Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Cheng-Kang Chu
@article{DBLP:journals/access/WangKLLCW23, author = {Huilin Wang and Xin Kang and Tieyan Li and Zhongding Lei and Cheng{-}Kang Chu and Haiguang Wang}, title = {An Overview of Trust Standards for Communication Networks and Future Digital World}, journal = {{IEEE} Access}, volume = {11}, pages = {42991--42998}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3270042}, doi = {10.1109/ACCESS.2023.3270042}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/WangKLLCW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WangKLWCL23, author = {Yiying Wang and Xin Kang and Tieyan Li and Haiguang Wang and Cheng{-}Kang Chu and Zhongding Lei}, title = {SIX-Trust for 6G: Toward a Secure and Trustworthy Future Network}, journal = {{IEEE} Access}, volume = {11}, pages = {107657--107668}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3321114}, doi = {10.1109/ACCESS.2023.3321114}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/WangKLWCL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tr/LiCDXC023, author = {Zecheng Li and Shengyuan Chen and Hongshu Dai and Dunyuan Xu and Cheng{-}Kang Chu and Bin Xiao}, title = {Abnormal Traffic Detection: Traffic Feature Extraction and {DAE-GAN} With Efficient Data Augmentation}, journal = {{IEEE} Trans. Reliab.}, volume = {72}, number = {2}, pages = {498--510}, year = {2023}, url = {https://doi.org/10.1109/TR.2022.3204349}, doi = {10.1109/TR.2022.3204349}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tr/LiCDXC023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhaoKLCW22, author = {Yinjie Zhao and Xin Kang and Tieyan Li and Cheng{-}Kang Chu and Haiguang Wang}, title = {Toward Trustworthy DeFi Oracles: Past, Present, and Future}, journal = {{IEEE} Access}, volume = {10}, pages = {60914--60928}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3179374}, doi = {10.1109/ACCESS.2022.3179374}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZhaoKLCW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/XieKLCW22, author = {Yining Xie and Xin Kang and Tieyan Li and Cheng{-}Kang Chu and Haiguang Wang}, editor = {Xingliang Yuan and Guangdong Bai and Cristina Alcaraz and Suryadipta Majumdar}, title = {Towards Secure and Trustworthy Flash Loans: {A} Blockchain-Based Trust Management Approach}, booktitle = {Network and System Security - 16th International Conference, {NSS} 2022, Denarau Island, Fiji, December 9-12, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13787}, pages = {499--513}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23020-2\_28}, doi = {10.1007/978-3-031-23020-2\_28}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/XieKLCW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-02358, author = {Yinjie Zhao and Xin Kang and Tieyan Li and Cheng{-}Kang Chu and Haiguang Wang}, title = {Towards Trustworthy DeFi Oracles: Past, Present and Future}, journal = {CoRR}, volume = {abs/2201.02358}, year = {2022}, url = {https://arxiv.org/abs/2201.02358}, eprinttype = {arXiv}, eprint = {2201.02358}, timestamp = {Mon, 10 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-02358.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-17291, author = {Yiying Wang and Xin Kang and Tieyan Li and Haiguang Wang and Cheng{-}Kang Chu and Zhongding Lei}, title = {SIX-Trust for 6G: Towards a Secure and Trustworthy 6G Network}, journal = {CoRR}, volume = {abs/2210.17291}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.17291}, doi = {10.48550/ARXIV.2210.17291}, eprinttype = {arXiv}, eprint = {2210.17291}, timestamp = {Thu, 03 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-17291.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-01618, author = {Huilin Wang and Xin Kang and Tieyan Li and Zhongding Lei and Cheng{-}Kang Chu and Haiguang Wang}, title = {An Overview of Trust Standards for Communication Networks and Future Digital World}, journal = {CoRR}, volume = {abs/2212.01618}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.01618}, doi = {10.48550/ARXIV.2212.01618}, eprinttype = {arXiv}, eprint = {2212.01618}, timestamp = {Thu, 08 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-01618.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/TingKLWC21, author = {Hannah Lim Jing Ting and Xin Kang and Tieyan Li and Haiguang Wang and Cheng{-}Kang Chu}, title = {On the Trust and Trust Modeling for the Future Fully-Connected Digital World: {A} Comprehensive Study}, journal = {{IEEE} Access}, volume = {9}, pages = {106743--106783}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3100767}, doi = {10.1109/ACCESS.2021.3100767}, timestamp = {Thu, 12 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/TingKLWC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-07528, author = {Hannah Lim Jing Ting and Xin Kang and Tieyan Li and Haiguang Wang and Cheng{-}Kang Chu}, title = {On the Trust and Trust Modelling for the Future Fully-Connected Digital World: {A} Comprehensive Study}, journal = {CoRR}, volume = {abs/2106.07528}, year = {2021}, url = {https://arxiv.org/abs/2106.07528}, eprinttype = {arXiv}, eprint = {2106.07528}, timestamp = {Fri, 06 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-07528.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wc/LinGDCY20, author = {Xiaodong Lin and Mohsen Guizani and Xiaojiang Du and Cheng{-}Kang Chu and Yong Yu}, title = {Advances of Security and Privacy Techniques in Emerging Wireless Networks}, journal = {{IEEE} Wirel. Commun.}, volume = {27}, number = {3}, pages = {8--9}, year = {2020}, url = {https://ieeexplore.ieee.org/document/118341141}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wc/LinGDCY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-12227, author = {Yao Cheng and Cheng{-}Kang Chu and Hsiao{-}Ying Lin and Marius Lombard{-}Platet and David Naccache}, title = {Keyed Non-Parametric Hypothesis Tests}, journal = {CoRR}, volume = {abs/2005.12227}, year = {2020}, url = {https://arxiv.org/abs/2005.12227}, eprinttype = {arXiv}, eprint = {2005.12227}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-12227.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/ChengCLLN19, author = {Yao Cheng and Cheng{-}Kang Chu and Hsiao{-}Ying Lin and Marius Lombard{-}Platet and David Naccache}, editor = {Joseph K. Liu and Xinyi Huang}, title = {Keyed Non-parametric Hypothesis Tests}, booktitle = {Network and System Security - 13th International Conference, {NSS} 2019, Sapporo, Japan, December 15-18, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11928}, pages = {632--645}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-36938-5\_39}, doi = {10.1007/978-3-030-36938-5\_39}, timestamp = {Wed, 17 Aug 2022 14:30:35 +0200}, biburl = {https://dblp.org/rec/conf/nss/ChengCLLN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuCCHAZ15, author = {Joseph K. Liu and Cheng{-}Kang Chu and Sherman S. M. Chow and Xinyi Huang and Man Ho Au and Jianying Zhou}, title = {Time-Bound Anonymous Authentication for Roaming Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {1}, pages = {178--189}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2366300}, doi = {10.1109/TIFS.2014.2366300}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiuCCHAZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/LiangCTWTZ14, author = {Kaitai Liang and Cheng{-}Kang Chu and Xiao Tan and Duncan S. Wong and Chunming Tang and Jianying Zhou}, title = {Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts}, journal = {Theor. Comput. Sci.}, volume = {539}, pages = {87--105}, year = {2014}, url = {https://doi.org/10.1016/j.tcs.2014.04.027}, doi = {10.1016/J.TCS.2014.04.027}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/LiangCTWTZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/ChuCTZD14, author = {Cheng{-}Kang Chu and Sherman S. M. Chow and Wen{-}Guey Tzeng and Jianying Zhou and Robert H. Deng}, title = {Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {25}, number = {2}, pages = {468--477}, year = {2014}, url = {https://doi.org/10.1109/TPDS.2013.112}, doi = {10.1109/TPDS.2013.112}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/ChuCTZD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apsys/TanLXZCL14, author = {Cheng Tan and Haibo Li and Yubin Xia and Binyu Zang and Cheng{-}Kang Chu and Tieyan Li}, title = {PreCrime to the rescue: defeating mobile malware one-step ahead}, booktitle = {Asia-Pacific Workshop on Systems, APSys'14, Beijing, China, June 25-26, 2014}, pages = {5:1--5:7}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2637166.2637224}, doi = {10.1145/2637166.2637224}, timestamp = {Sun, 26 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/apsys/TanLXZCL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apsys/LiMHXZCL14, author = {Wenhao Li and Mingyang Ma and Jinchen Han and Yubin Xia and Binyu Zang and Cheng{-}Kang Chu and Tieyan Li}, title = {Building trusted path on untrusted device drivers for mobile devices}, booktitle = {Asia-Pacific Workshop on Systems, APSys'14, Beijing, China, June 25-26, 2014}, pages = {8:1--8:7}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2637166.2637225}, doi = {10.1145/2637166.2637225}, timestamp = {Fri, 25 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/apsys/LiMHXZCL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pervasive/ChuZHLXZ13, author = {Cheng{-}Kang Chu and Wen Tao Zhu and Jin Han and Joseph K. Liu and Jia Xu and Jianying Zhou}, title = {Security Concerns in Popular Cloud Storage Services}, journal = {{IEEE} Pervasive Comput.}, volume = {12}, number = {4}, pages = {50--57}, year = {2013}, url = {https://doi.org/10.1109/MPRV.2013.72}, doi = {10.1109/MPRV.2013.72}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pervasive/ChuZHLXZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ChenCTZ13, author = {Yi{-}Ruei Chen and Cheng{-}Kang Chu and Wen{-}Guey Tzeng and Jianying Zhou}, editor = {Michael J. Jacobson Jr. and Michael E. Locasto and Payman Mohassel and Reihaneh Safavi{-}Naini}, title = {CloudHKA: {A} Cryptographic Approach for Hierarchical Access Control in Cloud Computing}, booktitle = {Applied Cryptography and Network Security - 11th International Conference, {ACNS} 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7954}, pages = {37--52}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38980-1\_3}, doi = {10.1007/978-3-642-38980-1\_3}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/ChenCTZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChuLWZZ13, author = {Cheng{-}Kang Chu and Joseph K. Liu and Jun Wen Wong and Yunlei Zhao and Jianying Zhou}, editor = {Kefei Chen and Qi Xie and Weidong Qiu and Ninghui Li and Wen{-}Guey Tzeng}, title = {Privacy-preserving smart metering with regional statistics and personal enquiry services}, booktitle = {8th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013}, pages = {369--380}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484313.2484362}, doi = {10.1145/2484313.2484362}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ChuLWZZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenCTZ13, author = {Yi{-}Ruei Chen and Cheng{-}Kang Chu and Wen{-}Guey Tzeng and Jianying Zhou}, title = {CloudHKA: {A} Cryptographic Approach for Hierarchical Access Control in Cloud Computing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {208}, year = {2013}, url = {http://eprint.iacr.org/2013/208}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenCTZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HuangCSZD12, author = {Xinyi Huang and Cheng{-}Kang Chu and Hung{-}Min Sun and Jianying Zhou and Robert H. Deng}, title = {Enhanced authentication for commercial video services}, journal = {Secur. Commun. Networks}, volume = {5}, number = {11}, pages = {1248--1259}, year = {2012}, url = {https://doi.org/10.1002/sec.620}, doi = {10.1002/SEC.620}, timestamp = {Thu, 17 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/HuangCSZD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/ChowCHZD12, author = {Sherman S. M. Chow and Cheng{-}Kang Chu and Xinyi Huang and Jianying Zhou and Robert H. Deng}, editor = {David Naccache}, title = {Dynamic Secure Cloud Storage with Provenance}, booktitle = {Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday}, series = {Lecture Notes in Computer Science}, volume = {6805}, pages = {442--464}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28368-0\_28}, doi = {10.1007/978-3-642-28368-0\_28}, timestamp = {Thu, 17 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/birthday/ChowCHZD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChuLHZ12, author = {Cheng{-}Kang Chu and Joseph K. Liu and Xinyi Huang and Jianying Zhou}, editor = {Heung Youl Youm and Yoojae Won}, title = {Verifier-local revocation group signatures with time-bound keys}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {26--27}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414470}, doi = {10.1145/2414456.2414470}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ChuLHZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiuCZ11, author = {Joseph K. Liu and Cheng{-}Kang Chu and Jianying Zhou}, editor = {Udaya Parampalli and Philip Hawkes}, title = {Identity-Based Server-Aided Decryption}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {337--352}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_22}, doi = {10.1007/978-3-642-22497-3\_22}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LiuCZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChuZCZD11, author = {Cheng{-}Kang Chu and Wen Tao Zhu and Sherman S. M. Chow and Jianying Zhou and Robert H. Deng}, editor = {Bruce S. N. Cheung and Lucas Chi Kwong Hui and Ravi S. Sandhu and Duncan S. Wong}, title = {Secure mobile subscription of sensor-encrypted data}, booktitle = {Proceedings of the 6th {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24, 2011}, pages = {228--237}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1966913.1966943}, doi = {10.1145/1966913.1966943}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ChuZCZD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/BaekCZ11, author = {Joonsang Baek and Cheng{-}Kang Chu and Jianying Zhou}, editor = {Aggelos Kiayias}, title = {On Shortening Ciphertexts: New Constructions for Compact Public Key and Stateful Encryption Schemes}, booktitle = {Topics in Cryptology - {CT-RSA} 2011 - The Cryptographers' Track at the {RSA} Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6558}, pages = {302--318}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19074-2\_20}, doi = {10.1007/978-3-642-19074-2\_20}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/BaekCZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChuLZBD10, author = {Cheng{-}Kang Chu and Joseph K. Liu and Jianying Zhou and Feng Bao and Robert H. Deng}, editor = {Dengguo Feng and David A. Basin and Peng Liu}, title = {Practical ID-based encryption for wireless sensor network}, booktitle = {Proceedings of the 5th {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2010, Beijing, China, April 13-16, 2010}, pages = {337--340}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1755688.1755734}, doi = {10.1145/1755688.1755734}, timestamp = {Fri, 03 Jun 2022 12:02:10 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ChuLZBD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChuLZBD10, author = {Cheng{-}Kang Chu and Joseph K. Liu and Jianying Zhou and Feng Bao and Robert H. Deng}, title = {Practical ID-based Encryption for Wireless Sensor Network}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {2}, year = {2010}, url = {http://eprint.iacr.org/2010/002}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChuLZBD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/ChuT09, author = {Cheng{-}Kang Chu and Wen{-}Guey Tzeng}, title = {Efficient Identity-Committable Signature and Group-Oriented Ring Signature Schemes}, journal = {J. Inf. Sci. Eng.}, volume = {25}, number = {5}, pages = {1465--1483}, year = {2009}, url = {http://www.iis.sinica.edu.tw/page/jise/2009/200909\_10.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/ChuT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChuWCZD09, author = {Cheng{-}Kang Chu and Jian Weng and Sherman S. M. Chow and Jianying Zhou and Robert H. Deng}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Conditional Proxy Broadcast Re-Encryption}, booktitle = {Information Security and Privacy, 14th Australasian Conference, {ACISP} 2009, Brisbane, Australia, July 1-3, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5594}, pages = {327--342}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02620-1\_23}, doi = {10.1007/978-3-642-02620-1\_23}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ChuWCZD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WengDDCL09, author = {Jian Weng and Robert H. Deng and Xuhua Ding and Cheng{-}Kang Chu and Junzuo Lai}, editor = {Wanqing Li and Willy Susilo and Udaya Kiran Tupakula and Reihaneh Safavi{-}Naini and Vijay Varadharajan}, title = {Conditional proxy re-encryption secure against chosen-ciphertext attack}, booktitle = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2009, Sydney, Australia, March 10-12, 2009}, pages = {322--332}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1533057.1533100}, doi = {10.1145/1533057.1533100}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WengDDCL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jucs/ChuT08, author = {Cheng{-}Kang Chu and Wen{-}Guey Tzeng}, title = {Efficient k-out-of-n Oblivious Transfer Schemes}, journal = {J. Univers. Comput. Sci.}, volume = {14}, number = {3}, pages = {397--415}, year = {2008}, url = {https://doi.org/10.3217/jucs-014-03-0397}, doi = {10.3217/JUCS-014-03-0397}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jucs/ChuT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ChuT07, author = {Cheng{-}Kang Chu and Wen{-}Guey Tzeng}, title = {Optimal resilient threshold {GQ} signatures}, journal = {Inf. Sci.}, volume = {177}, number = {8}, pages = {1834--1851}, year = {2007}, url = {https://doi.org/10.1016/j.ins.2006.11.001}, doi = {10.1016/J.INS.2006.11.001}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/ChuT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChuT07, author = {Cheng{-}Kang Chu and Wen{-}Guey Tzeng}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {323--337}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_24}, doi = {10.1007/978-3-540-73458-1\_24}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ChuT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/ChuT07, author = {Cheng{-}Kang Chu and Wen{-}Guey Tzeng}, editor = {Juan A. Garay and Arjen K. Lenstra and Masahiro Mambo and Ren{\'{e}} Peralta}, title = {Identity-Based Proxy Re-encryption Without Random Oracles}, booktitle = {Information Security, 10th International Conference, {ISC} 2007, Valpara{\'{\i}}so, Chile, October 9-12, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4779}, pages = {189--202}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75496-1\_13}, doi = {10.1007/978-3-540-75496-1\_13}, timestamp = {Fri, 03 Feb 2023 21:39:19 +0100}, biburl = {https://dblp.org/rec/conf/isw/ChuT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChuT07, author = {Cheng{-}Kang Chu and Wen{-}Guey Tzeng}, title = {Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {354}, year = {2007}, url = {http://eprint.iacr.org/2007/354}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChuT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ChuT06, author = {Cheng{-}Kang Chu and Wen{-}Guey Tzeng}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {Conditional Oblivious Cast}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {443--457}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_29}, doi = {10.1007/11745853\_29}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ChuT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ChuT05, author = {Cheng{-}Kang Chu and Wen{-}Guey Tzeng}, editor = {Serge Vaudenay}, title = {Efficient \emph{k}-Out-of-\emph{n} Oblivious Transfer Schemes with Adaptive and Non-adaptive Queries}, booktitle = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3386}, pages = {172--183}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30580-4\_12}, doi = {10.1007/978-3-540-30580-4\_12}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ChuT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChuT04, author = {Cheng{-}Kang Chu and Wen{-}Guey Tzeng}, title = {Efficient k-out-of-n Oblivious Transfer Schemes with Adaptive and Non-Adaptive Queries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {41}, year = {2004}, url = {http://eprint.iacr.org/2004/041}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChuT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LiuCT03, author = {Li{-}Shan Liu and Cheng{-}Kang Chu and Wen{-}Guey Tzeng}, editor = {Jianying Zhou and Moti Yung and Yongfei Han}, title = {A Threshold {GQ} Signature Scheme}, booktitle = {Applied Cryptography and Network Security, First International Conference, {ACNS} 2003. Kunming, China, October 16-19, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2846}, pages = {137--150}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45203-4\_11}, doi = {10.1007/978-3-540-45203-4\_11}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/acns/LiuCT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChuLT03, author = {Cheng{-}Kang Chu and Li{-}Shan Liu and Wen{-}Guey Tzeng}, title = {A Threshold {GQ} Signature Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {16}, year = {2003}, url = {http://eprint.iacr.org/2003/016}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChuLT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ChuT02, author = {Cheng{-}Kang Chu and Wen{-}Guey Tzeng}, editor = {Robert H. Deng and Sihan Qing and Feng Bao and Jianying Zhou}, title = {Distributed Key Generation as a Component of an Integrated Protocol}, booktitle = {Information and Communications Security, 4th International Conference, {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2513}, pages = {411--421}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36159-6\_35}, doi = {10.1007/3-540-36159-6\_35}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/icics/ChuT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.