Duncan S. Wong and
                  Agnes Hui Chan and
                  Feng Zhu},
  editor       = {Pascal Lorenz and
                  Petre Dini},
  title        = {Password Authenticated Key Exchange for Resource-Constrained Wireless
                  Communications (Extended Abstract)},
  booktitle    = {Networking - {ICN} 2005, 4th International Conference on Networking,
                  ReunionIsland, France, April 17-21, 2005, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3421},
  pages        = {827--834},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-31957-3\_93},
  doi          = {10.1007/978-3-540-31957-3\_93},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/icn/WongCZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/LiuW05,
  author       = {Joseph K. Liu and
                  Duncan S. Wong},
  editor       = {Robert H. Deng and
                  Feng Bao and
                  HweeHwa Pang and
                  Jianying Zhou},
  title        = {A Restricted Multi-show Credential System and Its Application on E-Voting},
  booktitle    = {Information Security Practice and Experience, First International
                  Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3439},
  pages        = {268--279},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-31979-5\_23},
  doi          = {10.1007/978-3-540-31979-5\_23},
  timestamp    = {Wed, 25 Sep 2019 18:12:57 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/LiuW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/YangWD05,
  author       = {Guomin Yang and
                  Duncan S. Wong and
                  Xiaotie Deng},
  editor       = {Jianying Zhou and
                  Javier L{\'{o}}pez and
                  Robert H. Deng and
                  Feng Bao},
  title        = {Analysis and Improvement of a Signcryption Scheme with Key Privacy},
  booktitle    = {Information Security, 8th International Conference, {ISC} 2005, Singapore,
                  September 20-23, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3650},
  pages        = {218--232},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11556992\_16},
  doi          = {10.1007/11556992\_16},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/YangWD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/Wong05,
  author       = {Duncan S. Wong},
  title        = {Security Analysis of Two Anonymous Authentication Protocols for Distributed
                  Wireless Networks},
  booktitle    = {3rd {IEEE} Conference on Pervasive Computing and Communications Workshops
                  (PerCom 2005 Workshops), 8-12 March 2005, Kauai Island, HI, {USA}},
  pages        = {284--288},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/PERCOMW.2005.70},
  doi          = {10.1109/PERCOMW.2005.70},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/Wong05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/LiuWW05,
  author       = {Joseph K. Liu and
                  Sandy H. Wong and
                  Duncan S. Wong},
  editor       = {Ry{\^{o}}ichi Sasaki and
                  Sihan Qing and
                  Eiji Okamoto and
                  Hiroshi Yoshiura},
  title        = {Transferable E-Cash Revisit},
  booktitle    = {Security and Privacy in the Age of Ubiquitous Computing, {IFIP} {TC11}
                  20th International Conference on Information Security {(SEC} 2005),
                  May 30 - June 1, 2005, Chiba, Japan},
  series       = {{IFIP}},
  volume       = {181},
  pages        = {171--188},
  publisher    = {Springer},
  year         = {2005},
  timestamp    = {Fri, 19 May 2017 01:25:10 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/LiuWW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wine/ZhuYW05,
  author       = {Robert W. Zhu and
                  Guomin Yang and
                  Duncan S. Wong},
  editor       = {Xiaotie Deng and
                  Yinyu Ye},
  title        = {An Efficient Identity-Based Key Exchange Protocol with {KGS} Forward
                  Secrecy for Low-Power Devices},
  booktitle    = {Internet and Network Economics, First International Workshop, {WINE}
                  2005, Hong Kong, China, December 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3828},
  pages        = {500--509},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11600930\_50},
  doi          = {10.1007/11600930\_50},
  timestamp    = {Sun, 18 Dec 2022 19:02:44 +0100},
  biburl       = {https://dblp.org/rec/conf/wine/ZhuYW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TsangALSW05,
  author       = {Patrick P. Tsang and
                  Man Ho Au and
                  Joseph K. Liu and
                  Willy Susilo and
                  Duncan S. Wong},
  title        = {A Suite of Non-Pairing ID-Based Threshold Ring Signature Schemes with
                  Different Levels of Anonymity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {326},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/326},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TsangALSW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangWDW05,
  author       = {Guomin Yang and
                  Duncan S. Wong and
                  Xiaotie Deng and
                  Huaxiong Wang},
  title        = {Anonymous Signature Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {407},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/407},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YangWDW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuW05,
  author       = {Joseph K. Liu and
                  Duncan S. Wong},
  title        = {Solutions to Key Exposure Problem in Ring Signature},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {427},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/427},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhuTW05,
  author       = {Robert W. Zhu and
                  Xiaojian Tian and
                  Duncan S. Wong},
  title        = {Enhancing CK-Model for Key Compromise Impersonation Resilience and
                  Identity-based Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {455},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/455},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhuTW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiuWW04,
  author       = {Joseph K. Liu and
                  Victor K. Wei and
                  Duncan S. Wong},
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (Extended
                  Abstract)},
  booktitle    = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  pages        = {325--335},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27800-9\_28},
  doi          = {10.1007/978-3-540-27800-9\_28},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LiuWW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/LiuW04,
  author       = {Joseph K. Liu and
                  Duncan S. Wong},
  editor       = {Choonsik Park and
                  Seongtaek Chee},
  title        = {On the Security Models of (Threshold) Ring Signature Schemes},
  booktitle    = {Information Security and Cryptology - {ICISC} 2004, 7th International
                  Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3506},
  pages        = {204--217},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11496618\_16},
  doi          = {10.1007/11496618\_16},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/LiuW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/TsangWCALW04,
  author       = {Patrick P. Tsang and
                  Victor K. Wei and
                  Tony K. Chan and
                  Man Ho Au and
                  Joseph K. Liu and
                  Duncan S. Wong},
  editor       = {Anne Canteaut and
                  Kapalee Viswanathan},
  title        = {Separable Linkable Threshold Ring Signatures},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2004, 5th International Conference
                  on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3348},
  pages        = {384--398},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30556-9\_30},
  doi          = {10.1007/978-3-540-30556-9\_30},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/TsangWCALW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LiuWW04,
  author       = {Joseph K. Liu and
                  Victor K. Wei and
                  Duncan S. Wong},
  editor       = {Chae Hoon Lim and
                  Moti Yung},
  title        = {Custodian-Hiding Verifiable Encryption},
  booktitle    = {Information Security Applications, 5th International Workshop, {WISA}
                  2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3325},
  pages        = {51--64},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31815-6\_5},
  doi          = {10.1007/978-3-540-31815-6\_5},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LiuWW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuWW04,
  author       = {Joseph K. Liu and
                  Victor K. Wei and
                  Duncan S. Wong},
  title        = {Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {27},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/027},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuWW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuWW04a,
  author       = {Joseph K. Liu and
                  Victor K. Wei and
                  Duncan S. Wong},
  title        = {Custodian-Hiding Verifiable Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {28},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/028},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuWW04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TsangWCALW04,
  author       = {Patrick P. Tsang and
                  Victor K. Wei and
                  Tony K. Chan and
                  Man Ho Au and
                  Joseph K. Liu and
                  Duncan S. Wong},
  title        = {Separable Linkable Threshold Ring Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {267},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/267},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TsangWCALW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/WongFLW03,
  author       = {Duncan S. Wong and
                  Karyin Fung and
                  Joseph K. Liu and
                  Victor K. Wei},
  editor       = {Sihan Qing and
                  Dieter Gollmann and
                  Jianying Zhou},
  title        = {On the RS-Code Construction of Ring Signature Schemes and a Threshold
                  Setting of {RST}},
  booktitle    = {Information and Communications Security, 5th International Conference,
                  {ICICS} 2003, Huhehaote, China, October 10-13, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2836},
  pages        = {34--46},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39927-8\_4},
  doi          = {10.1007/978-3-540-39927-8\_4},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/WongFLW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/LiuWW03,
  author       = {Joseph K. Liu and
                  Victor K. Wei and
                  Duncan S. Wong},
  editor       = {Jong In Lim and
                  Dong Hoon Lee},
  title        = {A Separable Threshold Ring Signature Scheme},
  booktitle    = {Information Security and Cryptology - {ICISC} 2003, 6th International
                  Conference, Seoul, Korea, November 27-28, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2971},
  pages        = {12--26},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24691-6\_2},
  doi          = {10.1007/978-3-540-24691-6\_2},
  timestamp    = {Thu, 17 Nov 2022 14:05:51 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/LiuWW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/WongCZ03,
  author       = {Duncan S. Wong and
                  Agnes Hui Chan and
                  Feng Zhu},
  editor       = {Thomas Johansson and
                  Subhamoy Maitra},
  title        = {More Efficient Password Authenticated Key Exchange Based on {RSA}},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2003, 4th International Conference
                  on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2904},
  pages        = {375--387},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24582-7\_28},
  doi          = {10.1007/978-3-540-24582-7\_28},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/WongCZ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigmobile/Wong02,
  author       = {Duncan S. Wong},
  title        = {An optimized authentication protocol for mobile network reconsidered},
  journal      = {{ACM} {SIGMOBILE} Mob. Comput. Commun. Rev.},
  volume       = {6},
  number       = {4},
  pages        = {74--76},
  year         = {2002},
  url          = {https://doi.org/10.1145/643550.643562},
  doi          = {10.1145/643550.643562},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigmobile/Wong02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/ZhuWCY02,
  author       = {Feng Zhu and
                  Duncan S. Wong and
                  Agnes Hui Chan and
                  Robbie Ye},
  editor       = {Agnes Hui Chan and
                  Virgil D. Gligor},
  title        = {Password Authenticated Key Exchange Based on {RSA} for Imbalanced
                  Wireless Networks},
  booktitle    = {Information Security, 5th International Conference, {ISC} 2002 Sao
                  Paulo, Brazil, September 30 - October 2, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2433},
  pages        = {150--161},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45811-5\_11},
  doi          = {10.1007/3-540-45811-5\_11},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/ZhuWCY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WongFC01,
  author       = {Duncan S. Wong and
                  Hector Ho Fuentes and
                  Agnes Hui Chan},
  title        = {The Performance Measurement of Cryptographic Primitives on Palm Devices},
  booktitle    = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
                  11-14 December 2001, New Orleans, Louisiana, {USA}},
  pages        = {92--101},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ACSAC.2001.991525},
  doi          = {10.1109/ACSAC.2001.991525},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WongFC01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/WongC01,
  author       = {Duncan S. Wong and
                  Agnes Hui Chan},
  editor       = {Colin Boyd},
  title        = {Efficient and Mutually Authenticated Key Exchange for Low Power Computing
                  Devices},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2001, 7th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Gold Coast, Australia, December 9-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2248},
  pages        = {272--289},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45682-1\_17},
  doi          = {10.1007/3-540-45682-1\_17},
  timestamp    = {Tue, 01 Jun 2021 15:22:33 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/WongC01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics