default search action
Duncan S. Wong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j115]Zhihao Li, Qi Chen, Jin Li, Jiahui Huang, Weichuan Mo, Duncan S. Wong, Hai Jiang:
A secure and efficient UAV network defense strategy: Convergence of blockchain and deep learning. Comput. Stand. Interfaces 90: 103844 (2024) - [j114]Jianhong Li, Qi Chen, Jin Li, Zihan Jiang, Guoyu Yang, Teng Huang, Hongyang Yan, Duncan S. Wong:
Reputation is not enough: Ensuring strong order-fairness in Byzantine consensus. Comput. Stand. Interfaces 90: 103855 (2024) - [j113]Jiahui Huang, Teng Huang, Huanchun Wei, Jiehua Zhang, Hongyang Yan, Duncan S. Wong, Haibo Hu:
zkChain: A privacy-preserving model based on zk-SNARKs and hash chain for efficient transfer of assets. Trans. Emerg. Telecommun. Technol. 35(4) (2024) - 2023
- [c116]Xingjiang Cheng, Fuxing Zhang, Yun Peng, Xianmin Wang, Teng Huang, Ziye Zhou, Duncan S. Wong, Changyu Dong:
A Survey of Privacy Preserving Subgraph Matching Methods. AIS&P (1) 2023: 98-113 - [c115]Ruilin Yang, Hui Yang, Jiluan Fan, Changyu Dong, Yan Pang, Duncan S. Wong, Shaowei Wang:
Personalized Differential Privacy in the Shuffle Model. AIS&P (1) 2023: 468-482 - 2022
- [j112]Jie Yang, Jun Zheng, Zheng Zhang, Q. I. Chen, Duncan S. Wong, Yuanzhang Li:
Security of federated learning for cloud-edge intelligence collaborative computing. Int. J. Intell. Syst. 37(11): 9290-9308 (2022) - [j111]Arthur Sandor Voundi Koe, Qi Chen, Juan Tang, Shan Ai, Hongyang Yan, Shiwen Zhang, Duncan S. Wong:
Outsourcing multiauthority access control revocation and computations over medical data to mobile cloud. Int. J. Intell. Syst. 37(11): 9774-9797 (2022) - [j110]Zhen Liu, Guomin Yang, Duncan S. Wong, Khoa Nguyen, Huaxiong Wang, Xiaorong Ke, Yining Liu:
Secure Deterministic Wallet and Stealth Address: Key-Insulated and Privacy-Preserving Signature Scheme With Publicly Derived Public Key. IEEE Trans. Dependable Secur. Comput. 19(5): 2934-2951 (2022) - 2021
- [j109]Zhen Liu, Qiong Huang, Duncan S. Wong:
On Enabling Attribute-Based Encryption to Be Traceable Against Traitors. Comput. J. 64(4): 575-598 (2021) - [j108]Anjia Yang, Jia Xu, Jian Weng, Jianying Zhou, Duncan S. Wong:
Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage. IEEE Trans. Cloud Comput. 9(1): 212-225 (2021) - 2020
- [j107]Raphael C.-W. Phan, Masayuki Abe, Lynn Batten, Jung Hee Cheon, Ed Dawson, Steven D. Galbraith, Jian Guo, Lucas C. K. Hui, Kwangjo Kim, Xuejia Lai, Dong Hoon Lee, Mitsuru Matsui, Tsutomu Matsumoto, Shiho Moriai, Phong Q. Nguyen, Dingyi Pei, Duong Hieu Phan, Josef Pieprzyk, Huaxiong Wang, Hank Wolfe, Duncan S. Wong, Tzong-Chen Wu, Bo-Yin Yang, Siu-Ming Yiu, Yu Yu, Jianying Zhou:
Advances in security research in the Asiacrypt region. Commun. ACM 63(4): 76-81 (2020) - [j106]Guangquan Xu, Bingjiang Guo, Chunhua Su, Xi Zheng, Kaitai Liang, Duncan S. Wong, Hao Wang:
Am I eclipsed? A smart detector of eclipse attacks for Ethereum. Comput. Secur. 88 (2020) - [j105]Yunhui Zhuang, Anjia Yang, Gerhard P. Hancke, Duncan S. Wong, Guomin Yang:
Energy-Efficient Distance-Bounding with Residual Charge Computation. IEEE Trans. Emerg. Top. Comput. 8(2): 365-376 (2020) - [p1]Zhi Lin, Weizhi Meng, Wenjuan Li, Duncan S. Wong:
Developing Cloud-Based Intelligent Touch Behavioral Authentication on Mobile Phones. Deep Biometrics 2020: 141-159
2010 – 2019
- 2019
- [c114]Zhen Liu, Khoa Nguyen, Guomin Yang, Huaxiong Wang, Duncan S. Wong:
A Lattice-Based Linkable Ring Signature Supporting Stealth Addresses. ESORICS (1) 2019: 726-746 - [c113]Zhen Liu, Guomin Yang, Duncan S. Wong, Khoa Nguyen, Huaxiong Wang:
Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key. EuroS&P 2019: 215-230 - 2018
- [j104]Anjia Yang, Yunhui Zhuang, Jian Weng, Gerhard P. Hancke, Duncan S. Wong, Guomin Yang:
Exploring relationship between indistinguishability-based and unpredictability-based RFID privacy models. Future Gener. Comput. Syst. 82: 315-326 (2018) - [j103]Jin Li, Xiaofeng Chen, Sherman S. M. Chow, Qiong Huang, Duncan S. Wong, Zheli Liu:
Multi-authority fine-grained access control with accountability and its application in cloud. J. Netw. Comput. Appl. 112: 89-96 (2018) - [j102]Weizhi Meng, Yu Wang, Duncan S. Wong, Sheng Wen, Yang Xiang:
TouchWB: Touch behavioral user authentication based on web browsing on smartphones. J. Netw. Comput. Appl. 117: 1-9 (2018) - [j101]Xing Hu, Chunming Tang, Duncan S. Wong, Xianghan Zheng:
Efficient pairing-free PRE schemes for multimedia data sharing in IoT. Multim. Tools Appl. 77(14): 18327-18354 (2018) - [j100]Weizhi Meng, Wenjuan Li, Duncan S. Wong:
Enhancing touch behavioral authentication via cost-based intelligent mechanism on smartphones. Multim. Tools Appl. 77(23): 30167-30185 (2018) - [j99]Anjia Yang, Elena Pagnin, Aikaterini Mitrokotsa, Gerhard P. Hancke, Duncan S. Wong:
Two-Hop Distance-Bounding Protocols: Keep Your Friends Close. IEEE Trans. Mob. Comput. 17(7): 1723-1736 (2018) - [i40]Zhen Liu, Guomin Yang, Duncan S. Wong, Khoa Nguyen, Huaxiong Wang:
Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key. IACR Cryptol. ePrint Arch. 2018: 956 (2018) - [i39]Zhen Liu, Duncan S. Wong:
On Enabling Attribute-Based Encryption to Be Traceable against Traitors. IACR Cryptol. ePrint Arch. 2018: 963 (2018) - 2017
- [j98]Yinghui Zhang, Xiaofeng Chen, Jin Li, Duncan S. Wong, Hui Li, Ilsun You:
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Inf. Sci. 379: 42-61 (2017) - [j97]Jin Li, Hongyang Yan, Zheli Liu, Xiaofeng Chen, Xinyi Huang, Duncan S. Wong:
Location-Sharing Systems With Enhanced Privacy in Mobile Online Social Networks. IEEE Syst. J. 11(2): 439-448 (2017) - [j96]Fuchun Guo, Yi Mu, Willy Susilo, Homer Hsing, Duncan S. Wong, Vijay Varadharajan:
Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight Devices. IEEE Trans. Dependable Secur. Comput. 14(2): 211-220 (2017) - [j95]Qi Xie, Duncan S. Wong, Guilin Wang, Xiao Tan, Kefei Chen, Liming Fang:
Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model. IEEE Trans. Inf. Forensics Secur. 12(6): 1382-1392 (2017) - [j94]Joonsang Baek, Eman Hableel, Young-Ji Byon, Duncan S. Wong, Kitae Jang, Hwasoo Yeo:
How to Protect ADS-B: Confidentiality Framework and Efficient Realization Based on Staged Identity-Based Encryption. IEEE Trans. Intell. Transp. Syst. 18(3): 690-700 (2017) - [j93]Anjia Yang, Xiao Tan, Joonsang Baek, Duncan S. Wong:
A New ADS-B Authentication Framework Based on Efficient Hierarchical Identity-Based Signature with Batch Verification. IEEE Trans. Serv. Comput. 10(2): 165-175 (2017) - [j92]Roman Schlegel, Chi-Yin Chow, Qiong Huang, Duncan S. Wong:
Privacy-Preserving Location Sharing Services for Social Networks. IEEE Trans. Serv. Comput. 10(5): 811-825 (2017) - [j91]Qi Xie, Bin Hu, Xiao Tan, Duncan S. Wong:
Chaotic Maps-Based Strong Anonymous Authentication Scheme for Roaming Services in Global Mobility Networks. Wirel. Pers. Commun. 96(4): 5881-5896 (2017) - [c112]Xiaoyi Li, Kaitai Liang, Zhen Liu, Duncan S. Wong:
Attribute based Encryption: Traitor Tracing, Revocation and Fully Security on Prime Order Groups. CLOSER 2017: 281-292 - 2016
- [j90]Joonsang Baek, Duncan S. Wong, Jin Li, Man Ho Au:
Efficient Generic Construction of CCA-Secure Identity-Based Encryption from Randomness Extraction. Comput. J. 59(4): 508-521 (2016) - [j89]Joseph K. Liu, Sze Ling Yeo, Wun-She Yap, Sherman S. M. Chow, Duncan S. Wong, Willy Susilo:
Faulty Instantiations of Threshold Ring Signature from Threshold Proof-of-Knowledge Protocol. Comput. J. 59(7): 945-954 (2016) - [j88]Zhen Liu, Duncan S. Wong:
Practical Attribute-Based Encryption: Traitor Tracing, Revocation and Large Universe. Comput. J. 59(7): 983-1004 (2016) - [j87]Hao Wang, Zhen Liu, Zhe Liu, Duncan S. Wong:
Identity-based aggregate signcryption in the standard model from multilinear maps. Frontiers Comput. Sci. 10(4): 741-754 (2016) - [j86]Yujue Wang, Qianhong Wu, Duncan S. Wong, Bo Qin, Jian Mao, Yong Ding:
Provably secure robust optimistic fair exchange of distributed signatures. Future Gener. Comput. Syst. 62: 29-39 (2016) - [j85]Qi Xie, Na Dong, Duncan S. Wong, Bin Hu:
Cryptanalysis and security enhancement of a robust two-factor authentication and key agreement protocol. Int. J. Commun. Syst. 29(3): 478-487 (2016) - [j84]Clémentine Gritti, Willy Susilo, Thomas Plantard, Kaitai Liang, Duncan S. Wong:
Broadcast encryption with dealership. Int. J. Inf. Sec. 15(3): 271-283 (2016) - [j83]Dennis Y. W. Liu, Duncan S. Wong:
One-move convertible nominative signature in the standard model. Secur. Commun. Networks 9(12): 1796-1809 (2016) - [c111]Weizhi Meng, Wenjuan Li, Duncan S. Wong, Jianying Zhou:
TMGuard: A Touch Movement-Based Security Mechanism for Screen Unlock Patterns on Smartphones. ACNS 2016: 629-647 - [c110]Zhen Liu, Duncan S. Wong, Jack Poon:
Dealerless Corporate Key Generation for Identity-Based Encryption Schemes. AsiaCCS 2016: 211-222 - [c109]Jia Xu, Anjia Yang, Jianying Zhou, Duncan S. Wong:
Lightweight Delegatable Proofs of Storage. ESORICS (1) 2016: 324-343 - [c108]Xing Hu, Chunming Tang, Duncan S. Wong:
Highly Efficient Proxy Re-encryption Schemes for User-End Encrypted Cloud Data Sharing. ISPDC 2016: 261-268 - [i38]Xiaoyi Li, Kaitai Liang, Zhen Liu, Duncan S. Wong:
Attribute Based Encryption: Traitor Tracing, Revocation and Fully Security on Prime Order Groups. IACR Cryptol. ePrint Arch. 2016: 1140 (2016) - 2015
- [j82]Yujue Wang, Qianhong Wu, Duncan S. Wong, Bo Qin, Yi Mu, Jianwei Liu:
Further ideal multipartite access structures from integer polymatroids. Sci. China Inf. Sci. 58(7): 1-13 (2015) - [j81]Kaitai Liang, Willy Susilo, Joseph K. Liu, Duncan S. Wong:
Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption. Comput. J. 58(10): 2778-2792 (2015) - [j80]Weizhi Meng, Duncan S. Wong, Steven Furnell, Jianying Zhou:
Surveying the Development of Biometric User Authentication on Mobile Phones. IEEE Commun. Surv. Tutorials 17(3): 1268-1293 (2015) - [j79]Kaitai Liang, Liming Fang, Duncan S. Wong, Willy Susilo:
A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds. Concurr. Comput. Pract. Exp. 27(8): 2004-2027 (2015) - [j78]Tao Jiang, Xiaofeng Chen, Jin Li, Duncan S. Wong, Jianfeng Ma, Joseph K. Liu:
Towards secure and reliable cloud storage against data re-outsourcing. Future Gener. Comput. Syst. 52: 86-94 (2015) - [j77]Kaitai Liang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang, Yong Yu, Anjia Yang:
A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing. Future Gener. Comput. Syst. 52: 95-108 (2015) - [j76]Roman Schlegel, Duncan S. Wong:
Private friends on a social networking site operated by an overly curious SNP. Int. J. Comput. Sci. Eng. 10(3): 281-292 (2015) - [j75]Yan Ren, Chunming Tang, Guilin Wang, Duncan S. Wong:
Attribute-based signature schemes with accountability. Int. J. Inf. Commun. Technol. 7(2/3): 141-158 (2015) - [j74]Kaitai Liang, Joseph K. Liu, Rongxing Lu, Duncan S. Wong:
Privacy Concerns for Photo Sharing in Online Social Networks. IEEE Internet Comput. 19(2): 58-63 (2015) - [j73]Qiong Huang, Duncan S. Wong, Willy Susilo:
How to protect privacy in Optimistic Fair Exchange of digital signatures. Inf. Sci. 325: 300-315 (2015) - [j72]Jin Li, Zheli Liu, Xiaofeng Chen, Fatos Xhafa, Xiao Tan, Duncan S. Wong:
L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing. Knowl. Based Syst. 79: 18-26 (2015) - [j71]Fatos Xhafa, Jingwei Li, Gansen Zhao, Jin Li, Xiaofeng Chen, Duncan S. Wong:
Designing cloud-based electronic health record system with attribute-based encryption. Multim. Tools Appl. 74(10): 3441-3458 (2015) - [j70]Yilei Wang, Duncan S. Wong, Chuan Zhao, Qiuliang Xu:
Fair two-party computation with rational parties holding private types. Secur. Commun. Networks 8(2): 284-297 (2015) - [j69]Anjia Yang, Kaitai Liang, Yunhui Zhuang, Duncan S. Wong, Xiaohua Jia:
A new unpredictability-based radio frequency identification forward privacy model and a provably secure construction. Secur. Commun. Networks 8(16): 2836-2849 (2015) - [j68]Yilei Wang, Duncan S. Wong, Willy Susilo, Xiaofeng Chen, Qiuliang Xu:
Achieving fairness by sequential equilibrium in rational two-party computation under incomplete information. Secur. Commun. Networks 8(18): 3690-3700 (2015) - [j67]Jin Li, Xiao Tan, Xiaofeng Chen, Duncan S. Wong, Fatos Xhafa:
OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices. IEEE Trans. Cloud Comput. 3(2): 195-205 (2015) - [j66]Xiaofeng Chen, Willy Susilo, Jin Li, Duncan S. Wong, Jianfeng Ma, Shaohua Tang, Qiang Tang:
Efficient algorithms for secure outsourcing of bilinear pairings. Theor. Comput. Sci. 562: 112-121 (2015) - [j65]Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo:
Ambiguous optimistic fair exchange: Definition and constructions. Theor. Comput. Sci. 562: 177-193 (2015) - [j64]Xiao Tan, Qiong Huang, Duncan S. Wong:
Concurrent signature without random oracles. Theor. Comput. Sci. 562: 194-212 (2015) - [j63]Yujue Wang, Duncan S. Wong, Qianhong Wu, Sherman S. M. Chow, Bo Qin, Jianwei Liu, Yong Ding:
Practical (fully) distributed signatures provably secure in the standard model. Theor. Comput. Sci. 595: 143-158 (2015) - [j62]Zhen Liu, Zhenfu Cao, Duncan S. Wong:
Traceable CP-ABE: How to Trace Decryption Devices Found in the Wild. IEEE Trans. Inf. Forensics Secur. 10(1): 55-68 (2015) - [j61]Xiaofeng Chen, Xinyi Huang, Jin Li, Jianfeng Ma, Wenjing Lou, Duncan S. Wong:
New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations. IEEE Trans. Inf. Forensics Secur. 10(1): 69-78 (2015) - [j60]Roman Schlegel, Chi-Yin Chow, Qiong Huang, Duncan S. Wong:
User-Defined Privacy Grid System for Continuous Location-Based Services. IEEE Trans. Mob. Comput. 14(10): 2158-2172 (2015) - [c107]Zhen Liu, Duncan S. Wong:
Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe. ACNS 2015: 127-146 - [c106]Zhen Liu, Duncan S. Wong:
Traceable CP-ABE on Prime Order Groups: Fully Secure and Fully Collusion-Resistant Blackbox Traceable. ICICS 2015: 109-124 - [c105]Eman Hableel, Joonsang Baek, Young-Ji Byon, Duncan S. Wong:
How to protect ADS-B: Confidentiality framework for future air traffic communication. INFOCOM Workshops 2015: 155-160 - [c104]Yunhui Zhuang, Gerhard P. Hancke, Duncan S. Wong:
How to Demonstrate Our Presence Without Disclosing Identity? Evidence from a Grouping-Proof Protocol. WISA 2015: 423-435 - [i37]Zhen Liu, Duncan S. Wong:
Traceable CP-ABE on Prime Order Groups: Fully Secure and Fully Collusion-resistant Blackbox Traceable. IACR Cryptol. ePrint Arch. 2015: 850 (2015) - 2014
- [j59]Xiaofeng Chen, Jin Li, Jianfeng Ma, Wenjing Lou, Duncan S. Wong:
New and efficient conditional e-payment systems with transferability. Future Gener. Comput. Syst. 37: 252-258 (2014) - [j58]Jin Li, Xiaofeng Chen, Qiong Huang, Duncan S. Wong:
Digital provenance: Enabling secure data forensics in cloud computing. Future Gener. Comput. Syst. 37: 259-266 (2014) - [j57]Fatos Xhafa, Jin Li, Duncan S. Wong, Francesco Palmieri:
Advances in Security and Privacy in Sensor Networks. Int. J. Distributed Sens. Networks 10 (2014) - [j56]Qi Xie, Dongzhao Hong, Mengjie Bao, Na Dong, Duncan S. Wong:
Privacy-Preserving Mobile Roaming Authentication with Security Proof in Global Mobility Networks. Int. J. Distributed Sens. Networks 10 (2014) - [j55]Yuan Wang, Duncan S. Wong, Liusheng Huang:
One-Pass Key Establishment Protocol for Wireless Roaming with User Anonymity. Int. J. Netw. Secur. 16(2): 129-142 (2014) - [j54]Weizhi Meng, Duncan S. Wong, Lam-for Kwok:
The effect of adaptive mechanism on behavioural biometric based mobile phone authentication. Inf. Manag. Comput. Secur. 22(2): 155-166 (2014) - [j53]Clémentine Gritti, Willy Susilo, Thomas Plantard, Kaitai Liang, Duncan S. Wong:
Empowering Personal Health Records with Cloud Computing: How to encrypt with forthcoming fine-grained policies efficiently. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 5(4): 3-28 (2014) - [j52]Qi Xie, Xiao Tan, Duncan S. Wong, Guilin Wang, Mengjie Bao, Na Dong:
A practical anonymous authentication protocol for wireless roaming. Secur. Commun. Networks 7(8): 1264-1273 (2014) - [j51]Guomin Yang, Chik How Tan, Yi Mu, Willy Susilo, Duncan S. Wong:
Identity based identification from algebraic coding theory. Theor. Comput. Sci. 520: 51-61 (2014) - [j50]Kaitai Liang, Cheng-Kang Chu, Xiao Tan, Duncan S. Wong, Chunming Tang, Jianying Zhou:
Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts. Theor. Comput. Sci. 539: 87-105 (2014) - [j49]Xiao Tan, Qiong Huang, Duncan S. Wong:
Extending concurrent signature to multiple parties. Theor. Comput. Sci. 548: 54-67 (2014) - [j48]Fuchun Guo, Yi Mu, Willy Susilo, Duncan S. Wong, Vijay Varadharajan:
CP-ABE With Constant-Size Keys for Lightweight Devices. IEEE Trans. Inf. Forensics Secur. 9(5): 763-771 (2014) - [j47]Kaitai Liang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang, Tran Viet Xuan Phuong, Qi Xie:
A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing. IEEE Trans. Inf. Forensics Secur. 9(10): 1667-1680 (2014) - [j46]Xiaofeng Chen, Jin Li, Xinyi Huang, Jingwei Li, Yang Xiang, Duncan S. Wong:
Secure Outsourced Attribute-Based Signatures. IEEE Trans. Parallel Distributed Syst. 25(12): 3285-3294 (2014) - [c103]Zhen Liu, Zhenfu Cao, Duncan S. Wong:
Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts. Inscrypt 2014: 403-423 - [c102]Yujue Wang, Duncan S. Wong, Qianhong Wu, Sherman S. M. Chow, Bo Qin, Jianwei Liu:
Practical Distributed Signatures in the Standard Model. CT-RSA 2014: 307-326 - [c101]Qiong Huang, Duncan S. Wong, Willy Susilo:
P2OFE: Privacy-Preserving Optimistic Fair Exchange of Digital Signatures. CT-RSA 2014: 367-384 - [c100]Kaitai Liang, Joseph K. Liu, Duncan S. Wong, Willy Susilo:
An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing. ESORICS (1) 2014: 257-272 - [c99]Yujue Wang, Qianhong Wu, Duncan S. Wong, Bo Qin, Sherman S. M. Chow, Zhen Liu, Xiao Tan:
Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage. ESORICS (1) 2014: 326-343 - [c98]Lie Qu, Yan Wang, Mehmet A. Orgun, Duncan S. Wong, Athman Bouguettaya:
Evaluating Cloud Users' Credibility of Providing Subjective Assessment or Objective Assessment for Cloud Services. ICSOC 2014: 453-461 - [c97]Tao Jiang, Xiaofeng Chen, Jin Li, Duncan S. Wong, Jianfeng Ma, Joseph K. Liu:
TIMER: Secure and Reliable Cloud Storage against Data Re-outsourcing. ISPEC 2014: 346-358 - [c96]Kaitai Liang, Man Ho Au, Willy Susilo, Duncan S. Wong, Guomin Yang, Yong Yu:
An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data Sharing. ISPEC 2014: 448-461 - [c95]Yuxin Meng, Duncan S. Wong, Lam-for Kwok:
Design of touch dynamics based user authentication with an adaptive mechanism on mobile phones. SAC 2014: 1680-1687 - [i36]Jia Xu, Anjia Yang, Jianying Zhou, Duncan S. Wong:
Lightweight and Privacy-Preserving Delegatable Proofs of Storage. IACR Cryptol. ePrint Arch. 2014: 395 (2014) - [i35]Zhen Liu, Duncan S. Wong:
Practical Attribute Based Encryption: Traitor Tracing, Revocation, and Large Universe. IACR Cryptol. ePrint Arch. 2014: 616 (2014) - [i34]Zhen Liu, Zhenfu Cao, Duncan S. Wong:
Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts. IACR Cryptol. ePrint Arch. 2014: 676 (2014) - 2013
- [j45]Joonsang Baek, Quang Hieu Vu, Abdulhadi Shoufan, Andrew Jones, Duncan S. Wong:
Stateful Public-Key Encryption Schemes Forward-Secure Against State Exposure. Comput. J. 56(4): 497-507 (2013) - [j44]Qiong Huang, Duncan S. Wong, Willy Susilo:
The construction of ambiguous optimistic fair exchange from designated confirmer signature without random oracles. Inf. Sci. 228: 222-238 (2013) - [j43]Qi Xie, Na Dong, Xiao Tan, Duncan S. Wong, Guilin Wang:
Improvement of a Three-Party Password-Based Key Exchange Protocol with Formal Verification. Inf. Technol. Control. 42(3): 231-237 (2013) - [j42]Qiong Huang, Duncan S. Wong:
Short and efficient convertible undeniable signature schemes without random oracles. Theor. Comput. Sci. 476: 67-83 (2013) - [j41]Zhen Liu, Zhenfu Cao, Duncan S. Wong:
White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures. IEEE Trans. Inf. Forensics Secur. 8(1): 76-88 (2013) - [c94]Willy Susilo, Man Ho Au, Yang Wang, Duncan S. Wong:
Fairness in Concurrent Signatures Revisited. ACISP 2013: 318-329 - [c93]Zhen Liu, Zhenfu Cao, Duncan S. Wong:
Blackbox traceable CP-ABE: how to catch people leaking their keys by selling decryption devices on ebay. CCS 2013: 475-486 - [c92]Yinghui Zhang, Xiaofeng Chen, Jin Li, Duncan S. Wong, Hui Li:
Anonymous attribute-based encryption supporting efficient decryption test. AsiaCCS 2013: 511-516 - [c91]Zhe Liu, Johann Großschädl, Duncan S. Wong:
Low-Weight Primes for Lightweight Elliptic Curve Cryptography on 8-bit AVR Processors. Inscrypt 2013: 217-235 - [c90]Yan Ren, Chunming Tang, Guilin Wang, Duncan S. Wong:
Accountable Authority Attribute-Based Signature. EIDWT 2013: 773-777 - [c89]Dennis Y. W. Liu, Duncan S. Wong, Qiong Huang:
Ambiguous One-Move Nominative Signature Without Random Oracles. ICISC 2013: 325-341 - [c88]Jin Li, Xiao Tan, Xiaofeng Chen, Duncan S. Wong:
An Efficient Proof of Retrievability with Public Auditing in Cloud Computing. INCoS 2013: 93-98 - [c87]Kaitai Liang, Liming Fang, Willy Susilo, Duncan S. Wong:
A Ciphertext-Policy Attribute-Based Proxy Re-encryption with Chosen-Ciphertext Security. INCoS 2013: 552-559 - [c86]Qi Xie, Mengjie Bao, Na Dong, Bin Hu, Duncan S. Wong:
Secure Mobile User Authentication and Key Agreement Protocol with Privacy Protection in Global Mobility Networks. ISBAST 2013 - [c85]Kaitai Liang, Qiong Huang, Roman Schlegel, Duncan S. Wong, Chunming Tang:
A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release. ISPEC 2013: 132-146 - [c84]Guomin Yang, Yi Mu, Willy Susilo, Duncan S. Wong:
Leakage Resilient Authenticated Key Exchange Secure in the Auxiliary Input Model. ISPEC 2013: 204-217 - [c83]Yunhui Zhuang, Anjia Yang, Duncan S. Wong, Guomin Yang, Qi Xie:
A Highly Efficient RFID Distance Bounding Protocol without Real-Time PRF Evaluation. NSS 2013: 451-464 - [c82]Anjia Yang, Yunhui Zhuang, Duncan S. Wong, Guomin Yang:
A New Unpredictability-Based RFID Privacy Model. NSS 2013: 479-492 - [i33]Kaitai Liang, Qiong Huang, Roman Schlegel, Duncan S. Wong, Chunming Tang:
A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release. IACR Cryptol. ePrint Arch. 2013: 115 (2013) - [i32]Kaitai Liang, Liming Fang, Duncan S. Wong, Willy Susilo:
A Ciphertext-Policy Attribute-Based Proxy Re-Encryption with Chosen-Ciphertext Security. IACR Cryptol. ePrint Arch. 2013: 236 (2013) - [i31]Dennis Y. W. Liu, Duncan S. Wong, Qiong Huang:
Ambiguous One-Move Nominative Signature Without Random Oracles. IACR Cryptol. ePrint Arch. 2013: 711 (2013) - 2012
- [j40]Xinyi Huang, Yi Mu, Willy Susilo, Duncan S. Wong, Wei Wu:
Certificateless Signatures: New Schemes and Security Models. Comput. J. 55(4): 457-474 (2012) - [j39]Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo:
A new efficient optimistic fair exchange protocol without random oracles. Int. J. Inf. Sec. 11(1): 53-63 (2012) - [j38]Duncan S. Wong, Xiaojian Tian:
E-mail protocols with perfect forward secrecy. Int. J. Secur. Networks 7(1): 1-5 (2012) - [j37]Jin Li, Fangguo Zhang, Xiaofeng Chen, Kwangjo Kim, Duncan S. Wong:
Generic security-amplifying methods of ordinary digital signatures. Inf. Sci. 201: 128-139 (2012) - [j36]Roman Schlegel, Duncan S. Wong:
Anonymous overlay network supporting authenticated routing. Inf. Sci. 210: 99-117 (2012) - [c81]Xiao Tan, Duncan S. Wong:
Generalized First Pre-image Tractable Random Oracle Model and Signature Schemes. ACISP 2012: 247-260 - [c80]Yuxin Meng, Duncan S. Wong, Roman Schlegel, Lam-for Kwok:
Touch Gestures Based Biometric Authentication Scheme for Touchscreen Mobile Phones. Inscrypt 2012: 331-350 - [c79]Chunming Tang, Xing Hu, Duncan S. Wong, Dingyi Pei:
An efficient key distribution scheme in cloud computing. CloudCom 2012: 557-561 - [c78]Yang-Wai Chow, Willy Susilo, Duncan S. Wong:
Enhancing the Perceived Visual Quality of a Size Invariant Visual Cryptography Scheme. ICICS 2012: 10-21 - [c77]Anjia Yang, Yunhui Zhuang, Duncan S. Wong:
An Efficient Single-Slow-Phase Mutually Authenticated RFID Distance Bounding Protocol with Tag Privacy. ICICS 2012: 285-292 - [c76]Ye Zhang, Chun Jason Xue, Duncan S. Wong, Nikos Mamoulis, Siu-Ming Yiu:
Acceleration of Composite Order Bilinear Pairing on Graphics Hardware. ICICS 2012: 341-348 - [c75]Kaitai Liang, Zhen Liu, Xiao Tan, Duncan S. Wong, Chunming Tang:
A CCA-Secure Identity-Based Conditional Proxy Re-Encryption without Random Oracles. ICISC 2012: 231-246 - [c74]Roman Schlegel, Duncan S. Wong:
Private Friends on a Social Networking Site Operated by an Overly Curious SNP. NSS 2012: 430-444 - [c73]Qiong Huang, Duncan S. Wong, Willy Susilo:
The Construction of Ambiguous Optimistic Fair Exchange from Designated Confirmer Signature without Random Oracles. Public Key Cryptography 2012: 120-137 - [c72]Dennis Y. W. Liu, Duncan S. Wong:
One-Move Convertible Nominative Signature in the Standard Model. ProvSec 2012: 2-20 - [c71]Guanfeng Liu, Yan Wang, Duncan S. Wong:
Multiple QoT Constrained Social Trust Path Selection in Complex Social Networks. TrustCom 2012: 624-631 - [i30]Xiao Tan, Qiong Huang, Duncan S. Wong:
Concurrent Signature without Random Oracles. IACR Cryptol. ePrint Arch. 2012: 576 (2012) - [i29]Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia, Duncan S. Wong, Willy Susilo:
Secure Outsourced Attribute-Based Signatures. IACR Cryptol. ePrint Arch. 2012: 605 (2012) - [i28]Zhen Liu, Zhenfu Cao, Duncan S. Wong:
Expressive Black-box Traceable Ciphertext-Policy Attribute-Based Encryption. IACR Cryptol. ePrint Arch. 2012: 669 (2012) - 2011
- [j35]Qiong Huang, Duncan S. Wong, Guomin Yang:
Heterogeneous Signcryption with Key Privacy. Comput. J. 54(4): 525-536 (2011) - [j34]Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo:
Efficient strong designated verifier signature schemes without random oracle or with non-delegatability. Int. J. Inf. Sec. 10(6): 373-385 (2011) - [j33]Qiong Huang, Duncan S. Wong, Willy Susilo:
Group-oriented fair exchange of signatures. Inf. Sci. 181(16): 3267-3283 (2011) - [j32]Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo:
Identity-based strong designated verifier signature revisited. J. Syst. Softw. 84(1): 120-129 (2011) - [j31]Qiong Huang, Duncan S. Wong, Willy Susilo:
Efficient Designated Confirmer Signature and DCS-Based Ambiguous Optimistic Fair Exchange. IEEE Trans. Inf. Forensics Secur. 6(4): 1233-1247 (2011) - [c70]Jin Li, Qiong Huang, Xiaofeng Chen, Sherman S. M. Chow, Duncan S. Wong, Dongqing Xie:
Multi-authority ciphertext-policy attribute-based encryption with accountability. AsiaCCS 2011: 386-390 - [c69]Zhen Liu, Zhenfu Cao, Qiong Huang, Duncan S. Wong, Tsz Hon Yuen:
Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles. ESORICS 2011: 278-297 - [c68]Guomin Yang, Shanshan Duan, Duncan S. Wong, Chik How Tan, Huaxiong Wang:
Authenticated Key Exchange under Bad Randomness. Financial Cryptography 2011: 113-126 - [c67]Yuan Wang, Duncan S. Wong, Liusheng Huang:
A One-Pass Key Establishment Protocol for Anonymous Wireless Roaming with PFS. ICC 2011: 1-5 - [c66]Qiong Huang, Duncan S. Wong:
Short Convertible Undeniable Signature in the Standard Model. ISPEC 2011: 257-272 - [c65]Qiong Huang, Duncan S. Wong, Willy Susilo, Bo Yang:
An Efficient Construction of Time-Selective Convertible Undeniable Signatures. ISC 2011: 355-371 - [c64]Tsz Hon Yuen, Duncan S. Wong, Willy Susilo, Qiong Huang:
Concurrent Signatures with Fully Negotiable Binding Control. ProvSec 2011: 170-187 - [e3]Bruce S. N. Cheung, Lucas Chi Kwong Hui, Ravi S. Sandhu, Duncan S. Wong:
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2011, Hong Kong, China, March 22-24, 2011. ACM 2011, ISBN 978-1-4503-0564-8 [contents] - [i27]Ye Zhang, Chun Jason Xue, Duncan S. Wong, Nikos Mamoulis, Siu-Ming Yiu:
Acceleration of Composite Order Bilinear Pairing on Graphics Hardware. IACR Cryptol. ePrint Arch. 2011: 196 (2011) - [i26]Guomin Yang, Shanshan Duan, Duncan S. Wong, Chik How Tan, Huaxiong Wang:
Authenticated Key Exchange under Bad Randomness. IACR Cryptol. ePrint Arch. 2011: 688 (2011) - 2010
- [j30]Chung Ki Li, Duncan S. Wong:
Signcryption from randomness recoverable public key encryption. Inf. Sci. 180(4): 549-559 (2010) - [j29]Chung Ki Li, Guomin Yang, Duncan S. Wong, Xiaotie Deng, Sherman S. M. Chow:
An efficient signcryption scheme with key privacy and its extension to ring signcryption. J. Comput. Secur. 18(3): 451-473 (2010) - [j28]Qiong Huang, Duncan S. Wong:
Generic Certificateless Encryption Secure Against Malicious-but-Passive KGC Attacks in the Standard Model. J. Comput. Sci. Technol. 25(4): 807-826 (2010) - [j27]Guomin Yang, Qiong Huang, Duncan S. Wong, Xiaotie Deng:
Universal authentication protocols for anonymous wireless communications. IEEE Trans. Wirel. Commun. 9(1): 168-174 (2010) - [c63]Guomin Yang, Chik How Tan, Qiong Huang, Duncan S. Wong:
Probabilistic Public Key Encryption with Equality Test. CT-RSA 2010: 119-131 - [c62]Qiong Huang, Duncan S. Wong, Willy Susilo:
A New Construction of Designated Confirmer Signature and Its Application to Optimistic Fair Exchange - (Extended Abstract). Pairing 2010: 41-61 - [c61]Ye Zhang, Man Ho Au, Duncan S. Wong, Qiong Huang, Nikos Mamoulis, David W. Cheung, Siu-Ming Yiu:
Oblivious Transfer with Access Control : Realizing Disjunction without Duplication. Pairing 2010: 96-115 - [c60]Patrick P. Tsang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong:
A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract). ProvSec 2010: 166-183 - [c59]Xiaoyu Wu, Duncan S. Wong, Qing Li:
Extended Visual Cryptography Scheme for Color Images with no Pixel Expansion. SECRYPT 2010: 423-426 - [c58]Xiaokang Xiong, Duncan S. Wong, Xiaotie Deng:
TinyPairing: A Fast and Lightweight Pairing-Based Cryptographic Library for Wireless Sensor Networks. WCNC 2010: 1-6 - [c57]Roman Schlegel, Duncan S. Wong:
An efficient routing protocol for anonymous networks. WCNIS 2010: 349-353 - [c56]Yuan Wang, Duncan S. Wong, Liusheng Huang:
One-pass key establishment for anonymous wireless roaming. WCNIS 2010: 533-537
2000 – 2009
- 2009
- [j26]Shuang Chang, Duncan S. Wong, Yi Mu, Zhenfeng Zhang:
Certificateless Threshold Ring Signature. Inf. Sci. 179(20): 3685-3696 (2009) - [j25]Bert W. Leung, Felix Y. Ng, Duncan S. Wong:
On the security of a visual cryptography scheme for color images. Pattern Recognit. 42(5): 929-940 (2009) - [j24]Yan Wang, Kwei-Jay Lin, Duncan S. Wong, Vijay Varadharajan:
Trust management towards service-oriented applications. Serv. Oriented Comput. Appl. 3(2): 129-146 (2009) - [c55]Tsz Hon Yuen, Qiong Huang, Yi Mu, Willy Susilo, Duncan S. Wong, Guomin Yang:
Efficient Non-interactive Range Proof. COCOON 2009: 138-147 - [c54]Roman Schlegel, Duncan S. Wong:
Monotonically Increasing Bit Vector for Authenticated Anonymous Routing. FGIT-FGCN 2009: 89-96 - [c53]Haimin Jin, Duncan S. Wong, Yinlong Xu:
Efficient Group Signature with Forward Secure Revocation. FGIT-SecTech 2009: 124-131 - [c52]Pairat Thorncharoensri, Qiong Huang, Willy Susilo, Man Ho Au, Yi Mu, Duncan S. Wong:
Escrowed Deniable Identification Schemes. FGIT-SecTech 2009: 234-241 - [c51]Xiaokang Xiong, Duncan S. Wong, Xiaotie Deng:
TinyPairing: Computing Tate Pairing on Sensor Nodes with Higher Speed and Less Memory. NCA 2009: 187-194 - [i25]Roman Schlegel, Duncan S. Wong:
Low Latency High Bandwidth Anonymous Overlay Network with Anonymous Routing. IACR Cryptol. ePrint Arch. 2009: 294 (2009) - [i24]Qiong Huang, Duncan S. Wong, Willy Susilo:
Group-Oriented Fair Exchange of Signatures. IACR Cryptol. ePrint Arch. 2009: 324 (2009) - [i23]Qiong Huang, Willy Susilo, Duncan S. Wong:
Non-delegatable Identity-based Designated Verifier Signature. IACR Cryptol. ePrint Arch. 2009: 367 (2009) - [i22]Qiong Huang, Duncan S. Wong:
New Constructions of Convertible Undeniable Signature Schemes without Random Oracles. IACR Cryptol. ePrint Arch. 2009: 517 (2009) - [i21]Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo:
Efficient Strong Designated Verifier Signature Schemes without Random Oracles or Delegatability. IACR Cryptol. ePrint Arch. 2009: 518 (2009) - 2008
- [j23]Qiong Huang, Duncan S. Wong:
On the relation among various security models for certificateless cryptography. Int. J. Appl. Cryptogr. 1(2): 108-119 (2008) - [j22]Qiong Huang, Dennis Y. W. Liu, Duncan S. Wong:
An efficient one-move Nominative Signature scheme. Int. J. Appl. Cryptogr. 1(2): 133-143 (2008) - [j21]Joseph K. Liu, Duncan S. Wong:
Solutions to Key Exposure Problem in Ring Signature. Int. J. Netw. Secur. 6(2): 170-180 (2008) - [j20]Yan Wang, Duncan S. Wong, Kwei-Jay Lin, Vijay Varadharajan:
Evaluating transaction trust and risk levels in peer-to-peer e-commerce environments. Inf. Syst. E Bus. Manag. 6(1): 25-48 (2008) - [j19]Guomin Yang, Duncan S. Wong, Huaxiong Wang, Xiaotie Deng:
Two-factor mutual authentication based on smart cards and passwords. J. Comput. Syst. Sci. 74(7): 1160-1172 (2008) - [j18]Qiong Huang, Duncan S. Wong, Jin Li, Yiming Zhao:
Generic Transformation from Weakly to Strongly Unforgeable Signatures. J. Comput. Sci. Technol. 23(2): 240-252 (2008) - [j17]Liqun Chen, Willy Susilo, Huaxiong Wang, Duncan S. Wong, Ed Dawson, Xuejia Lai, Masahiro Mambo, Atsuko Miyaji, Yi Mu, David Pointcheval, Bart Preneel, Nigel P. Smart:
Cryptography in Computer System Security. J. Univers. Comput. Sci. 14(3): 314-317 (2008) - [j16]Guomin Yang, Duncan S. Wong, Xiaotie Deng:
Formal Security Definition and Efficient Construction for Roaming with a Privacy-Preserving Extension. J. Univers. Comput. Sci. 14(3): 441-462 (2008) - [j15]Yan Wang, Duncan S. Wong, Huaxiong Wang:
Employ a mobile agent for making a payment. Mob. Inf. Syst. 4(1): 51-68 (2008) - [j14]Guomin Yang, Jing Chen, Duncan S. Wong, Xiaotie Deng, Dongsheng Wang:
A new framework for the design and analysis of identity-based identification schemes. Theor. Comput. Sci. 407(1-3): 370-388 (2008) - [j13]Huaxiong Wang, Duncan S. Wong:
On Secret Reconstruction in Secret Sharing Schemes. IEEE Trans. Inf. Theory 54(1): 473-480 (2008) - [c50]Man Ho Au, Qiong Huang, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang:
Traceable and Retrievable Identity-Based Encryption. ACNS 2008: 94-110 - [c49]Jin Li, Kwangjo Kim, Fangguo Zhang, Duncan S. Wong:
Generic Security-Amplifying Methods of Ordinary Digital Signatures. ACNS 2008: 224-241 - [c48]Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo:
Ambiguous Optimistic Fair Exchange. ASIACRYPT 2008: 74-89 - [c47]Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo:
Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles. CT-RSA 2008: 106-120 - [c46]Sherman S. M. Chow, Joseph K. Liu, Duncan S. Wong:
Robust Receipt-Free Election System with Ballot Secrecy and Verifiability. NDSS 2008 - [e2]Matthew K. Franklin, Lucas Chi Kwong Hui, Duncan S. Wong:
Cryptology and Network Security, 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings. Lecture Notes in Computer Science 5339, Springer 2008, ISBN 978-3-540-89640-1 [contents] - [i20]Junjie Jiang, Jing Chen, Jian Wang, Duncan S. Wong, Xiaotie Deng:
High Performance Architecture for Elliptic Curve Scalar Multiplication over GF(2m). IACR Cryptol. ePrint Arch. 2008: 66 (2008) - [i19]Haimin Jin, Duncan S. Wong, Yinlong Xu:
Complexity Analysis of a Fast Modular Multiexponentiation Algorithm. IACR Cryptol. ePrint Arch. 2008: 210 (2008) - [i18]Bert W. Leung, Felix Y. Ng, Duncan S. Wong:
On the Security of a Visual Cryptography Scheme for Color Images. IACR Cryptol. ePrint Arch. 2008: 223 (2008) - 2007
- [j12]Bessie C. Hu, Duncan S. Wong, Zhenfeng Zhang, Xiaotie Deng:
Certificateless signature: a new security model and an improved generic construction. Des. Codes Cryptogr. 42(2): 109-126 (2007) - [j11]Xiaojian Tian, Robert W. Zhu, Duncan S. Wong:
Improved Efficient Remote User Authentication Schemes. Int. J. Netw. Secur. 4(2): 149-154 (2007) - [j10]Joseph K. Liu, Duncan S. Wong:
A More Efficient Instantiation of Witness-Indistinguishable Signature. Int. J. Netw. Secur. 5(2): 199-204 (2007) - [j9]Dennis Y. W. Liu, Joseph K. Liu, Yi Mu, Willy Susilo, Duncan S. Wong:
Revocable Ring Signature. J. Comput. Sci. Technol. 22(6): 785-794 (2007) - [j8]Robert W. Zhu, Guomin Yang, Duncan S. Wong:
An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices. Theor. Comput. Sci. 378(2): 198-207 (2007) - [j7]Guomin Yang, Duncan S. Wong, Xiaotie Deng:
Anonymous and Authenticated Key Exchange for Roaming Networks. IEEE Trans. Wirel. Commun. 6(9): 3461-3472 (2007) - [c45]Qiong Huang, Duncan S. Wong:
Generic Certificateless Key Encapsulation Mechanism. ACISP 2007: 215-229 - [c44]Xinyi Huang, Yi Mu, Willy Susilo, Duncan S. Wong, Wei Wu:
Certificateless Signature Revisited. ACISP 2007: 308-322 - [c43]Qiong Huang, Duncan S. Wong, Yiming Zhao:
Generic Transformation to Strongly Unforgeable Signatures. ACNS 2007: 1-17 - [c42]Guomin Yang, Jing Chen, Duncan S. Wong, Xiaotie Deng, Dongsheng Wang:
A More Natural Way to Construct Identity-Based Identification Schemes. ACNS 2007: 307-322 - [c41]Lifeng Guo, Guilin Wang, Duncan S. Wong, Lei Hu:
Further Discussions on the Security of a Nominative Signature Scheme. Security and Management 2007: 566-572 - [c40]Chung Ki Li, Guomin Yang, Duncan S. Wong, Xiaotie Deng, Sherman S. M. Chow:
An Efficient Signcryption Scheme with Key Privacy. EuroPKI 2007: 78-93 - [c39]Bessie C. Hu, Duncan S. Wong, Qiong Huang, Guomin Yang, Xiaotie Deng:
Time Capsule Signature: Efficient and Provably Secure Constructions. EuroPKI 2007: 126-142 - [c38]Sherman S. M. Chow, Duncan S. Wong:
Anonymous Identification and Designated-Verifiers Signatures from Insecure Batch Verification. EuroPKI 2007: 203-219 - [c37]Yan Wang, Duncan S. Wong, Kwei-Jay Lin, Vijay Varadharajan:
The Design of A Rule-based and Event-driven Trust Management Framework. ICEBE 2007: 97-104 - [c36]Haimin Jin, Duncan S. Wong, Yinlong Xu:
An Efficient Password-Only Two-Server Authenticated Key Exchange System. ICICS 2007: 44-56 - [c35]Dennis Y. W. Liu, Duncan S. Wong, Xinyi Huang, Guilin Wang, Qiong Huang, Yi Mu, Willy Susilo:
Formal Definition and Construction of Nominative Signature. ICICS 2007: 57-68 - [c34]Qiong Huang, Duncan S. Wong:
Generic Certificateless Encryption in the Standard Model. IWSEC 2007: 278-291 - [c33]Dennis Y. W. Liu, Shuang Chang, Duncan S. Wong, Yi Mu:
Nominative Signature from Ring Signature. IWSEC 2007: 396-411 - [c32]Guilin Wang, Joonsang Baek, Duncan S. Wong, Feng Bao:
On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures. Public Key Cryptography 2007: 43-60 - [c31]Dennis Y. W. Liu, Shuang Chang, Duncan S. Wong:
A More Efficient Convertible Nominative Signature. SECRYPT 2007: 214-221 - [e1]Ed Dawson, Duncan S. Wong:
Information Security Practice and Experience, Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings. Lecture Notes in Computer Science 4464, Springer 2007, ISBN 978-3-540-72159-8 [contents] - [i17]Dennis Y. W. Liu, Duncan S. Wong, Xinyi Huang, Guilin Wang, Qiong Huang, Yi Mu, Willy Susilo:
Nominative Signature: Application, Security Model and Construction. IACR Cryptol. ePrint Arch. 2007: 69 (2007) - [i16]Qiong Huang, Duncan S. Wong:
Generic Certificateless Encryption in the Standard Model. IACR Cryptol. ePrint Arch. 2007: 95 (2007) - [i15]Bessie C. Hu, Duncan S. Wong, Qiong Huang, Guomin Yang, Xiaotie Deng:
Time Capsule Signature: Efficient and Provably Secure Constructions. IACR Cryptol. ePrint Arch. 2007: 146 (2007) - [i14]Dennis Y. W. Liu, Qiong Huang, Duncan S. Wong:
An Efficient One-move Nominative Signature Scheme. IACR Cryptol. ePrint Arch. 2007: 260 (2007) - [i13]Guomin Yang, Duncan S. Wong, Qiong Huang, Xiaotie Deng:
A New Security Definition for Public Key Encryption Schemes and Its Applications. IACR Cryptol. ePrint Arch. 2007: 319 (2007) - 2006
- [j6]Shoulun Long, Josef Pieprzyk, Huaxiong Wang, Duncan S. Wong:
Generalised Cumulative Arrays in Secret Sharing. Des. Codes Cryptogr. 40(2): 191-209 (2006) - [j5]Robert W. Zhu, Duncan S. Wong, Chan H. Lee:
Cryptanalysis of a suite of deniable authentication protocols. IEEE Commun. Lett. 10(6): 504-506 (2006) - [j4]Reihaneh Safavi-Naini, Huaxiong Wang, Duncan S. Wong:
Resilient Lkh: Secure Multicast Key Distribution Schemes. Int. J. Found. Comput. Sci. 17(5): 1205-1222 (2006) - [j3]Joseph K. Liu, Duncan S. Wong:
Enhanced Security Models and a Generic Construction Approach for Linkable Ring Signature. Int. J. Found. Comput. Sci. 17(6): 1403-1422 (2006) - [c30]Bessie C. Hu, Duncan S. Wong, Zhenfeng Zhang, Xiaotie Deng:
Key Replacement Attack Against a Generic Construction of Certificateless Signature. ACISP 2006: 235-246 - [c29]Zhenfeng Zhang, Duncan S. Wong, Jing Xu, Dengguo Feng:
Certificateless Public-Key Signature: Security Model and Efficient Construction. ACNS 2006: 293-308 - [c28]Xiaojian Tian, Duncan S. Wong:
Session Corruption Attack and Improvements on Encryption Based MT-Authenticators. CT-RSA 2006: 34-51 - [c27]Guomin Yang, Duncan S. Wong, Huaxiong Wang, Xiaotie Deng:
Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper). ICICS 2006: 82-91 - [c26]Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Duncan S. Wong:
ID-Based Ring Signature Scheme Secure in the Standard Model. IWSEC 2006: 1-16 - [c25]Joseph K. Liu, Willy Susilo, Duncan S. Wong:
Ring Signature with Designated Linkability. IWSEC 2006: 104-119 - [c24]Guomin Yang, Duncan S. Wong, Xiaotie Deng, Huaxiong Wang:
Anonymous Signature Schemes. Public Key Cryptography 2006: 347-363 - [i12]Lifeng Guo, Guilin Wang, Duncan S. Wong:
Further Discussions on the Security of a Nominative Signature Scheme. IACR Cryptol. ePrint Arch. 2006: 7 (2006) - [i11]Man Ho Au, Jing Chen, Joseph K. Liu, Yi Mu, Duncan S. Wong, Guomin Yang:
Malicious KGC Attacks in Certificateless Cryptography. IACR Cryptol. ePrint Arch. 2006: 255 (2006) - [i10]Guomin Yang, Duncan S. Wong, Huaxiong Wang, Xiaotie Deng:
Formal Analysis and Systematic Construction of Two-factor Authentication Scheme. IACR Cryptol. ePrint Arch. 2006: 270 (2006) - [i9]Qiong Huang, Duncan S. Wong, Yiming Zhao:
Generic Transformation to Strongly Unforgeable Signatures. IACR Cryptol. ePrint Arch. 2006: 346 (2006) - [i8]Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Duncan S. Wong:
Practical Hierarchical Identity Based Encryption and Signature schemes Without Random Oracles. IACR Cryptol. ePrint Arch. 2006: 368 (2006) - 2005
- [j2]Xiaojian Tian, Duncan S. Wong, Robert W. Zhu:
Analysis and improvement of an authenticated key exchange protocol for sensor networks. IEEE Commun. Lett. 9(11): 970-972 (2005) - [c23]Guomin Yang, Duncan S. Wong, Xiaotie Deng:
Deposit-Case Attack Against Secure Roaming. ACISP 2005: 417-428 - [c22]Guomin Yang, Duncan S. Wong, Xiaotie Deng:
Efficient Anonymous Roaming and Its Security Analysis. ACNS 2005: 334-349 - [c21]Jonathan Wong, Duncan S. Wong:
Known Session Key Attack Against a Collection of Signcryption Schemes. Security and Management 2005: 119-126 - [c20]Joseph K. Liu, Patrick P. Tsang, Duncan S. Wong:
Efficient Verifiable Ring Encryption for Ad Hoc Groups. ESAS 2005: 1-13 - [c19]Joseph K. Liu, Patrick P. Tsang, Duncan S. Wong:
Recoverable and Untraceable E-Cash. EuroPKI 2005: 206-214 - [c18]Joseph K. Liu, Duncan S. Wong:
Linkable Ring Signatures: Security Models and New Schemes. ICCSA (2) 2005: 614-623 - [c17]Joseph K. Liu, Patrick P. Tsang, Duncan S. Wong, Robert W. Zhu:
Universal Custodian-Hiding Verifiable Encryption for Discrete Logarithms. ICISC 2005: 389-409 - [c16]Duncan S. Wong, Agnes Hui Chan, Feng Zhu:
Password Authenticated Key Exchange for Resource-Constrained Wireless Communications (Extended Abstract). ICN (2) 2005: 827-834 - [c15]Joseph K. Liu, Duncan S. Wong:
A Restricted Multi-show Credential System and Its Application on E-Voting. ISPEC 2005: 268-279 - [c14]Guomin Yang, Duncan S. Wong, Xiaotie Deng:
Analysis and Improvement of a Signcryption Scheme with Key Privacy. ISC 2005: 218-232 - [c13]Duncan S. Wong:
Security Analysis of Two Anonymous Authentication Protocols for Distributed Wireless Networks. PerCom Workshops 2005: 284-288 - [c12]Joseph K. Liu, Sandy H. Wong, Duncan S. Wong:
Transferable E-Cash Revisit. SEC 2005: 171-188 - [c11]Robert W. Zhu, Guomin Yang, Duncan S. Wong:
An Efficient Identity-Based Key Exchange Protocol with KGS Forward Secrecy for Low-Power Devices. WINE 2005: 500-509 - [i7]Patrick P. Tsang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong:
A Suite of Non-Pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity. IACR Cryptol. ePrint Arch. 2005: 326 (2005) - [i6]Guomin Yang, Duncan S. Wong, Xiaotie Deng, Huaxiong Wang:
Anonymous Signature Schemes. IACR Cryptol. ePrint Arch. 2005: 407 (2005) - [i5]Joseph K. Liu, Duncan S. Wong:
Solutions to Key Exposure Problem in Ring Signature. IACR Cryptol. ePrint Arch. 2005: 427 (2005) - [i4]Robert W. Zhu, Xiaojian Tian, Duncan S. Wong:
Enhancing CK-Model for Key Compromise Impersonation Resilience and Identity-based Key Exchange. IACR Cryptol. ePrint Arch. 2005: 455 (2005) - 2004
- [c10]Joseph K. Liu, Victor K. Wei, Duncan S. Wong:
Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (Extended Abstract). ACISP 2004: 325-335 - [c9]Joseph K. Liu, Duncan S. Wong:
On the Security Models of (Threshold) Ring Signature Schemes. ICISC 2004: 204-217 - [c8]Patrick P. Tsang, Victor K. Wei, Tony K. Chan, Man Ho Au, Joseph K. Liu, Duncan S. Wong:
Separable Linkable Threshold Ring Signatures. INDOCRYPT 2004: 384-398 - [c7]Joseph K. Liu, Victor K. Wei, Duncan S. Wong:
Custodian-Hiding Verifiable Encryption. WISA 2004: 51-64 - [i3]Joseph K. Liu, Victor K. Wei, Duncan S. Wong:
Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups. IACR Cryptol. ePrint Arch. 2004: 27 (2004) - [i2]Joseph K. Liu, Victor K. Wei, Duncan S. Wong:
Custodian-Hiding Verifiable Encryption. IACR Cryptol. ePrint Arch. 2004: 28 (2004) - [i1]Patrick P. Tsang, Victor K. Wei, Tony K. Chan, Man Ho Au, Joseph K. Liu, Duncan S. Wong:
Separable Linkable Threshold Ring Signatures. IACR Cryptol. ePrint Arch. 2004: 267 (2004) - 2003
- [c6]Duncan S. Wong, Karyin Fung, Joseph K. Liu, Victor K. Wei:
On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST. ICICS 2003: 34-46 - [c5]Joseph K. Liu, Victor K. Wei, Duncan S. Wong:
A Separable Threshold Ring Signature Scheme. ICISC 2003: 12-26 - [c4]Duncan S. Wong, Agnes Hui Chan, Feng Zhu:
More Efficient Password Authenticated Key Exchange Based on RSA. INDOCRYPT 2003: 375-387 - 2002
- [j1]Duncan S. Wong:
An optimized authentication protocol for mobile network reconsidered. ACM SIGMOBILE Mob. Comput. Commun. Rev. 6(4): 74-76 (2002) - [c3]Feng Zhu, Duncan S. Wong, Agnes Hui Chan, Robbie Ye:
Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks. ISC 2002: 150-161 - 2001
- [c2]Duncan S. Wong, Hector Ho Fuentes, Agnes Hui Chan:
The Performance Measurement of Cryptographic Primitives on Palm Devices. ACSAC 2001: 92-101 - [c1]Duncan S. Wong, Agnes Hui Chan:
Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices. ASIACRYPT 2001: 272-289
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-08 20:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint