متابعة
Sherman S. M. Chow
Sherman S. M. Chow
Information Engineering, The Chinese University of Hong Kong
بريد إلكتروني تم التحقق منه على ie.cuhk.edu.hk
عنوان
عدد مرات الاقتباسات
عدد مرات الاقتباسات
السنة
Privacy-Preserving Public Auditing for Secure Cloud Storage
C Wang, SSM Chow, Q Wang, K Ren, W Lou
IEEE Transactions on Computers 62 (2), 362-375, 2013
3844*2013
Improving Privacy and Security in Multi-Authority Attribute-Based Encryption
M Chase, SSM Chow
16th ACM Conference on Computer and Communications Security (CCS), 121-130, 2009
12022009
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
CK Chu, SSM Chow, WG Tzeng, J Zhou, RH Deng
IEEE Transactions on Parallel and Distributed Systems (TPDS) 25 (2), 468-477, 2014
5052014
Efficient Unidirectional Proxy Re-Encryption
SSM Chow, J Weng, Y Yang, RH Deng
Progress in Cryptology–AFRICACRYPT, 316-332, 2010
4332010
Constant-Size Dynamic k-Times Anonymous Authentication
MH Au, W Susilo, Y Mu, SSM Chow
IEEE Systems Journal 7 (2), 249-261, 2013
393*2013
Efficient Forward and Provably Secure ID-based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity
SSM Chow, SM Yiu, LCK Hui, KP Chow
Information Security and Cryptology-ICISC 2003, 352-369, 2004
2992004
Storing Shared Data on the Cloud via Security-Mediator
B Wang, SSM Chow, M Li, H Li
33rd IEEE International Conference on Distributed Computing Systems (ICDCS …, 2013
2492013
Efficient Identity Based Ring Signature
SSM Chow, SM Yiu, LCK Hui
Applied Cryptography and Network Security (ACNS), 277-291, 2005
2492005
SPICE–Simple Privacy-Preserving Identity-Management for Cloud Environment
SSM Chow, YJ He, LCK Hui, SM Yiu
Applied Cryptography and Network Security (ACNS), 526-543, 2012
2352012
Optimal Sybil-Resilient Node Admission Control
N Tran, J Li, L Subramanian, SSM Chow
30th IEEE Conference on Computer Communications (INFOCOM), 3218-3226, 2011
2262011
Multi-Authority Ciphertext-Policy Attribute-Based Encryption with Accountability
J Li, Q Huang, X Chen, SSM Chow, DS Wong, D Xie
6th ACM Symposium on Information, Computer and Communications Security, 386-390, 2011
2242011
Practical Leakage-Resilient Identity-Based Encryption from Simple Assumptions
SSM Chow, Y Dodis, Y Rouselakis, B Waters
17th ACM Conference on Computer and Communications Security (CCS), 152-161, 2010
2162010
Two Improved Partially Blind Signature Schemes from Bilinear Pairings
SSM Chow, LCK Hui, SM Yiu, KP Chow
Australasian Conference on Information Security and Privacy, 355-411, 2005
1862005
Conditional Proxy Broadcast Re-Encryption
CK Chu, J Weng, SSM Chow, J Zhou, RH Deng
Australasian Conference on Information Security and Privacy, 327-342, 2009
1812009
Removing Escrow from Identity-Based Encryption
SSM Chow
IACR International Workshop on Public Key Cryptography (PKC), 256-276, 2009
173*2009
Dynamic Secure Cloud Storage with Provenance
SSM Chow, CK Chu, X Huang, J Zhou, RH Deng
Festschrift Jean-Jacques Quisquater, 442-464, 2011
1642011
Searchable Encryption over Feature-Rich Data
Q Wang, M He, M Du, SSM Chow, RWF Lai, Q Zou
IEEE Transactions on Dependable and Secure Computing 15 (3), 496-510, 2018
1602018
Multi-Authority Fine-Grained Access Control with Accountability and Its Application in Cloud
J Li, X Chen, SSM Chow, Q Huang, DS Wong, Z Liu
Journal of Network and Computer Applications 112, 89-96, 2018
1432018
Short Linkable Ring Signatures Revisited
MH Au, SSM Chow, W Susilo, P Tsang
European Public Key Infrastructure Workshop (EuroPKI), 101-115, 2006
1362006
Identity-Based Encryption Resilient to Continual Auxiliary Leakage
TH Yuen, SSM Chow, Y Zhang, SM Yiu
Advances in Cryptology–EUROCRYPT, 117-134, 2012
1352012
يتعذر على النظام إجراء العملية في الوقت الحالي. عاود المحاولة لاحقًا.
مقالات 1–20