What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Joseph K. Liu
Google Scholar
118
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/popets
Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy.
Cong Zuo
Shangqi Lai
Shi-Feng Sun
Xingliang Yuan
Joseph K. Liu
Jun Shao
Huaxiong Wang
Liehuang Zhu
Shujie Cui
2025
conf/acisp
SoK: A Deep Dive Into Anti-money Laundering Techniques for Blockchain Cryptocurrencies.
Qishuang Fu
Joseph K. Liu
Shirui Pan
Tsz Hon Yuen
2025
conf/provsec
GenDetect: Generative Large Language Model Usage in Smart Contract Vulnerability Detection.
Peter Ince
Jiangshan Yu
Joseph K. Liu
Xiaoning Du
Xiapu Luo
2025
conf/provsec
More Practical Non-interactive Encrypted Conjunctive Search with Leakage and Storage Suppression.
Huu Ngoc Duc Nguyen
Shujie Cui
Shangqi Lai
Tsz Hon Yuen
Joseph K. Liu
2025
conf/provsec
Plum: SNARK-Friendly Post-Quantum Signature Based on Power Residue PRFs.
Xinyu Zhang
Qishuang Fu
Ron Steinfeld
Joseph K. Liu
Tsz Hon Yuen
Man Ho Au
2025
conf/provsec
SEARCHAIN: Searchable Encryption As Rewarded-Useful-Work on Blockchain.
Jun Zhao
Jiangshan Yu
Xingliang Yuan
Joseph K. Liu
Cong Zuo
Hui Cui
2024
journals/tifs
A Two-Stage Approach for Fair Data Trading Based on Blockchain.
Fei Chen
Haohui Zhang
Tao Xiang
Joseph K. Liu
2024
conf/ccs
Practical Non-interactive Encrypted Conjunctive Search with Leakage Suppression.
Yunling Wang
Shi-Feng Sun
Jianfeng Wang
Xiaofeng Chen
Joseph K. Liu
Dawu Gu
2024
conf/acisp
AegisDB: Scalable Blockchain Database with Secure Decentralised Load Balancing.
Jun Zhao
Jiangshan Yu
Xingliang Yuan
Joseph K. Liu
2024
conf/acisp
DualRing-PRF: Post-quantum (Linkable) Ring Signatures from Legendre and Power Residue PRFs.
Xinyu Zhang
Ron Steinfeld
Joseph K. Liu
Muhammed F. Esgin
Dongxi Liu
Sushmita Ruj
2024
conf/acisp
SecuPath: A Secure and Privacy-Preserving Multiparty Path Planning Framework in UAV Applications.
Yanjun Shen
Joseph K. Liu
Xingliang Yuan
Shifeng Sun
Hui Cui
2024
conf/acisp
Detect Llama - Finding Vulnerabilities in Smart Contracts Using Large Language Models.
Peter Ince
Xiapu Luo
Jiangshan Yu
Joseph K. Liu
Xiaoning Du
2024
conf/crypto
Loquat: A SNARK-Friendly Post-quantum Signature Based on the Legendre PRF with Applications in Ring and Aggregate Signatures.
Xinyu Zhang
Ron Steinfeld
Muhammed F. Esgin
Joseph K. Liu
Dongxi Liu
Sushmita Ruj
2023
conf/sp
BlindHub: Bitcoin-Compatible Privacy-Preserving Payment Channel Hubs Supporting Variable Amounts.
Xianrui Qin
Shimin Pan
Arash Mirzaei
Zhimei Sui
Oguzhan Ersoy
Amin Sakzad
Muhammed F. Esgin
Joseph K. Liu
Jiangshan Yu
Tsz Hon Yuen
2022
conf/acns
Post-quantum ID-Based Ring Signatures from Symmetric-Key Primitives.
Maxime Buser
Joseph K. Liu
Ron Steinfeld
Amin Sakzad
2022
conf/esorics
Post-Quantum Verifiable Random Function from Symmetric Primitives in PoS Blockchain.
Maxime Buser
Rafael Dowsley
Muhammed F. Esgin
Shabnam Kasra Kermanshahi
Veronika Kuchta
Joseph K. Liu
Raphaël C.-W. Phan
Zhenfei Zhang
2022
conf/asiaccs
AuxChannel: Enabling Efficient Bi-Directional Channel for Scriptless Blockchains.
Zhimei Sui
Joseph K. Liu
Jiangshan Yu
Man Ho Au
Jia Liu
2021
conf/acisp
Transparency or Anonymity Leak: Monero Mining Pools Data Publication.
Dimaz Ankaa Wijaya
Joseph K. Liu
Ron Steinfeld
Dongxi Liu
2021
conf/crypto
DualRing: Generic Construction of Ring Signatures with Efficient Instantiations.
Tsz Hon Yuen
Muhammed F. Esgin
Joseph K. Liu
Man Ho Au
Zhimin Ding
2021
conf/acns
Towards Efficient and Strong Backward Private Searchable Encryption with Secure Enclaves.
Viet Vo
Shangqi Lai
Xingliang Yuan
Surya Nepal
Joseph K. Liu
2021
conf/esorics
Geo-DRS: Geometric Dynamic Range Search on Spatial Data with Backward and Content Privacy.
Shabnam Kasra Kermanshahi
Rafael Dowsley
Ron Steinfeld
Amin Sakzad
Joseph K. Liu
Surya Nepal
Xun Yi
2021
conf/asiaccs
Fact and Fiction: Challenging the Honest Majority Assumption of Permissionless Blockchains.
Runchao Han
Zhimei Sui
Jiangshan Yu
Joseph K. Liu
Shiping Chen
2021
conf/ndss
OblivSketch: Oblivious Network Measurement as a Cloud Service.
Shangqi Lai
Xingliang Yuan
Joseph K. Liu
Xun Yi
Qi Li
Dongxi Liu
Surya Nepal
2021
conf/ndss
Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy.
Shifeng Sun
Ron Steinfeld
Shangqi Lai
Xingliang Yuan
Amin Sakzad
Joseph K. Liu
Surya Nepal
Dawu Gu
2020
journals/tifs
Practical Escrow Protocol for Bitcoin.
Xiao Yang
Wang Fat Lau
Qingqing Ye
Man Ho Au
Joseph K. Liu
Jacob Cheng
2020
conf/fc
RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security.
Tsz Hon Yuen
Shifeng Sun
Joseph K. Liu
Man Ho Au
Muhammed F. Esgin
Qingzhao Zhang
Dawu Gu
2020
conf/acns
Accelerating Forward and Backward Private Searchable Encryption Using Trusted Execution.
Viet Vo
Shangqi Lai
Xingliang Yuan
Shifeng Sun
Surya Nepal
Joseph K. Liu
2020
conf/pkc
Public-Key Puncturable Encryption: Modular and Compact Constructions.
Shifeng Sun
Amin Sakzad
Ron Steinfeld
Joseph K. Liu
Dawu Gu
2020
conf/sacrypt
Efficient Lattice-Based Polynomial Evaluation and Batch ZK Arguments.
Veronika Kuchta
Amin Sakzad
Ron Steinfeld
Joseph K. Liu
2019
journals/compsec
Proof-of-QoS: QoS based blockchain consensus protocol.
Bin Yu
Joseph K. Liu
Surya Nepal
Jiangshan Yu
Paul Rimba
2019
conf/ccs
GraphSE²: An Encrypted Graph Database for Privacy-Preserving Social Search.
Shangqi Lai
Xingliang Yuan
Shifeng Sun
Joseph K. Liu
Yuhong Liu
Dongxi Liu
2019
conf/ccs
MatRiCT: Efficient, Scalable and Post-Quantum Blockchain Confidential Transactions Protocol.
Muhammed F. Esgin
Raymond K. Zhao
Ron Steinfeld
Joseph K. Liu
Dongxi Liu
2019
conf/ccs
On The Unforkability of Monero.
Dimaz Ankaa Wijaya
Joseph K. Liu
Ron Steinfeld
Dongxi Liu
Jiangshan Yu
2019
conf/acisp
Lattice RingCT V2.0 with Multiple Input and Multiple Output Wallets.
Wilson Abel Alberto Torres
Veronika Kuchta
Ron Steinfeld
Amin Sakzad
Joseph K. Liu
Jacob Cheng
2019
conf/acisp
A Flexible Instant Payment System Based on Blockchain.
Lin Zhong
Huili Wang
Jan Xie
Bo Qin
Joseph K. Liu
Qianhong Wu
2019
conf/acisp
Fast-to-Finalize Nakamoto-Like Consensus.
Shuyang Tang
Sherman S. M. Chow
Zhiqiang Liu
Joseph K. Liu
2019
conf/acisp
Risk of Asynchronous Protocol Update: Attacks to Monero Protocols.
Dimaz Ankaa Wijaya
Joseph K. Liu
Ron Steinfeld
Dongxi Liu
2019
conf/crypto
Lattice-Based Zero-Knowledge Proofs: New Techniques for Shorter and Faster Constructions and Applications.
Muhammed F. Esgin
Ron Steinfeld
Joseph K. Liu
Dongxi Liu
2019
conf/acns
Strong Leakage and Tamper-Resilient PKE from Refined Hash Proof System.
Shifeng Sun
Dawu Gu
Man Ho Au
Shuai Han
Yu Yu
Joseph K. Liu
2019
conf/acns
Short Lattice-Based One-out-of-Many Proofs and Applications to Ring Signatures.
Muhammed F. Esgin
Ron Steinfeld
Amin Sakzad
Joseph K. Liu
Dongxi Liu
2019
conf/esorics
DGM: A Dynamic and Revocable Group Merkle Signature.
Maxime Buser
Joseph K. Liu
Ron Steinfeld
Amin Sakzad
Shifeng Sun
2019
conf/esorics
Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy.
Cong Zuo
Shifeng Sun
Joseph K. Liu
Jun Shao
Josef Pieprzyk
2019
conf/esorics
Generic Multi-keyword Ranked Search on Encrypted Cloud Data.
Shabnam Kasra Kermanshahi
Joseph K. Liu
Ron Steinfeld
Surya Nepal
2019
conf/cans
Senarai: A Sustainable Public Blockchain-Based Permanent Storage Protocol.
Dimaz Ankaa Wijaya
Joseph K. Liu
Ron Steinfeld
Dongxi Liu
Limerlina
2019
conf/cans
Designing Smart Contract for Electronic Document Taxation.
Dimaz Ankaa Wijaya
Joseph K. Liu
Ron Steinfeld
Dongxi Liu
Fengkie Junis
Dony Ariadi Suwarsono
2018
journals/tifs
Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage.
Cong Zuo
Jun Shao
Joseph K. Liu
Guiyi Wei
Yun Ling
2018
conf/ccs
Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption.
Shifeng Sun
Xingliang Yuan
Joseph K. Liu
Ron Steinfeld
Amin Sakzad
Viet Vo
Surya Nepal
2018
conf/ccs
Result Pattern Hiding Searchable Encryption for Conjunctive Queries.
Shangqi Lai
Sikhar Patranabis
Amin Sakzad
Joseph K. Liu
Debdeep Mukhopadhyay
Ron Steinfeld
Shifeng Sun
Dongxi Liu
Cong Zuo
2018
conf/acisp
Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT v1.0).
Wilson Abel Alberto Torres
Ron Steinfeld
Amin Sakzad
Joseph K. Liu
Veronika Kuchta
Nandita Bhattacharjee
Man Ho Au
Jacob Cheng
2018
conf/acisp
Revocable Identity-Based Encryption from the Computational Diffie-Hellman Problem.
Ziyuan Hu
Shengli Liu
Kefei Chen
Joseph K. Liu
2018
conf/acns
Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List.
Joseph K. Liu
Tsz Hon Yuen
Peng Zhang
Kaitai Liang
2018
conf/esorics
Towards Efficient Verifiable Conjunctive Keyword Search for Large Encrypted Database.
Jianfeng Wang
Xiaofeng Chen
Shifeng Sun
Joseph K. Liu
Man Ho Au
Zhi-Hui Zhan
2018
conf/esorics
Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) Security.
Cong Zuo
Shifeng Sun
Joseph K. Liu
Jun Shao
Josef Pieprzyk
2017
journals/compsec
Editorial: Special issue on security data science and cyber threat management.
Xinyi Huang
Joseph K. Liu
Javier López
2017
conf/acisp
Attribute-Based Encryption with Expressive and Authorized Keyword Search.
Hui Cui
Robert H. Deng
Joseph K. Liu
Yingjiu Li
2017
conf/acisp
Towards Revocable Fine-Grained Encryption of Cloud Data: Reducing Trust upon Cloud.
Yanjiang Yang
Joseph K. Liu
Zhuo Wei
Xinyi Huang
2017
conf/acisp
Multi-user Cloud-Based Secure Keyword Search.
Shabnam Kasra Kermanshahi
Joseph K. Liu
Ron Steinfeld
2017
conf/provsec
Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption.
Yunling Wang
Jianfeng Wang
Shifeng Sun
Joseph K. Liu
Willy Susilo
Xiaofeng Chen
2017
conf/provsec
A New Blockchain-Based Value-Added Tax System.
Dimaz Ankaa Wijaya
Joseph K. Liu
Dony Ariadi Suwarsono
Peng Zhang
2017
conf/esorics
RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero.
Shifeng Sun
Man Ho Au
Joseph K. Liu
Tsz Hon Yuen
2017
conf/icics
A Multi-client Dynamic Searchable Symmetric Encryption System with Physical Deletion.
Lei Xu
Chungen Xu
Joseph K. Liu
Cong Zuo
Peng Zhang
2016
journals/tifs
Attribute-Based Data Sharing Scheme Revisited in Cloud Computing.
Shulan Wang
Kaitai Liang
Joseph K. Liu
Jianyong Chen
Jianping Yu
Weixin Xie
2016
journals/tifs
An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing.
Shulan Wang
Junwei Zhou
Joseph K. Liu
Jianping Yu
Jianyong Chen
Weixin Xie
2016
journals/tifs
Privacy-Preserving and Regular Language Search Over Encrypted Cloud Data.
Kaitai Liang
Xinyi Huang
Fuchun Guo
Joseph K. Liu
2016
journals/tifs
Privacy-Preserving Public Auditing Protocol for Low-Performance End Devices in Cloud.
Jiangtao Li
Lei Zhang
Joseph K. Liu
Haifeng Qian
Zheming Dong
2016
journals/tifs
Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services.
Joseph K. Liu
Man Ho Au
Xinyi Huang
Rongxing Lu
Jin Li
2016
conf/ccs
Credential Wrapping: From Anonymous Password Authentication to Anonymous Biometric Authentication.
Yanjiang Yang
Haibing Lu
Joseph K. Liu
Jian Weng
Youcheng Zhang
Jianying Zhou
2016
conf/ccs
Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security.
Kai He
Jian Weng
Jia-Nan Liu
Joseph K. Liu
Wei Liu
Robert H. Deng
2016
conf/ccs
Efficient Construction of Completely Non-Malleable CCA Secure Public Key Encryption.
Shifeng Sun
Dawu Gu
Joseph K. Liu
Udaya Parampalli
Tsz Hon Yuen
2016
conf/ccs
Efficient Multi-Function Data Sharing and Searching Mechanism for Cloud-Based Encrypted Data.
Kaitai Liang
Chunhua Su
Jiageng Chen
Joseph K. Liu
2016
conf/provsec
Towards Certificate-Based Group Encryption.
Yili Ren
Xiling Luo
Qianhong Wu
Joseph K. Liu
Peng Zhang
2016
conf/esorics
An Efficient Non-interactive Multi-client Searchable Encryption with Support for Boolean Queries.
Shifeng Sun
Joseph K. Liu
Amin Sakzad
Ron Steinfeld
Tsz Hon Yuen
2015
journals/tifs
Time-Bound Anonymous Authentication for Roaming Networks.
Joseph K. Liu
Cheng-Kang Chu
Sherman S. M. Chow
Xinyi Huang
Man Ho Au
Jianying Zhou
2015
journals/tifs
Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage.
Kaitai Liang
Willy Susilo
Joseph K. Liu
2015
conf/ccs
Asymmetric Cross-cryptosystem Re-encryption Applicable to Efficient and Secure Mobile Access to Outsourced Data.
Hua Deng
Qianhong Wu
Bo Qin
Willy Susilo
Joseph K. Liu
Wenchang Shi
2015
conf/acisp
A New Public Remote Integrity Checking Scheme with User Privacy.
Yiteng Feng
Yi Mu
Guomin Yang
Joseph K. Liu
2015
conf/lightsec
On Lightweight Security Enforcement in Cyber-Physical Systems.
Yanjiang Yang
Jiqiang Lu
Kim-Kwang Raymond Choo
Joseph K. Liu
2015
conf/provsec
Lightweight Anonymous Authentication for Ad Hoc Group: A Ring Signature Approach.
Xu Yang
Wei Wu
Joseph K. Liu
Xiaofeng Chen
2015
conf/esorics
Practical Threshold Password-Authenticated Secret Sharing Protocol.
Xun Yi
Feng Hao
Liqun Chen
Joseph K. Liu
2015
conf/esorics
Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data.
Yanjiang Yang
Joseph K. Liu
Kaitai Liang
Kim-Kwang Raymond Choo
Jianying Zhou
2015
conf/icics
Secret Picture: An Efficient Tool for Mitigating Deletion Delay on OSN.
Shangqi Lai
Joseph K. Liu
Kim-Kwang Raymond Choo
Kaitai Liang
2014
journals/tifs
A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing.
Kaitai Liang
Man Ho Au
Joseph K. Liu
Willy Susilo
Duncan S. Wong
Guomin Yang
Tran Viet Xuan Phuong
Qi Xie
2014
conf/esorics
Identity-Based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks.
Tsz Hon Yuen
Ye Zhang
Siu-Ming Yiu
Joseph K. Liu
2014
conf/esorics
An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing.
Kaitai Liang
Joseph K. Liu
Duncan S. Wong
Willy Susilo
2014
conf/esorics
New Insight to Preserve Online Survey Accuracy and Privacy in Big Data Era.
Joseph K. Liu
Man Ho Au
Xinyi Huang
Willy Susilo
Jianying Zhou
Yong Yu
2014
conf/icics
Fully Secure Ciphertext-Policy Attribute Based Encryption with Security Mediator.
Yuechen Chen
Zoe Lin Jiang
Siu-Ming Yiu
Joseph K. Liu
Man Ho Au
Xuan Wang
2013
journals/tifs
Realizing Fully Secure Unrestricted ID-Based Ring Signature in the Standard Model Based on HIBE.
Man Ho Au
Joseph K. Liu
Willy Susilo
Jianying Zhou
2013
conf/ccs
Privacy-preserving smart metering with regional statistics and personal enquiry services.
Cheng-Kang Chu
Joseph K. Liu
Jun Wen Wong
Yunlei Zhao
Jianying Zhou
2013
conf/provsec
Towards Anonymous Ciphertext Indistinguishability with Identity Leakage.
Tsz Hon Yuen
Cong Zhang
Sherman S. M. Chow
Joseph K. Liu
2012
conf/ccs
Verifier-local revocation group signatures with time-bound keys.
Cheng-Kang Chu
Joseph K. Liu
Xinyi Huang
Jianying Zhou
2012
conf/provsec
Efficient Escrow-Free Identity-Based Signature.
Yunmei Zhang
Joseph K. Liu
Xinyi Huang
Man Ho Au
Willy Susilo
2012
conf/esorics
Enhancing Location Privacy for Electric Vehicles (at the Right time).
Joseph K. Liu
Man Ho Au
Willy Susilo
Jianying Zhou
2012
conf/icics
Forward Secure Attribute-Based Signatures.
Tsz Hon Yuen
Joseph K. Liu
Xinyi Huang
Man Ho Au
Willy Susilo
Jianying Zhou
2011
conf/ccs
Threshold ring signature without random oracles.
Tsz Hon Yuen
Joseph K. Liu
Man Ho Au
Willy Susilo
Jianying Zhou
2011
conf/ccs
Identity-based online/offline key encapsulation and encryption.
Sherman S. M. Chow
Joseph K. Liu
Jianying Zhou
2011
conf/acisp
Identity-Based Server-Aided Decryption.
Joseph K. Liu
Cheng-Kang Chu
Jianying Zhou
2011
conf/icics
Forward Secure Ring Signature without Random Oracles.
Joseph K. Liu
Tsz Hon Yuen
Jianying Zhou
2010
conf/ccs
Practical ID-based encryption for wireless sensor network.
Cheng-Kang Chu
Joseph K. Liu
Jianying Zhou
Feng Bao
Robert H. Deng
2010
conf/provsec
A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract).
Patrick P. Tsang
Man Ho Au
Joseph K. Liu
Willy Susilo
Duncan S. Wong
2010
conf/esorics
Short Generic Transformation to Strongly Unforgeable Signature in the Standard Model.
Joseph K. Liu
Man Ho Au
Willy Susilo
Jianying Zhou
2009
conf/acns
A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack.
Joonsang Baek
Willy Susilo
Joseph K. Liu
Jianying Zhou
2009
conf/acns
An Efficient Identity-Based Online/Offline Encryption Scheme.
Joseph K. Liu
Jianying Zhou
2009
conf/icics
Online/Offline Ring Signature Scheme.
Joseph K. Liu
Man Ho Au
Willy Susilo
Jianying Zhou
2009
conf/wisec
Certificate-based sequential aggregate signature.
Joseph K. Liu
Joonsang Baek
Jianying Zhou
2008
conf/acns
Traceable and Retrievable Identity-Based Encryption.
Man Ho Au
Qiong Huang
Joseph K. Liu
Willy Susilo
Duncan S. Wong
Guomin Yang
2008
conf/ndss
Robust Receipt-Free Election System with Ballot Secrecy and Verifiability.
Sherman S. M. Chow
Joseph K. Liu
Duncan S. Wong
2008
conf/cans
Sanitizable Signatures Revisited.
Tsz Hon Yuen
Willy Susilo
Joseph K. Liu
Yi Mu
2007
conf/icics
(Convertible) Undeniable Signatures Without Random Oracles.
Tsz Hon Yuen
Man Ho Au
Joseph K. Liu
Willy Susilo
2006
conf/ccs
Ring signatures without random oracles.
Sherman S. M. Chow
Victor K.-W. Wei
Joseph K. Liu
Tsz Hon Yuen
2006
conf/iwsec
Ring Signature with Designated Linkability.
Joseph K. Liu
Willy Susilo
Duncan S. Wong
2006
conf/iwsec
ID-Based Ring Signature Scheme Secure in the Standard Model.
Man Ho Au
Joseph K. Liu
Tsz Hon Yuen
Duncan S. Wong
2005
conf/sec
Transferable E-Cash Revisit.
Joseph K. Liu
Sandy H. Wong
Duncan S. Wong
2005
conf/icisc
Universal Custodian-Hiding Verifiable Encryption for Discrete Logarithms.
Joseph K. Liu
Patrick P. Tsang
Duncan S. Wong
Robert W. Zhu
2004
conf/acisp
Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (Extended Abstract).
Joseph K. Liu
Victor K. Wei
Duncan S. Wong
2004
conf/icisc
On the Security Models of (Threshold) Ring Signature Schemes.
Joseph K. Liu
Duncan S. Wong
2004
conf/wisa
Custodian-Hiding Verifiable Encryption.
Joseph K. Liu
Victor K. Wei
Duncan S. Wong
2003
conf/icisc
A Separable Threshold Ring Signature Scheme.
Joseph K. Liu
Victor K. Wei
Duncan S. Wong
2003
conf/icics
On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST.
Duncan S. Wong
Karyin Fung
Joseph K. Liu
Victor K. Wei
Coauthors
Amin Sakzad
(13)
Arash Mirzaei
(1)
Bin Yu
(1)
Bo Qin
(2)
Cheng-Kang Chu
(5)
Chungen Xu
(1)
Chunhua Su
(1)
Cong Zhang
(1)
Cong Zuo
(7)
Dawu Gu
(6)
Debdeep Mukhopadhyay
(1)
Dimaz Ankaa Wijaya
(6)
Dongxi Liu
(13)
Dony Ariadi Suwarsono
(2)
Duncan S. Wong
(14)
Fei Chen
(1)
Feng Bao
(1)
Feng Hao
(1)
Fengkie Junis
(1)
Fuchun Guo
(1)
Guiyi Wei
(1)
Guomin Yang
(3)
Haibing Lu
(1)
Haifeng Qian
(1)
Haohui Zhang
(1)
Hua Deng
(1)
Huaxiong Wang
(1)
Hui Cui
(3)
Huili Wang
(1)
Huu Ngoc Duc Nguyen
(1)
Jacob Cheng
(3)
Jan Xie
(1)
Javier López
(1)
Jia Liu
(1)
Jia-Nan Liu
(1)
Jiageng Chen
(1)
Jian Weng
(2)
Jianfeng Wang
(3)
Jiangshan Yu
(9)
Jiangtao Li
(1)
Jianping Yu
(2)
Jianying Zhou
(19)
Jianyong Chen
(2)
Jin Li
(1)
Jiqiang Lu
(1)
Joonsang Baek
(2)
Josef Pieprzyk
(2)
Joseph K. Liu
(118)
Jun Shao
(4)
Jun Wen Wong
(1)
Jun Zhao
(2)
Junwei Zhou
(1)
Kai He
(1)
Kaitai Liang
(9)
Karyin Fung
(1)
Kefei Chen
(1)
Kim-Kwang Raymond Choo
(3)
Lei Xu
(1)
Lei Zhang
(1)
Liehuang Zhu
(1)
Limerlina
(1)
Lin Zhong
(1)
Liqun Chen
(1)
Man Ho Au
(25)
Maxime Buser
(3)
Muhammed F. Esgin
(9)
Nandita Bhattacharjee
(1)
Oguzhan Ersoy
(1)
Patrick P. Tsang
(2)
Paul Rimba
(1)
Peng Zhang
(4)
Peter Ince
(2)
Qi Li
(1)
Qi Xie
(1)
Qianhong Wu
(3)
Qingqing Ye
(1)
Qingzhao Zhang
(1)
Qiong Huang
(1)
Qishuang Fu
(2)
Rafael Dowsley
(2)
Raphaël C.-W. Phan
(1)
Raymond K. Zhao
(1)
Robert H. Deng
(3)
Robert W. Zhu
(1)
Ron Steinfeld
(24)
Rongxing Lu
(1)
Runchao Han
(1)
Sandy H. Wong
(1)
Shabnam Kasra Kermanshahi
(4)
Shangqi Lai
(9)
Shengli Liu
(1)
Sherman S. M. Chow
(6)
Shi-Feng Sun
(2)
Shifeng Sun
(17)
Shimin Pan
(1)
Shiping Chen
(1)
Shirui Pan
(1)
Shuai Han
(1)
Shujie Cui
(2)
Shulan Wang
(2)
Shuyang Tang
(1)
Sikhar Patranabis
(1)
Siu-Ming Yiu
(2)
Surya Nepal
(8)
Sushmita Ruj
(2)
Tao Xiang
(1)
Tran Viet Xuan Phuong
(1)
Tsz Hon Yuen
(19)
Udaya Parampalli
(1)
Veronika Kuchta
(4)
Victor K. Wei
(4)
Victor K.-W. Wei
(1)
Viet Vo
(3)
Wang Fat Lau
(1)
Wei Liu
(1)
Wei Wu
(1)
Weixin Xie
(2)
Wenchang Shi
(1)
Willy Susilo
(19)
Wilson Abel Alberto Torres
(2)
Xianrui Qin
(1)
Xiao Yang
(1)
Xiaofeng Chen
(4)
Xiaoning Du
(2)
Xiapu Luo
(2)
Xiling Luo
(1)
Xingliang Yuan
(10)
Xinyi Huang
(9)
Xinyu Zhang
(3)
Xu Yang
(1)
Xuan Wang
(1)
Xun Yi
(3)
Yanjiang Yang
(4)
Yanjun Shen
(1)
Ye Zhang
(1)
Yi Mu
(2)
Yili Ren
(1)
Yingjiu Li
(1)
Yiteng Feng
(1)
Yong Yu
(1)
Youcheng Zhang
(1)
Yu Yu
(1)
Yuechen Chen
(1)
Yuhong Liu
(1)
Yun Ling
(1)
Yunlei Zhao
(1)
Yunling Wang
(2)
Yunmei Zhang
(1)
Zheming Dong
(1)
Zhenfei Zhang
(1)
Zhi-Hui Zhan
(1)
Zhimei Sui
(3)
Zhimin Ding
(1)
Zhiqiang Liu
(1)
Zhuo Wei
(1)
Ziyuan Hu
(1)
Zoe Lin Jiang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to