Rongmao Chen
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – today
- 2019
- [j14]Peng Jiang, Jianchang Lai, Fuchun Guo, Willy Susilo, Man Ho Au, Guomin Yang, Yi Mu, Rongmao Chen:
Identity-based revocation system: Enhanced security model and scalable bounded IBRS construction with short parameters. Inf. Sci. 472: 35-52 (2019) - 2018
- [j13]Jianchang Lai, Yi Mu, Fuchun Guo, Rongmao Chen, Sha Ma:
Efficient k-out-of-n oblivious transfer scheme with the ideal communication cost. Theor. Comput. Sci. 714: 15-26 (2018) - [c15]Chi Liu, Rongmao Chen, Yi Wang, Yongjun Wang:
Asymmetric Subversion Attacks on Signature Schemes. ACISP 2018: 376-395 - [c14]Lin Liu, Jinshu Su, Rongmao Chen, Ximeng Liu, Xiaofeng Wang, Shuhui Chen, Ho-fung Leung:
Privacy-Preserving Mining of Association Rule on Outsourced Cloud Data from Multiple Parties. ACISP 2018: 431-451 - [c13]Yusheng Xia, Jinshu Su, Rongmao Chen, Yaping Liu, Shuhui Chen:
A Real-Time Aware Routing Strategy in Smart City Environments. SECON Workshops 2018: 9-14 - [c12]Yangguang Tian, Yingjiu Li, Rongmao Chen, Nan Li, Ximeng Liu, Bing Chang, Xingjie Yu:
Privacy-Preserving Biometric-Based Remote User Authentication with Leakage Resilience. SecureComm (1) 2018: 112-132 - 2017
- [j12]Jianchang Lai, Yi Mu, Fuchun Guo, Rongmao Chen:
Fully Privacy-Preserving ID-Based Broadcast Encryption with Authorization. Comput. J. 60(12): 1809-1821 (2017) - [j11]Xiaofen Wang, Yi Mu, Rongmao Chen:
Privacy-preserving data search and sharing protocol for social networks through wireless applications. Concurrency and Computation: Practice and Experience 29(7) (2017) - [j10]Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo:
Strong authenticated key exchange with auxiliary inputs. Des. Codes Cryptography 85(1): 145-173 (2017) - [j9]Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo, Zheng Yang:
A note on the strong authenticated key exchange with auxiliary inputs. Des. Codes Cryptography 85(1): 175-178 (2017) - [j8]Jianchang Lai, Yi Mu, Fuchun Guo, Willy Susilo, Rongmao Chen:
Fully privacy-preserving and revocable ID-based broadcast encryption for data access control in smart city. Personal and Ubiquitous Computing 21(5): 855-868 (2017) - [j7]Xiaofen Wang, Yi Mu, Rongmao Chen:
Privacy-Preserving Data Packet Filtering Protocol with Source IP Authentication. Wireless Personal Communications 95(4): 3509-3537 (2017) - [c11]Hao Sun, Jinshu Su, Xiaofeng Wang, Rongmao Chen, Yujing Liu, Qiaolin Hu:
PriMal: Cloud-Based Privacy-Preserving Malware Detection. ACISP (2) 2017: 153-172 - [c10]Fuchun Guo, Rongmao Chen, Willy Susilo, Jianchang Lai, Guomin Yang, Yi Mu:
Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with a Counterexample. CRYPTO (2) 2017: 517-547 - [c9]Clémentine Gritti, Rongmao Chen, Willy Susilo, Thomas Plantard:
Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy. ISPEC 2017: 485-505 - [i6]Clémentine Gritti, Rongmao Chen, Willy Susilo, Thomas Plantard:
Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy. CoRR abs/1709.08434 (2017) - [i5]Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo:
Strong Authenticated Key Exchange with Auxiliary Inputs. IACR Cryptology ePrint Archive 2017: 418 (2017) - [i4]Fuchun Guo, Rongmao Chen, Willy Susilo, Jianchang Lai, Guomin Yang, Yi Mu:
Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with A Counterexample. IACR Cryptology ePrint Archive 2017: 499 (2017) - 2016
- [j6]Xiaofen Wang, Yi Mu, Rongmao Chen, Xiaosong Zhang:
Secure Channel Free ID-Based Searchable Encryption for Peer-to-Peer Group. J. Comput. Sci. Technol. 31(5): 1012-1027 (2016) - [j5]Xiaofen Wang, Yi Mu, Rongmao Chen:
An efficient privacy-preserving aggregation and billing protocol for smart grid. Security and Communication Networks 9(17): 4536-4547 (2016) - [j4]Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo, Xiaofen Wang:
Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage. IEEE Trans. Information Forensics and Security 11(4): 789-798 (2016) - [j3]Xiaofen Wang, Yi Mu, Rongmao Chen:
One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications. IEEE Trans. Information Forensics and Security 11(8): 1712-1721 (2016) - [j2]Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo, Xinyi Huang, Xiaofen Wang, Yongjun Wang:
Server-Aided Public Key Encryption With Keyword Search. IEEE Trans. Information Forensics and Security 11(12): 2833-2842 (2016) - [c8]Rongmao Chen, Yi Mu, Willy Susilo, Guomin Yang, Fuchun Guo, Mingwu Zhang:
One-Round Strong Oblivious Signature-Based Envelope. ACISP (2) 2016: 3-20 - [c7]Jianchang Lai, Yi Mu, Fuchun Guo, Willy Susilo, Rongmao Chen:
Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing. ACISP (2) 2016: 223-239 - [c6]Fuchun Guo, Willy Susilo, Yi Mu, Rongmao Chen, Jianchang Lai, Guomin Yang:
Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction. ASIACRYPT (2) 2016: 745-776 - [c5]Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo, Mingwu Zhang:
Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions. ASIACRYPT (1) 2016: 844-876 - [c4]Willy Susilo, Rongmao Chen, Fuchun Guo, Guomin Yang, Yi Mu, Yang-Wai Chow:
Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke Some Recipients in IBBE without Knowledge of the Plaintext. AsiaCCS 2016: 201-210 - [c3]Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo:
Strongly Leakage-Resilient Authenticated Key Exchange. CT-RSA 2016: 19-36 - [c2]Peng Jiang, Xiaofen Wang, Jianchang Lai, Fuchun Guo, Rongmao Chen:
Oblivious Keyword Search with Authorization. ProvSec 2016: 173-190 - [i3]Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo:
Strongly Leakage-Resilient Authenticated Key Exchange. IACR Cryptology ePrint Archive 2016: 308 (2016) - [i2]Fuchun Guo, Willy Susilo, Yi Mu, Rongmao Chen, Jianchang Lai, Guomin Yang:
Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction. IACR Cryptology ePrint Archive 2016: 872 (2016) - [i1]Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo, Mingwu Zhang:
Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions. IACR Cryptology ePrint Archive 2016: 873 (2016) - 2015
- [j1]Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo:
BL-MLE: Block-Level Message-Locked Encryption for Secure Large File Deduplication. IEEE Trans. Information Forensics and Security 10(12): 2643-2652 (2015) - [c1]Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo, Xiaofen Wang:
A New General Framework for Secure Public Key Encryption with Keyword Search. ACISP 2015: 59-76
Coauthor Index
last updated on 2019-01-12 22:08 CET by the dblp team
data released under the ODC-BY 1.0 license
see also: Terms of Use | Privacy Policy | Imprint