BibTeX records: Cheng-Kang Chu

download as .bib file

@article{DBLP:journals/access/WangKLLCW23,
  author       = {Huilin Wang and
                  Xin Kang and
                  Tieyan Li and
                  Zhongding Lei and
                  Cheng{-}Kang Chu and
                  Haiguang Wang},
  title        = {An Overview of Trust Standards for Communication Networks and Future
                  Digital World},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {42991--42998},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3270042},
  doi          = {10.1109/ACCESS.2023.3270042},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/WangKLLCW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WangKLWCL23,
  author       = {Yiying Wang and
                  Xin Kang and
                  Tieyan Li and
                  Haiguang Wang and
                  Cheng{-}Kang Chu and
                  Zhongding Lei},
  title        = {SIX-Trust for 6G: Toward a Secure and Trustworthy Future Network},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {107657--107668},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3321114},
  doi          = {10.1109/ACCESS.2023.3321114},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/WangKLWCL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tr/LiCDXC023,
  author       = {Zecheng Li and
                  Shengyuan Chen and
                  Hongshu Dai and
                  Dunyuan Xu and
                  Cheng{-}Kang Chu and
                  Bin Xiao},
  title        = {Abnormal Traffic Detection: Traffic Feature Extraction and {DAE-GAN}
                  With Efficient Data Augmentation},
  journal      = {{IEEE} Trans. Reliab.},
  volume       = {72},
  number       = {2},
  pages        = {498--510},
  year         = {2023},
  url          = {https://doi.org/10.1109/TR.2022.3204349},
  doi          = {10.1109/TR.2022.3204349},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tr/LiCDXC023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhaoKLCW22,
  author       = {Yinjie Zhao and
                  Xin Kang and
                  Tieyan Li and
                  Cheng{-}Kang Chu and
                  Haiguang Wang},
  title        = {Toward Trustworthy DeFi Oracles: Past, Present, and Future},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {60914--60928},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3179374},
  doi          = {10.1109/ACCESS.2022.3179374},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZhaoKLCW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/XieKLCW22,
  author       = {Yining Xie and
                  Xin Kang and
                  Tieyan Li and
                  Cheng{-}Kang Chu and
                  Haiguang Wang},
  editor       = {Xingliang Yuan and
                  Guangdong Bai and
                  Cristina Alcaraz and
                  Suryadipta Majumdar},
  title        = {Towards Secure and Trustworthy Flash Loans: {A} Blockchain-Based Trust
                  Management Approach},
  booktitle    = {Network and System Security - 16th International Conference, {NSS}
                  2022, Denarau Island, Fiji, December 9-12, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13787},
  pages        = {499--513},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-23020-2\_28},
  doi          = {10.1007/978-3-031-23020-2\_28},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/XieKLCW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-02358,
  author       = {Yinjie Zhao and
                  Xin Kang and
                  Tieyan Li and
                  Cheng{-}Kang Chu and
                  Haiguang Wang},
  title        = {Towards Trustworthy DeFi Oracles: Past, Present and Future},
  journal      = {CoRR},
  volume       = {abs/2201.02358},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.02358},
  eprinttype    = {arXiv},
  eprint       = {2201.02358},
  timestamp    = {Mon, 10 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-02358.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-17291,
  author       = {Yiying Wang and
                  Xin Kang and
                  Tieyan Li and
                  Haiguang Wang and
                  Cheng{-}Kang Chu and
                  Zhongding Lei},
  title        = {SIX-Trust for 6G: Towards a Secure and Trustworthy 6G Network},
  journal      = {CoRR},
  volume       = {abs/2210.17291},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.17291},
  doi          = {10.48550/ARXIV.2210.17291},
  eprinttype    = {arXiv},
  eprint       = {2210.17291},
  timestamp    = {Thu, 03 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-17291.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-01618,
  author       = {Huilin Wang and
                  Xin Kang and
                  Tieyan Li and
                  Zhongding Lei and
                  Cheng{-}Kang Chu and
                  Haiguang Wang},
  title        = {An Overview of Trust Standards for Communication Networks and Future
                  Digital World},
  journal      = {CoRR},
  volume       = {abs/2212.01618},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.01618},
  doi          = {10.48550/ARXIV.2212.01618},
  eprinttype    = {arXiv},
  eprint       = {2212.01618},
  timestamp    = {Thu, 08 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-01618.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/TingKLWC21,
  author       = {Hannah Lim Jing Ting and
                  Xin Kang and
                  Tieyan Li and
                  Haiguang Wang and
                  Cheng{-}Kang Chu},
  title        = {On the Trust and Trust Modeling for the Future Fully-Connected Digital
                  World: {A} Comprehensive Study},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {106743--106783},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3100767},
  doi          = {10.1109/ACCESS.2021.3100767},
  timestamp    = {Thu, 12 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/TingKLWC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2106-07528,
  author       = {Hannah Lim Jing Ting and
                  Xin Kang and
                  Tieyan Li and
                  Haiguang Wang and
                  Cheng{-}Kang Chu},
  title        = {On the Trust and Trust Modelling for the Future Fully-Connected Digital
                  World: {A} Comprehensive Study},
  journal      = {CoRR},
  volume       = {abs/2106.07528},
  year         = {2021},
  url          = {https://arxiv.org/abs/2106.07528},
  eprinttype    = {arXiv},
  eprint       = {2106.07528},
  timestamp    = {Fri, 06 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-07528.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wc/LinGDCY20,
  author       = {Xiaodong Lin and
                  Mohsen Guizani and
                  Xiaojiang Du and
                  Cheng{-}Kang Chu and
                  Yong Yu},
  title        = {Advances of Security and Privacy Techniques in Emerging Wireless Networks},
  journal      = {{IEEE} Wirel. Commun.},
  volume       = {27},
  number       = {3},
  pages        = {8--9},
  year         = {2020},
  url          = {https://ieeexplore.ieee.org/document/118341141},
  timestamp    = {Sun, 08 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wc/LinGDCY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-12227,
  author       = {Yao Cheng and
                  Cheng{-}Kang Chu and
                  Hsiao{-}Ying Lin and
                  Marius Lombard{-}Platet and
                  David Naccache},
  title        = {Keyed Non-Parametric Hypothesis Tests},
  journal      = {CoRR},
  volume       = {abs/2005.12227},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.12227},
  eprinttype    = {arXiv},
  eprint       = {2005.12227},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-12227.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/ChengCLLN19,
  author       = {Yao Cheng and
                  Cheng{-}Kang Chu and
                  Hsiao{-}Ying Lin and
                  Marius Lombard{-}Platet and
                  David Naccache},
  editor       = {Joseph K. Liu and
                  Xinyi Huang},
  title        = {Keyed Non-parametric Hypothesis Tests},
  booktitle    = {Network and System Security - 13th International Conference, {NSS}
                  2019, Sapporo, Japan, December 15-18, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11928},
  pages        = {632--645},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-36938-5\_39},
  doi          = {10.1007/978-3-030-36938-5\_39},
  timestamp    = {Wed, 17 Aug 2022 14:30:35 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/ChengCLLN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuCCHAZ15,
  author       = {Joseph K. Liu and
                  Cheng{-}Kang Chu and
                  Sherman S. M. Chow and
                  Xinyi Huang and
                  Man Ho Au and
                  Jianying Zhou},
  title        = {Time-Bound Anonymous Authentication for Roaming Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {1},
  pages        = {178--189},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2366300},
  doi          = {10.1109/TIFS.2014.2366300},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuCCHAZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/LiangCTWTZ14,
  author       = {Kaitai Liang and
                  Cheng{-}Kang Chu and
                  Xiao Tan and
                  Duncan S. Wong and
                  Chunming Tang and
                  Jianying Zhou},
  title        = {Chosen-ciphertext secure multi-hop identity-based conditional proxy
                  re-encryption with constant-size ciphertexts},
  journal      = {Theor. Comput. Sci.},
  volume       = {539},
  pages        = {87--105},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.tcs.2014.04.027},
  doi          = {10.1016/J.TCS.2014.04.027},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/LiangCTWTZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/ChuCTZD14,
  author       = {Cheng{-}Kang Chu and
                  Sherman S. M. Chow and
                  Wen{-}Guey Tzeng and
                  Jianying Zhou and
                  Robert H. Deng},
  title        = {Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {25},
  number       = {2},
  pages        = {468--477},
  year         = {2014},
  url          = {https://doi.org/10.1109/TPDS.2013.112},
  doi          = {10.1109/TPDS.2013.112},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/ChuCTZD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apsys/TanLXZCL14,
  author       = {Cheng Tan and
                  Haibo Li and
                  Yubin Xia and
                  Binyu Zang and
                  Cheng{-}Kang Chu and
                  Tieyan Li},
  title        = {PreCrime to the rescue: defeating mobile malware one-step ahead},
  booktitle    = {Asia-Pacific Workshop on Systems, APSys'14, Beijing, China, June 25-26,
                  2014},
  pages        = {5:1--5:7},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2637166.2637224},
  doi          = {10.1145/2637166.2637224},
  timestamp    = {Sun, 26 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/apsys/TanLXZCL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apsys/LiMHXZCL14,
  author       = {Wenhao Li and
                  Mingyang Ma and
                  Jinchen Han and
                  Yubin Xia and
                  Binyu Zang and
                  Cheng{-}Kang Chu and
                  Tieyan Li},
  title        = {Building trusted path on untrusted device drivers for mobile devices},
  booktitle    = {Asia-Pacific Workshop on Systems, APSys'14, Beijing, China, June 25-26,
                  2014},
  pages        = {8:1--8:7},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2637166.2637225},
  doi          = {10.1145/2637166.2637225},
  timestamp    = {Fri, 25 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/apsys/LiMHXZCL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pervasive/ChuZHLXZ13,
  author       = {Cheng{-}Kang Chu and
                  Wen Tao Zhu and
                  Jin Han and
                  Joseph K. Liu and
                  Jia Xu and
                  Jianying Zhou},
  title        = {Security Concerns in Popular Cloud Storage Services},
  journal      = {{IEEE} Pervasive Comput.},
  volume       = {12},
  number       = {4},
  pages        = {50--57},
  year         = {2013},
  url          = {https://doi.org/10.1109/MPRV.2013.72},
  doi          = {10.1109/MPRV.2013.72},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pervasive/ChuZHLXZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ChenCTZ13,
  author       = {Yi{-}Ruei Chen and
                  Cheng{-}Kang Chu and
                  Wen{-}Guey Tzeng and
                  Jianying Zhou},
  editor       = {Michael J. Jacobson Jr. and
                  Michael E. Locasto and
                  Payman Mohassel and
                  Reihaneh Safavi{-}Naini},
  title        = {CloudHKA: {A} Cryptographic Approach for Hierarchical Access Control
                  in Cloud Computing},
  booktitle    = {Applied Cryptography and Network Security - 11th International Conference,
                  {ACNS} 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7954},
  pages        = {37--52},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38980-1\_3},
  doi          = {10.1007/978-3-642-38980-1\_3},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/ChenCTZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChuLWZZ13,
  author       = {Cheng{-}Kang Chu and
                  Joseph K. Liu and
                  Jun Wen Wong and
                  Yunlei Zhao and
                  Jianying Zhou},
  editor       = {Kefei Chen and
                  Qi Xie and
                  Weidong Qiu and
                  Ninghui Li and
                  Wen{-}Guey Tzeng},
  title        = {Privacy-preserving smart metering with regional statistics and personal
                  enquiry services},
  booktitle    = {8th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013},
  pages        = {369--380},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484313.2484362},
  doi          = {10.1145/2484313.2484362},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ChuLWZZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenCTZ13,
  author       = {Yi{-}Ruei Chen and
                  Cheng{-}Kang Chu and
                  Wen{-}Guey Tzeng and
                  Jianying Zhou},
  title        = {CloudHKA: {A} Cryptographic Approach for Hierarchical Access Control
                  in Cloud Computing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {208},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/208},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenCTZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HuangCSZD12,
  author       = {Xinyi Huang and
                  Cheng{-}Kang Chu and
                  Hung{-}Min Sun and
                  Jianying Zhou and
                  Robert H. Deng},
  title        = {Enhanced authentication for commercial video services},
  journal      = {Secur. Commun. Networks},
  volume       = {5},
  number       = {11},
  pages        = {1248--1259},
  year         = {2012},
  url          = {https://doi.org/10.1002/sec.620},
  doi          = {10.1002/SEC.620},
  timestamp    = {Thu, 17 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/HuangCSZD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/ChowCHZD12,
  author       = {Sherman S. M. Chow and
                  Cheng{-}Kang Chu and
                  Xinyi Huang and
                  Jianying Zhou and
                  Robert H. Deng},
  editor       = {David Naccache},
  title        = {Dynamic Secure Cloud Storage with Provenance},
  booktitle    = {Cryptography and Security: From Theory to Applications - Essays Dedicated
                  to Jean-Jacques Quisquater on the Occasion of His 65th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {6805},
  pages        = {442--464},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28368-0\_28},
  doi          = {10.1007/978-3-642-28368-0\_28},
  timestamp    = {Thu, 17 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/birthday/ChowCHZD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChuLHZ12,
  author       = {Cheng{-}Kang Chu and
                  Joseph K. Liu and
                  Xinyi Huang and
                  Jianying Zhou},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {Verifier-local revocation group signatures with time-bound keys},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {26--27},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414470},
  doi          = {10.1145/2414456.2414470},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ChuLHZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiuCZ11,
  author       = {Joseph K. Liu and
                  Cheng{-}Kang Chu and
                  Jianying Zhou},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {Identity-Based Server-Aided Decryption},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {337--352},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_22},
  doi          = {10.1007/978-3-642-22497-3\_22},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LiuCZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChuZCZD11,
  author       = {Cheng{-}Kang Chu and
                  Wen Tao Zhu and
                  Sherman S. M. Chow and
                  Jianying Zhou and
                  Robert H. Deng},
  editor       = {Bruce S. N. Cheung and
                  Lucas Chi Kwong Hui and
                  Ravi S. Sandhu and
                  Duncan S. Wong},
  title        = {Secure mobile subscription of sensor-encrypted data},
  booktitle    = {Proceedings of the 6th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24,
                  2011},
  pages        = {228--237},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1966913.1966943},
  doi          = {10.1145/1966913.1966943},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ChuZCZD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/BaekCZ11,
  author       = {Joonsang Baek and
                  Cheng{-}Kang Chu and
                  Jianying Zhou},
  editor       = {Aggelos Kiayias},
  title        = {On Shortening Ciphertexts: New Constructions for Compact Public Key
                  and Stateful Encryption Schemes},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2011 - The Cryptographers' Track at
                  the {RSA} Conference 2011, San Francisco, CA, USA, February 14-18,
                  2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6558},
  pages        = {302--318},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19074-2\_20},
  doi          = {10.1007/978-3-642-19074-2\_20},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/BaekCZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChuLZBD10,
  author       = {Cheng{-}Kang Chu and
                  Joseph K. Liu and
                  Jianying Zhou and
                  Feng Bao and
                  Robert H. Deng},
  editor       = {Dengguo Feng and
                  David A. Basin and
                  Peng Liu},
  title        = {Practical ID-based encryption for wireless sensor network},
  booktitle    = {Proceedings of the 5th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2010, Beijing, China, April 13-16,
                  2010},
  pages        = {337--340},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1755688.1755734},
  doi          = {10.1145/1755688.1755734},
  timestamp    = {Fri, 03 Jun 2022 12:02:10 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ChuLZBD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChuLZBD10,
  author       = {Cheng{-}Kang Chu and
                  Joseph K. Liu and
                  Jianying Zhou and
                  Feng Bao and
                  Robert H. Deng},
  title        = {Practical ID-based Encryption for Wireless Sensor Network},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {2},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/002},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChuLZBD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/ChuT09,
  author       = {Cheng{-}Kang Chu and
                  Wen{-}Guey Tzeng},
  title        = {Efficient Identity-Committable Signature and Group-Oriented Ring Signature
                  Schemes},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {25},
  number       = {5},
  pages        = {1465--1483},
  year         = {2009},
  url          = {http://www.iis.sinica.edu.tw/page/jise/2009/200909\_10.html},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/ChuT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChuWCZD09,
  author       = {Cheng{-}Kang Chu and
                  Jian Weng and
                  Sherman S. M. Chow and
                  Jianying Zhou and
                  Robert H. Deng},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Conditional Proxy Broadcast Re-Encryption},
  booktitle    = {Information Security and Privacy, 14th Australasian Conference, {ACISP}
                  2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5594},
  pages        = {327--342},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02620-1\_23},
  doi          = {10.1007/978-3-642-02620-1\_23},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ChuWCZD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WengDDCL09,
  author       = {Jian Weng and
                  Robert H. Deng and
                  Xuhua Ding and
                  Cheng{-}Kang Chu and
                  Junzuo Lai},
  editor       = {Wanqing Li and
                  Willy Susilo and
                  Udaya Kiran Tupakula and
                  Reihaneh Safavi{-}Naini and
                  Vijay Varadharajan},
  title        = {Conditional proxy re-encryption secure against chosen-ciphertext attack},
  booktitle    = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2009, Sydney, Australia, March
                  10-12, 2009},
  pages        = {322--332},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1533057.1533100},
  doi          = {10.1145/1533057.1533100},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WengDDCL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/ChuT08,
  author       = {Cheng{-}Kang Chu and
                  Wen{-}Guey Tzeng},
  title        = {Efficient k-out-of-n Oblivious Transfer Schemes},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {14},
  number       = {3},
  pages        = {397--415},
  year         = {2008},
  url          = {https://doi.org/10.3217/jucs-014-03-0397},
  doi          = {10.3217/JUCS-014-03-0397},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jucs/ChuT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ChuT07,
  author       = {Cheng{-}Kang Chu and
                  Wen{-}Guey Tzeng},
  title        = {Optimal resilient threshold {GQ} signatures},
  journal      = {Inf. Sci.},
  volume       = {177},
  number       = {8},
  pages        = {1834--1851},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.ins.2006.11.001},
  doi          = {10.1016/J.INS.2006.11.001},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/ChuT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChuT07,
  author       = {Cheng{-}Kang Chu and
                  Wen{-}Guey Tzeng},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {Identity-Committable Signatures and Their Extension to Group-Oriented
                  Ring Signatures},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {323--337},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_24},
  doi          = {10.1007/978-3-540-73458-1\_24},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ChuT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/ChuT07,
  author       = {Cheng{-}Kang Chu and
                  Wen{-}Guey Tzeng},
  editor       = {Juan A. Garay and
                  Arjen K. Lenstra and
                  Masahiro Mambo and
                  Ren{\'{e}} Peralta},
  title        = {Identity-Based Proxy Re-encryption Without Random Oracles},
  booktitle    = {Information Security, 10th International Conference, {ISC} 2007, Valpara{\'{\i}}so,
                  Chile, October 9-12, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4779},
  pages        = {189--202},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75496-1\_13},
  doi          = {10.1007/978-3-540-75496-1\_13},
  timestamp    = {Fri, 03 Feb 2023 21:39:19 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/ChuT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChuT07,
  author       = {Cheng{-}Kang Chu and
                  Wen{-}Guey Tzeng},
  title        = {Identity-Committable Signatures and Their Extension to Group-Oriented
                  Ring Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {354},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/354},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChuT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ChuT06,
  author       = {Cheng{-}Kang Chu and
                  Wen{-}Guey Tzeng},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {Conditional Oblivious Cast},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {443--457},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_29},
  doi          = {10.1007/11745853\_29},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ChuT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ChuT05,
  author       = {Cheng{-}Kang Chu and
                  Wen{-}Guey Tzeng},
  editor       = {Serge Vaudenay},
  title        = {Efficient \emph{k}-Out-of-\emph{n} Oblivious Transfer Schemes with
                  Adaptive and Non-adaptive Queries},
  booktitle    = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on
                  Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland,
                  January 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3386},
  pages        = {172--183},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30580-4\_12},
  doi          = {10.1007/978-3-540-30580-4\_12},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ChuT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChuT04,
  author       = {Cheng{-}Kang Chu and
                  Wen{-}Guey Tzeng},
  title        = {Efficient k-out-of-n Oblivious Transfer Schemes with Adaptive and
                  Non-Adaptive Queries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {41},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/041},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChuT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LiuCT03,
  author       = {Li{-}Shan Liu and
                  Cheng{-}Kang Chu and
                  Wen{-}Guey Tzeng},
  editor       = {Jianying Zhou and
                  Moti Yung and
                  Yongfei Han},
  title        = {A Threshold {GQ} Signature Scheme},
  booktitle    = {Applied Cryptography and Network Security, First International Conference,
                  {ACNS} 2003. Kunming, China, October 16-19, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2846},
  pages        = {137--150},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45203-4\_11},
  doi          = {10.1007/978-3-540-45203-4\_11},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/LiuCT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChuLT03,
  author       = {Cheng{-}Kang Chu and
                  Li{-}Shan Liu and
                  Wen{-}Guey Tzeng},
  title        = {A Threshold {GQ} Signature Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {16},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/016},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChuLT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ChuT02,
  author       = {Cheng{-}Kang Chu and
                  Wen{-}Guey Tzeng},
  editor       = {Robert H. Deng and
                  Sihan Qing and
                  Feng Bao and
                  Jianying Zhou},
  title        = {Distributed Key Generation as a Component of an Integrated Protocol},
  booktitle    = {Information and Communications Security, 4th International Conference,
                  {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2513},
  pages        = {411--421},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36159-6\_35},
  doi          = {10.1007/3-540-36159-6\_35},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/ChuT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics