default search action
Duncan S. Wong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j115]Zhihao Li, Qi Chen, Jin Li, Jiahui Huang, Weichuan Mo, Duncan S. Wong, Hai Jiang:
A secure and efficient UAV network defense strategy: Convergence of blockchain and deep learning. Comput. Stand. Interfaces 90: 103844 (2024) - [j114]Jianhong Li, Qi Chen, Jin Li, Zihan Jiang, Guoyu Yang, Teng Huang, Hongyang Yan, Duncan S. Wong:
Reputation is not enough: Ensuring strong order-fairness in Byzantine consensus. Comput. Stand. Interfaces 90: 103855 (2024) - [j113]Jiahui Huang, Teng Huang, Huanchun Wei, Jiehua Zhang, Hongyang Yan, Duncan S. Wong, Haibo Hu:
zkChain: A privacy-preserving model based on zk-SNARKs and hash chain for efficient transfer of assets. Trans. Emerg. Telecommun. Technol. 35(4) (2024) - 2023
- [c116]Xingjiang Cheng, Fuxing Zhang, Yun Peng, Xianmin Wang, Teng Huang, Ziye Zhou, Duncan S. Wong, Changyu Dong:
A Survey of Privacy Preserving Subgraph Matching Methods. AIS&P (1) 2023: 98-113 - [c115]Ruilin Yang, Hui Yang, Jiluan Fan, Changyu Dong, Yan Pang, Duncan S. Wong, Shaowei Wang:
Personalized Differential Privacy in the Shuffle Model. AIS&P (1) 2023: 468-482 - 2022
- [j112]Jie Yang, Jun Zheng, Zheng Zhang, Q. I. Chen, Duncan S. Wong, Yuanzhang Li:
Security of federated learning for cloud-edge intelligence collaborative computing. Int. J. Intell. Syst. 37(11): 9290-9308 (2022) - [j111]Arthur Sandor Voundi Koe, Qi Chen, Juan Tang, Shan Ai, Hongyang Yan, Shiwen Zhang, Duncan S. Wong:
Outsourcing multiauthority access control revocation and computations over medical data to mobile cloud. Int. J. Intell. Syst. 37(11): 9774-9797 (2022) - [j110]Zhen Liu, Guomin Yang, Duncan S. Wong, Khoa Nguyen, Huaxiong Wang, Xiaorong Ke, Yining Liu:
Secure Deterministic Wallet and Stealth Address: Key-Insulated and Privacy-Preserving Signature Scheme With Publicly Derived Public Key. IEEE Trans. Dependable Secur. Comput. 19(5): 2934-2951 (2022) - 2021
- [j109]Zhen Liu, Qiong Huang, Duncan S. Wong:
On Enabling Attribute-Based Encryption to Be Traceable Against Traitors. Comput. J. 64(4): 575-598 (2021) - [j108]Anjia Yang, Jia Xu, Jian Weng, Jianying Zhou, Duncan S. Wong:
Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage. IEEE Trans. Cloud Comput. 9(1): 212-225 (2021) - 2020
- [j107]Raphael C.-W. Phan, Masayuki Abe, Lynn Batten, Jung Hee Cheon, Ed Dawson, Steven D. Galbraith, Jian Guo, Lucas C. K. Hui, Kwangjo Kim, Xuejia Lai, Dong Hoon Lee, Mitsuru Matsui, Tsutomu Matsumoto, Shiho Moriai, Phong Q. Nguyen, Dingyi Pei, Duong Hieu Phan, Josef Pieprzyk, Huaxiong Wang, Hank Wolfe, Duncan S. Wong, Tzong-Chen Wu, Bo-Yin Yang, Siu-Ming Yiu, Yu Yu, Jianying Zhou:
Advances in security research in the Asiacrypt region. Commun. ACM 63(4): 76-81 (2020) - [j106]Guangquan Xu, Bingjiang Guo, Chunhua Su, Xi Zheng, Kaitai Liang, Duncan S. Wong, Hao Wang:
Am I eclipsed? A smart detector of eclipse attacks for Ethereum. Comput. Secur. 88 (2020) - [j105]Yunhui Zhuang, Anjia Yang, Gerhard P. Hancke, Duncan S. Wong, Guomin Yang:
Energy-Efficient Distance-Bounding with Residual Charge Computation. IEEE Trans. Emerg. Top. Comput. 8(2): 365-376 (2020) - [p1]Zhi Lin, Weizhi Meng, Wenjuan Li, Duncan S. Wong:
Developing Cloud-Based Intelligent Touch Behavioral Authentication on Mobile Phones. Deep Biometrics 2020: 141-159
2010 – 2019
- 2019
- [c114]Zhen Liu, Khoa Nguyen, Guomin Yang, Huaxiong Wang, Duncan S. Wong:
A Lattice-Based Linkable Ring Signature Supporting Stealth Addresses. ESORICS (1) 2019: 726-746 - [c113]Zhen Liu, Guomin Yang, Duncan S. Wong, Khoa Nguyen, Huaxiong Wang:
Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key. EuroS&P 2019: 215-230 - 2018
- [j104]Anjia Yang, Yunhui Zhuang, Jian Weng, Gerhard P. Hancke, Duncan S. Wong, Guomin Yang:
Exploring relationship between indistinguishability-based and unpredictability-based RFID privacy models. Future Gener. Comput. Syst. 82: 315-326 (2018) - [j103]Jin Li, Xiaofeng Chen, Sherman S. M. Chow, Qiong Huang, Duncan S. Wong, Zheli Liu:
Multi-authority fine-grained access control with accountability and its application in cloud. J. Netw. Comput. Appl. 112: 89-96 (2018) - [j102]Weizhi Meng, Yu Wang, Duncan S. Wong, Sheng Wen, Yang Xiang:
TouchWB: Touch behavioral user authentication based on web browsing on smartphones. J. Netw. Comput. Appl. 117: 1-9 (2018) - [j101]Xing Hu, Chunming Tang, Duncan S. Wong, Xianghan Zheng:
Efficient pairing-free PRE schemes for multimedia data sharing in IoT. Multim. Tools Appl. 77(14): 18327-18354 (2018) - [j100]Weizhi Meng, Wenjuan Li, Duncan S. Wong:
Enhancing touch behavioral authentication via cost-based intelligent mechanism on smartphones. Multim. Tools Appl. 77(23): 30167-30185 (2018) - [j99]Anjia Yang, Elena Pagnin, Aikaterini Mitrokotsa, Gerhard P. Hancke, Duncan S. Wong:
Two-Hop Distance-Bounding Protocols: Keep Your Friends Close. IEEE Trans. Mob. Comput. 17(7): 1723-1736 (2018) - [i40]Zhen Liu, Guomin Yang, Duncan S. Wong, Khoa Nguyen, Huaxiong Wang:
Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key. IACR Cryptol. ePrint Arch. 2018: 956 (2018) - [i39]Zhen Liu, Duncan S. Wong:
On Enabling Attribute-Based Encryption to Be Traceable against Traitors. IACR Cryptol. ePrint Arch. 2018: 963 (2018) - 2017
- [j98]Yinghui Zhang, Xiaofeng Chen, Jin Li, Duncan S. Wong, Hui Li, Ilsun You:
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Inf. Sci. 379: 42-61 (2017) - [j97]Jin Li, Hongyang Yan, Zheli Liu, Xiaofeng Chen, Xinyi Huang, Duncan S. Wong:
Location-Sharing Systems With Enhanced Privacy in Mobile Online Social Networks. IEEE Syst. J. 11(2): 439-448 (2017) - [j96]Fuchun Guo, Yi Mu, Willy Susilo, Homer Hsing, Duncan S. Wong, Vijay Varadharajan:
Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight Devices. IEEE Trans. Dependable Secur. Comput. 14(2): 211-220 (2017) - [j95]Qi Xie, Duncan S. Wong, Guilin Wang, Xiao Tan, Kefei Chen, Liming Fang:
Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model. IEEE Trans. Inf. Forensics Secur. 12(6): 1382-1392 (2017) - [j94]Joonsang Baek, Eman Hableel, Young-Ji Byon, Duncan S. Wong, Kitae Jang, Hwasoo Yeo:
How to Protect ADS-B: Confidentiality Framework and Efficient Realization Based on Staged Identity-Based Encryption. IEEE Trans. Intell. Transp. Syst. 18(3): 690-700 (2017) - [j93]Anjia Yang, Xiao Tan, Joonsang Baek, Duncan S. Wong:
A New ADS-B Authentication Framework Based on Efficient Hierarchical Identity-Based Signature with Batch Verification. IEEE Trans. Serv. Comput. 10(2): 165-175 (2017) - [j92]Roman Schlegel, Chi-Yin Chow, Qiong Huang, Duncan S. Wong:
Privacy-Preserving Location Sharing Services for Social Networks. IEEE Trans. Serv. Comput. 10(5): 811-825 (2017) - [j91]Qi Xie, Bin Hu, Xiao Tan, Duncan S. Wong:
Chaotic Maps-Based Strong Anonymous Authentication Scheme for Roaming Services in Global Mobility Networks. Wirel. Pers. Commun. 96(4): 5881-5896 (2017) - [c112]Xiaoyi Li, Kaitai Liang, Zhen Liu, Duncan S. Wong:
Attribute based Encryption: Traitor Tracing, Revocation and Fully Security on Prime Order Groups. CLOSER 2017: 281-292 - 2016
- [j90]Joonsang Baek, Duncan S. Wong, Jin Li, Man Ho Au:
Efficient Generic Construction of CCA-Secure Identity-Based Encryption from Randomness Extraction. Comput. J. 59(4): 508-521 (2016) - [j89]Joseph K. Liu, Sze Ling Yeo, Wun-She Yap, Sherman S. M. Chow, Duncan S. Wong, Willy Susilo:
Faulty Instantiations of Threshold Ring Signature from Threshold Proof-of-Knowledge Protocol. Comput. J. 59(7): 945-954 (2016) - [j88]Zhen Liu, Duncan S. Wong:
Practical Attribute-Based Encryption: Traitor Tracing, Revocation and Large Universe. Comput. J. 59(7): 983-1004 (2016) - [j87]Hao Wang, Zhen Liu, Zhe Liu, Duncan S. Wong:
Identity-based aggregate signcryption in the standard model from multilinear maps. Frontiers Comput. Sci. 10(4): 741-754 (2016) - [j86]Yujue Wang, Qianhong Wu, Duncan S. Wong, Bo Qin, Jian Mao, Yong Ding:
Provably secure robust optimistic fair exchange of distributed signatures. Future Gener. Comput. Syst. 62: 29-39 (2016) - [j85]Qi Xie, Na Dong, Duncan S. Wong, Bin Hu:
Cryptanalysis and security enhancement of a robust two-factor authentication and key agreement protocol. Int. J. Commun. Syst. 29(3): 478-487 (2016) - [j84]Clémentine Gritti, Willy Susilo, Thomas Plantard, Kaitai Liang, Duncan S. Wong:
Broadcast encryption with dealership. Int. J. Inf. Sec. 15(3): 271-283 (2016) - [j83]Dennis Y. W. Liu, Duncan S. Wong:
One-move convertible nominative signature in the standard model. Secur. Commun. Networks 9(12): 1796-1809 (2016) - [c111]Weizhi Meng, Wenjuan Li, Duncan S. Wong, Jianying Zhou:
TMGuard: A Touch Movement-Based Security Mechanism for Screen Unlock Patterns on Smartphones. ACNS 2016: 629-647 - [c110]Zhen Liu, Duncan S. Wong, Jack Poon:
Dealerless Corporate Key Generation for Identity-Based Encryption Schemes. AsiaCCS 2016: 211-222 - [c109]Jia Xu, Anjia Yang, Jianying Zhou, Duncan S. Wong:
Lightweight Delegatable Proofs of Storage. ESORICS (1) 2016: 324-343 - [c108]Xing Hu, Chunming Tang, Duncan S. Wong:
Highly Efficient Proxy Re-encryption Schemes for User-End Encrypted Cloud Data Sharing. ISPDC 2016: 261-268 - [i38]Xiaoyi Li, Kaitai Liang, Zhen Liu, Duncan S. Wong:
Attribute Based Encryption: Traitor Tracing, Revocation and Fully Security on Prime Order Groups. IACR Cryptol. ePrint Arch. 2016: 1140 (2016) - 2015
- [j82]Yujue Wang, Qianhong Wu, Duncan S. Wong, Bo Qin, Yi Mu, Jianwei Liu:
Further ideal multipartite access structures from integer polymatroids. Sci. China Inf. Sci. 58(7): 1-13 (2015) - [j81]Kaitai Liang, Willy Susilo, Joseph K. Liu, Duncan S. Wong:
Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption. Comput. J. 58(10): 2778-2792 (2015) - [j80]Weizhi Meng, Duncan S. Wong, Steven Furnell, Jianying Zhou:
Surveying the Development of Biometric User Authentication on Mobile Phones. IEEE Commun. Surv. Tutorials 17(3): 1268-1293 (2015) - [j79]Kaitai Liang, Liming Fang, Duncan S. Wong, Willy Susilo:
A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds. Concurr. Comput. Pract. Exp. 27(8): 2004-2027 (2015) - [j78]Tao Jiang, Xiaofeng Chen, Jin Li, Duncan S. Wong, Jianfeng Ma, Joseph K. Liu:
Towards secure and reliable cloud storage against data re-outsourcing. Future Gener. Comput. Syst. 52: 86-94 (2015) - [j77]Kaitai Liang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang, Yong Yu, Anjia Yang:
A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing. Future Gener. Comput. Syst. 52: 95-108 (2015) - [j76]Roman Schlegel, Duncan S. Wong:
Private friends on a social networking site operated by an overly curious SNP. Int. J. Comput. Sci. Eng. 10(3): 281-292 (2015) - [j75]Yan Ren, Chunming Tang, Guilin Wang, Duncan S. Wong:
Attribute-based signature schemes with accountability. Int. J. Inf. Commun. Technol. 7(2/3): 141-158 (2015) - [j74]Kaitai Liang, Joseph K. Liu, Rongxing Lu, Duncan S. Wong:
Privacy Concerns for Photo Sharing in Online Social Networks. IEEE Internet Comput. 19(2): 58-63 (2015) - [j73]Qiong Huang, Duncan S. Wong, Willy Susilo:
How to protect privacy in Optimistic Fair Exchange of digital signatures. Inf. Sci. 325: 300-315 (2015) - [j72]Jin Li, Zheli Liu, Xiaofeng Chen, Fatos Xhafa, Xiao Tan, Duncan S. Wong:
L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing. Knowl. Based Syst. 79: 18-26 (2015) - [j71]Fatos Xhafa, Jingwei Li, Gansen Zhao, Jin Li, Xiaofeng Chen, Duncan S. Wong:
Designing cloud-based electronic health record system with attribute-based encryption. Multim. Tools Appl. 74(10): 3441-3458 (2015) - [j70]Yilei Wang, Duncan S. Wong, Chuan Zhao, Qiuliang Xu:
Fair two-party computation with rational parties holding private types. Secur. Commun. Networks 8(2): 284-297 (2015) - [j69]Anjia Yang, Kaitai Liang, Yunhui Zhuang, Duncan S. Wong, Xiaohua Jia:
A new unpredictability-based radio frequency identification forward privacy model and a provably secure construction. Secur. Commun. Networks 8(16): 2836-2849 (2015) - [j68]Yilei Wang, Duncan S. Wong, Willy Susilo, Xiaofeng Chen, Qiuliang Xu:
Achieving fairness by sequential equilibrium in rational two-party computation under incomplete information. Secur. Commun. Networks 8(18): 3690-3700 (2015) - [j67]Jin Li, Xiao Tan, Xiaofeng Chen, Duncan S. Wong, Fatos Xhafa:
OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices. IEEE Trans. Cloud Comput. 3(2): 195-205 (2015) - [j66]Xiaofeng Chen, Willy Susilo, Jin Li, Duncan S. Wong, Jianfeng Ma, Shaohua Tang, Qiang Tang:
Efficient algorithms for secure outsourcing of bilinear pairings. Theor. Comput. Sci. 562: 112-121 (2015) - [j65]Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo:
Ambiguous optimistic fair exchange: Definition and constructions. Theor. Comput. Sci. 562: 177-193 (2015) - [j64]Xiao Tan, Qiong Huang, Duncan S. Wong:
Concurrent signature without random oracles. Theor. Comput. Sci. 562: 194-212 (2015) - [j63]Yujue Wang, Duncan S. Wong, Qianhong Wu, Sherman S. M. Chow, Bo Qin, Jianwei Liu, Yong Ding:
Practical (fully) distributed signatures provably secure in the standard model. Theor. Comput. Sci. 595: 143-158 (2015) - [j62]Zhen Liu, Zhenfu Cao, Duncan S. Wong:
Traceable CP-ABE: How to Trace Decryption Devices Found in the Wild. IEEE Trans. Inf. Forensics Secur. 10(1): 55-68 (2015) - [j61]Xiaofeng Chen, Xinyi Huang, Jin Li, Jianfeng Ma, Wenjing Lou, Duncan S. Wong:
New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations. IEEE Trans. Inf. Forensics Secur. 10(1): 69-78 (2015) - [j60]Roman Schlegel, Chi-Yin Chow, Qiong Huang, Duncan S. Wong:
User-Defined Privacy Grid System for Continuous Location-Based Services. IEEE Trans. Mob. Comput. 14(10): 2158-2172 (2015) - [c107]Zhen Liu, Duncan S. Wong:
Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe. ACNS 2015: 127-146 - [c106]Zhen Liu, Duncan S. Wong:
Traceable CP-ABE on Prime Order Groups: Fully Secure and Fully Collusion-Resistant Blackbox Traceable. ICICS 2015: 109-124 - [c105]Eman Hableel, Joonsang Baek, Young-Ji Byon, Duncan S. Wong:
How to protect ADS-B: Confidentiality framework for future air traffic communication. INFOCOM Workshops 2015: 155-160 - [c104]Yunhui Zhuang, Gerhard P. Hancke, Duncan S. Wong:
How to Demonstrate Our Presence Without Disclosing Identity? Evidence from a Grouping-Proof Protocol. WISA 2015: 423-435 - [i37]Zhen Liu, Duncan S. Wong:
Traceable CP-ABE on Prime Order Groups: Fully Secure and Fully Collusion-resistant Blackbox Traceable. IACR Cryptol. ePrint Arch. 2015: 850 (2015) - 2014
- [j59]Xiaofeng Chen, Jin Li, Jianfeng Ma, Wenjing Lou, Duncan S. Wong:
New and efficient conditional e-payment systems with transferability. Future Gener. Comput. Syst. 37: 252-258 (2014) - [j58]Jin Li, Xiaofeng Chen, Qiong Huang, Duncan S. Wong:
Digital provenance: Enabling secure data forensics in cloud computing. Future Gener. Comput. Syst. 37: 259-266 (2014) - [j57]Fatos Xhafa, Jin Li, Duncan S. Wong, Francesco Palmieri:
Advances in Security and Privacy in Sensor Networks. Int. J. Distributed Sens. Networks 10 (2014) - [j56]Qi Xie, Dongzhao Hong, Mengjie Bao, Na Dong, Duncan S. Wong:
Privacy-Preserving Mobile Roaming Authentication with Security Proof in Global Mobility Networks. Int. J. Distributed Sens. Networks 10 (2014) - [j55]Yuan Wang, Duncan S. Wong, Liusheng Huang:
One-Pass Key Establishment Protocol for Wireless Roaming with User Anonymity. Int. J. Netw. Secur. 16(2): 129-142 (2014) - [j54]Weizhi Meng, Duncan S. Wong, Lam-for Kwok:
The effect of adaptive mechanism on behavioural biometric based mobile phone authentication. Inf. Manag. Comput. Secur. 22(2): 155-166 (2014) - [j53]Clémentine Gritti, Willy Susilo, Thomas Plantard, Kaitai Liang, Duncan S. Wong:
Empowering Personal Health Records with Cloud Computing: How to encrypt with forthcoming fine-grained policies efficiently. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 5(4): 3-28 (2014) - [j52]Qi Xie, Xiao Tan, Duncan S. Wong, Guilin Wang, Mengjie Bao, Na Dong:
A practical anonymous authentication protocol for wireless roaming. Secur. Commun. Networks 7(8): 1264-1273 (2014) - [j51]Guomin Yang, Chik How Tan, Yi Mu, Willy Susilo, Duncan S. Wong:
Identity based identification from algebraic coding theory. Theor. Comput. Sci. 520: 51-61 (2014) - [j50]Kaitai Liang, Cheng-Kang Chu, Xiao Tan, Duncan S. Wong, Chunming Tang, Jianying Zhou:
Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts. Theor. Comput. Sci. 539: 87-105 (2014) - [j49]Xiao Tan, Qiong Huang, Duncan S. Wong:
Extending concurrent signature to multiple parties. Theor. Comput. Sci. 548: 54-67 (2014) - [j48]Fuchun Guo, Yi Mu, Willy Susilo, Duncan S. Wong, Vijay Varadharajan:
CP-ABE With Constant-Size Keys for Lightweight Devices. IEEE Trans. Inf. Forensics Secur. 9(5): 763-771 (2014) - [j47]Kaitai Liang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang, Tran Viet Xuan Phuong, Qi Xie:
A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing. IEEE Trans. Inf. Forensics Secur. 9(10): 1667-1680 (2014) - [j46]Xiaofeng Chen, Jin Li, Xinyi Huang, Jingwei Li, Yang Xiang, Duncan S. Wong:
Secure Outsourced Attribute-Based Signatures. IEEE Trans. Parallel Distributed Syst. 25(12): 3285-3294 (2014) - [c103]Zhen Liu, Zhenfu Cao, Duncan S. Wong:
Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts. Inscrypt 2014: 403-423 - [c102]Yujue Wang, Duncan S. Wong, Qianhong Wu, Sherman S. M. Chow, Bo Qin, Jianwei Liu:
Practical Distributed Signatures in the Standard Model. CT-RSA 2014: 307-326 - [c101]Qiong Huang, Duncan S. Wong, Willy Susilo:
P2OFE: Privacy-Preserving Optimistic Fair Exchange of Digital Signatures. CT-RSA 2014: 367-384 - [c100]Kaitai Liang, Joseph K. Liu, Duncan S. Wong, Willy Susilo:
An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing. ESORICS (1) 2014: 257-272 - [c99]Yujue Wang, Qianhong Wu, Duncan S. Wong, Bo Qin, Sherman S. M. Chow, Zhen Liu, Xiao Tan:
Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage. ESORICS (1) 2014: 326-343 - [c98]Lie Qu, Yan Wang, Mehmet A. Orgun, Duncan S. Wong, Athman Bouguettaya:
Evaluating Cloud Users' Credibility of Providing Subjective Assessment or Objective Assessment for Cloud Services. ICSOC 2014: 453-461 - [c97]Tao Jiang, Xiaofeng Chen, Jin Li, Duncan S. Wong, Jianfeng Ma, Joseph K. Liu:
TIMER: Secure and Reliable Cloud Storage against Data Re-outsourcing. ISPEC 2014: 346-358 - [c96]Kaitai Liang, Man Ho Au, Willy Susilo, Duncan S. Wong, Guomin Yang, Yong Yu:
An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data Sharing. ISPEC 2014: 448-461 - [c95]Yuxin Meng, Duncan S. Wong, Lam-for Kwok:
Design of touch dynamics based user authentication with an adaptive mechanism on mobile phones. SAC 2014: 1680-1687 - [i36]Jia Xu, Anjia Yang, Jianying Zhou, Duncan S. Wong:
Lightweight and Privacy-Preserving Delegatable Proofs of Storage. IACR Cryptol. ePrint Arch. 2014: 395 (2014) - [i35]Zhen Liu, Duncan S. Wong:
Practical Attribute Based Encryption: Traitor Tracing, Revocation, and Large Universe. IACR Cryptol. ePrint Arch. 2014: 616 (2014) - [i34]Zhen Liu, Zhenfu Cao, Duncan S. Wong:
Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts. IACR Cryptol. ePrint Arch. 2014: 676 (2014) - 2013
- [j45]Joonsang Baek, Quang Hieu Vu, Abdulhadi Shoufan, Andrew Jones, Duncan S. Wong:
Stateful Public-Key Encryption Schemes Forward-Secure Against State Exposure. Comput. J. 56(4): 497-507 (2013) - [j44]Qiong Huang, Duncan S. Wong, Willy Susilo:
The construction of ambiguous optimistic fair exchange from designated confirmer signature without random oracles. Inf. Sci. 228: 222-238 (2013) - [j43]Qi Xie, Na Dong, Xiao Tan, Duncan S. Wong, Guilin Wang:
Improvement of a Three-Party Password-Based Key Exchange Protocol with Formal Verification. Inf. Technol. Control. 42(3): 231-237 (2013) - [j42]Qiong Huang, Duncan S. Wong:
Short and efficient convertible undeniable signature schemes without random oracles. Theor. Comput. Sci. 476: 67-83 (2013) - [j41]Zhen Liu, Zhenfu Cao, Duncan S. Wong:
White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures. IEEE Trans. Inf. Forensics Secur. 8(1): 76-88 (2013) - [c94]Willy Susilo, Man Ho Au, Yang Wang, Duncan S. Wong:
Fairness in Concurrent Signatures Revisited. ACISP 2013: 318-329 - [c93]Zhen Liu, Zhenfu Cao, Duncan S. Wong:
Blackbox traceable CP-ABE: how to catch people leaking their keys by selling decryption devices on ebay. CCS 2013: 475-486 - [c92]Yinghui Zhang, Xiaofeng Chen, Jin Li, Duncan S. Wong, Hui Li:
Anonymous attribute-based encryption supporting efficient decryption test. AsiaCCS 2013: 511-516 - [c91]