What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Sze Yiu Chau
Google Scholar
ORCID:
0000-0001-9300-0808
15
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/ndss
A Multifaceted Study on the Use of TLS and Auto-detect in Email Ecosystems.
Ka Fun Tang
Che Wei Tu
Sui Ling Angela Mak
Sze Yiu Chau
2025
conf/ctrsa
DSKE: Digital Signatures with Key Extraction.
Zhipeng Wang
Orestis Alpos
Alireza Kavousi
Harry W. H. Wong
Sze Yiu Chau
Duc Viet Le
Christian Cachin
2024
conf/sp
ARMOR: A Formally Verified Implementation of X.509 Certificate Chain Validation.
Joyanta Debnath
Christa Jenkins
Yuteng Sun
Sze Yiu Chau
Omar Chowdhury
2024
conf/ndss
Towards Precise Reporting of Cryptographic Misuses.
Yikang Chen
Yibo Liu
Ka Lok Wu
Duc Viet Le
Sze Yiu Chau
2023
conf/uss
Back to School: On the (In)Security of Academic VPNs.
Ka Lok Wu
Man Hong Hue
Ngai Man Poon
Kin Man Leung
Wai Yin Po
Kin Ting Wong
Sze Ho Hui
Sze Yiu Chau
2023
conf/wisec
The Devil is in the Details: Hidden Problems of Client-Side Enterprise Wi-Fi Configurators.
Ka Lok Wu
Man Hong Hue
Ka Fun Tang
Sze Yiu Chau
2021
conf/ccs
On Re-engineering the X.509 PKI with Executable Specification for Better Implementation Guarantees.
Joyanta Debnath
Sze Yiu Chau
Omar Chowdhury
2021
conf/ccs
All your Credentials are Belong to Us: On Insecure WPA2-Enterprise Configurations.
Man Hong Hue
Joyanta Debnath
Kin Man Leung
Li Li
Mohsen Minaei
M. Hammad Mazhar
Kailiang Xian
Md. Endadul Hoque
Omar Chowdhury
Sze Yiu Chau
2021
conf/ccs
Morpheus: Bringing The (PKCS) One To Meet the Oracle.
Moosa Yahyazadeh
Sze Yiu Chau
Li Li
Man Hong Hue
Joyanta Debnath
Sheung Chiu Ip
Chun Ngai Li
Md. Endadul Hoque
Omar Chowdhury
2020
conf/acns
When TLS Meets Proxy on Mobile.
Joyanta Debnath
Sze Yiu Chau
Omar Chowdhury
2019
conf/ndss
Analyzing Semantic Correctness with Symbolic Execution: A Case Study on PKCS#1 v1.5 Signature Verification.
Sze Yiu Chau
Moosa Yahyazadeh
Omar Chowdhury
Aniket Kate
Ninghui Li
2019
conf/acsac
Koinonia: verifiable e-voting with long-term privacy.
Huangyi Ge
Sze Yiu Chau
Victor E. Gonsalves
Huian Li
Tianhao Wang
Xukai Zou
Ninghui Li
2018
conf/acsac
Why Johnny Can't Make Money With His Contents: Pitfalls of Designing and Implementing Content Delivery Apps.
Sze Yiu Chau
Bincheng Wang
Jianxiong Wang
Omar Chowdhury
Aniket Kate
Ninghui Li
2017
conf/sp
SymCerts: Practical Symbolic Execution for Exposing Noncompliance in X.509 Certificate Validation Implementations.
Sze Yiu Chau
Omar Chowdhury
Md. Endadul Hoque
Huangyi Ge
Aniket Kate
Cristina Nita-Rotaru
Ninghui Li
2017
conf/dsn
Analyzing Operational Behavior of Stateful Protocol Implementations for Detecting Semantic Bugs.
Md. Endadul Hoque
Omar Chowdhury
Sze Yiu Chau
Cristina Nita-Rotaru
Ninghui Li
Coauthors
Alireza Kavousi
(1)
Aniket Kate
(3)
Bincheng Wang
(1)
Che Wei Tu
(1)
Christa Jenkins
(1)
Christian Cachin
(1)
Chun Ngai Li
(1)
Cristina Nita-Rotaru
(2)
Duc Viet Le
(2)
Harry W. H. Wong
(1)
Huangyi Ge
(2)
Huian Li
(1)
Jianxiong Wang
(1)
Joyanta Debnath
(5)
Ka Fun Tang
(2)
Ka Lok Wu
(3)
Kailiang Xian
(1)
Kin Man Leung
(2)
Kin Ting Wong
(1)
Li Li
(2)
M. Hammad Mazhar
(1)
Man Hong Hue
(4)
Md. Endadul Hoque
(4)
Mohsen Minaei
(1)
Moosa Yahyazadeh
(2)
Ngai Man Poon
(1)
Ninghui Li
(5)
Omar Chowdhury
(9)
Orestis Alpos
(1)
Sheung Chiu Ip
(1)
Sui Ling Angela Mak
(1)
Sze Ho Hui
(1)
Sze Yiu Chau
(15)
Tianhao Wang
(1)
Victor E. Gonsalves
(1)
Wai Yin Po
(1)
Xukai Zou
(1)
Yibo Liu
(1)
Yikang Chen
(1)
Yuteng Sun
(1)
Zhipeng Wang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to