
Man Ho Au
Man Ho Allen Au
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2020
- [j73]Kang Li, Wang Fat Lau
, Man Ho Au, Ivan Wang Hei Ho, Yilei Wang:
Efficient Message Authentication with Revocation Transparency Using Blockchain for Vehicular Networks. Comput. Electr. Eng. 86: 106721 (2020) - [j72]Man Ho Au, Jinguang Han, Qianhong Wu, Colin Boyd:
Special Issue on Cryptographic Currency and Blockchain Technology. Future Gener. Comput. Syst. 107: 758-759 (2020) - [j71]Weizhi Meng
, Wenjuan Li
, Yu Wang, Man Ho Au
:
Detecting insider attacks in medical cyber-physical networks based on behavioral profiling. Future Gener. Comput. Syst. 108: 1258-1266 (2020) - [j70]Wenjuan Li, Weizhi Meng, Zhiqiang Liu, Man Ho Au:
Towards Blockchain-Based Software-Defined Networking: Security Challenges and Solutions. IEICE Trans. Inf. Syst. 103-D(2): 196-203 (2020) - [j69]Wenjuan Li, Weizhi Meng, Man Ho Au:
Enhancing collaborative intrusion detection via disagreement-based semi-supervised learning in IoT environments. J. Netw. Comput. Appl. 161: 102631 (2020) - [j68]Junzuo Lai, Zhengan Huang
, Man Ho Au, Xianping Mao:
Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation. Theor. Comput. Sci. 847: 1-16 (2020) - [j67]Xiao Yang
, Wang Fat Lau, Qingqing Ye
, Man Ho Au
, Joseph K. Liu
, Jacob Cheng:
Practical Escrow Protocol for Bitcoin. IEEE Trans. Inf. Forensics Secur. 15: 3023-3034 (2020) - [c108]Rupeng Yang, Junzuo Lai, Zhengan Huang, Man Ho Au, Qiuliang Xu, Willy Susilo:
Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-challenge Setting. ASIACRYPT (1) 2020: 191-220 - [c107]Rupeng Yang, Man Ho Au, Zuoxia Yu, Qiuliang Xu:
Collusion Resistant Watermarkable PRFs from Standard Assumptions. CRYPTO (1) 2020: 590-620 - [c106]Yu Chen, Xuecheng Ma, Cong Tang, Man Ho Au:
PGC: Decentralized Confidential Payment System with Auditability. ESORICS (1) 2020: 591-610 - [c105]Tsz Hon Yuen, Shifeng Sun, Joseph K. Liu, Man Ho Au, Muhammed F. Esgin, Qingzhao Zhang, Dawu Gu:
RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security. Financial Cryptography 2020: 464-483 - [c104]Qingqing Ye, Haibo Hu
, Man Ho Au, Xiaofeng Meng, Xiaokui Xiao:
Towards Locally Differentially Private Generic Graph Metric Estimation. ICDE 2020: 1922-1925 - [e7]Jianying Zhou
, Mauro Conti
, Chuadhry Mujeeb Ahmed
, Man Ho Au
, Lejla Batina
, Zhou Li
, Jingqiang Lin, Eleonora Losiouk
, Bo Luo, Suryadipta Majumdar
, Weizhi Meng
, Martín Ochoa
, Stjepan Picek
, Georgios Portokalidis
, Cong Wang
, Kehuan Zhang:
Applied Cryptography and Network Security Workshops - ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings. Lecture Notes in Computer Science 12418, Springer 2020, ISBN 978-3-030-61637-3 [contents] - [i39]Yuefeng Du, Huayi Duan, Anxin Zhou, Cong Wang, Man Ho Au, Qian Wang:
Towards Privacy-assured and Lightweight On-chain Auditing of Decentralized Storage. CoRR abs/2005.05531 (2020) - [i38]Joseph K. Liu, Man Ho Au, Tsz Hon Yuen, Cong Zuo, Jiawei Wang, Amin Sakzad, Xiapu Luo, Li Li:
Privacy-Preserving COVID-19 Contact Tracing App: A Zero-Knowledge Proof Approach. IACR Cryptol. ePrint Arch. 2020: 528 (2020) - [i37]Rupeng Yang, Man Ho Au, Zuoxia Yu, Qiuliang Xu:
Collusion Resistant Watermarkable PRFs from Standard Assumptions. IACR Cryptol. ePrint Arch. 2020: 695 (2020) - [i36]Rupeng Yang, Junzuo Lai, Zhengan Huang, Man Ho Au, Qiuliang Xu, Willy Susilo:
Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-Challenge Setting. IACR Cryptol. ePrint Arch. 2020: 1080 (2020) - [i35]Haiyang Xue, Man Ho Au, Rupeng Yang, Bei Liang, Haodong Jiang:
Compact Authenticated Key Exchange in the Quantum Random Oracle Model. IACR Cryptol. ePrint Arch. 2020: 1282 (2020)
2010 – 2019
- 2019
- [j66]Rupeng Yang, Man Ho Au
, Qiuliang Xu, Zuoxia Yu:
Decentralized blacklistable anonymous credentials with reputation. Comput. Secur. 85: 353-371 (2019) - [j65]Zhengan Huang
, Junzuo Lai, Wenbin Chen, Man Ho Au, Zhen Peng, Jin Li:
Simulation-based selective opening security for receivers under chosen-ciphertext attacks. Des. Codes Cryptogr. 87(6): 1345-1371 (2019) - [j64]Lingyue Zhang, Huilin Li, Yannan Li, Yong Yu, Man Ho Au, Baocang Wang:
An efficient linkable group signature for payer tracing in anonymous cryptocurrencies. Future Gener. Comput. Syst. 101: 29-38 (2019) - [j63]Peng Jiang, Jianchang Lai, Fuchun Guo
, Willy Susilo, Man Ho Au, Guomin Yang
, Yi Mu, Rongmao Chen:
Identity-based revocation system: Enhanced security model and scalable bounded IBRS construction with short parameters. Inf. Sci. 472: 35-52 (2019) - [j62]Liang Xue, Yong Yu
, Yannan Li, Man Ho Au, Xiaojiang Du, Bo Yang:
Efficient attribute-based encryption with attribute revocation for assured data deletion. Inf. Sci. 479: 640-650 (2019) - [j61]Lifeng Zhang, Yilei Wang
, Fengyin Li, Yuemei Hu, Man Ho Au
:
A game-theoretic method based on Q-learning to invalidate criminal smart contracts. Inf. Sci. 498: 144-153 (2019) - [j60]Yang Shi
, Wujing Wei
, Hongfei Fan
, Man Ho Au
, Xiapu Luo
:
A Light-Weight White-Box Encryption Scheme for Securing Distributed Embedded Devices. IEEE Trans. Computers 68(10): 1411-1427 (2019) - [j59]Yi Dou
, Henry C. B. Chan
, Man Ho Au
:
A Distributed Trust Evaluation Protocol with Privacy Protection for Intercloud. IEEE Trans. Parallel Distributed Syst. 30(6): 1208-1221 (2019) - [j58]Lei Zhang, Mingxing Luo, Jiangtao Li
, Man Ho Au
, Kim-Kwang Raymond Choo
, Tong Chen, Shengwei Tian:
Blockchain based secure data sharing system for Internet of vehicles: A position paper. Veh. Commun. 16: 85-93 (2019) - [c103]Xingye Lu
, Man Ho Au
, Zhenfei Zhang:
Raptor: A Practical Lattice-Based (Linkable) Ring Signature. ACNS 2019: 110-130 - [c102]Wenjuan Li
, Yu Wang, Jin Li, Man Ho Au:
Towards Blockchained Challenge-Based Collaborative Intrusion Detection. ACNS Workshops 2019: 122-139 - [c101]Shifeng Sun, Dawu Gu, Man Ho Au, Shuai Han, Yu Yu, Joseph K. Liu:
Strong Leakage and Tamper-Resilient PKE from Refined Hash Proof System. ACNS 2019: 486-506 - [c100]Dipayan Das, Man Ho Au, Zhenfei Zhang:
Ring Signatures Based on Middle-Product Learning with Errors Problems. AFRICACRYPT 2019: 139-156 - [c99]Xiu Xu, Haiyang Xue, Kunpeng Wang, Man Ho Au, Song Tian:
Strongly Secure Authenticated Key Exchange from Supersingular Isogenies. ASIACRYPT (1) 2019: 278-308 - [c98]Rupeng Yang, Man Ho Au, Junzuo Lai, Qiuliang Xu, Zuoxia Yu:
Collusion Resistant Watermarking Schemes for Cryptographic Functionalities. ASIACRYPT (1) 2019: 371-398 - [c97]Rupeng Yang, Man Ho Au, Zhenfei Zhang, Qiuliang Xu, Zuoxia Yu, William Whyte:
Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications. CRYPTO (1) 2019: 147-175 - [c96]Jiangshan Yu, Man Ho Allen Au, Paulo Jorge Esteves Veríssimo:
Re-Thinking Untraceability in the CryptoNote-Style Blockchain. CSF 2019: 94-107 - [c95]Zuoxia Yu, Man Ho Au, Jiangshan Yu, Rupeng Yang, Qiuliang Xu, Wang Fat Lau:
New Empirical Traceability Analysis of CryptoNote-Style Blockchains. Financial Cryptography 2019: 133-149 - [c94]Kang Li, Wang Fat Lau, Man Ho Au:
A Secure and Efficient Privacy-Preserving Authentication Scheme for Vehicular Networks with Batch Verification Using Cuckoo Filter. NSS 2019: 615-631 - [c93]Huayi Duan
, Yifeng Zheng
, Yuefeng Du
, Anxin Zhou, Cong Wang, Man Ho Au:
Aggregating Crowd Wisdom via Blockchain: A Private, Correct, and Robust Realization. PerCom 2019: 1-10 - [c92]Kang Li, Man Ho Au, Ivan Wang Hei Ho, Yilei Wang:
An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks Using Online/Offline Certificateless Aggregate Signature. ProvSec 2019: 59-76 - [c91]Borui Gong, Xingye Lu, Wang Fat Lau, Man Ho Au:
Blockchain-Based Threshold Electronic Voting System. SocialSec 2019: 238-250 - [c90]Dennis Y. W. Liu, Alven C. Y. Leung, Man Ho Au, Xiapu Luo, Pit Ho Patrio Chiu, Siu Wo Tarloff Im, Winnie W. M. Lam:
Virtual Laboratory: Facilitating Teaching and Learning in Cybersecurity for Students with Diverse Disciplines. TALE 2019: 1-6 - [c89]Jiazhuo Lyu, Zoe Lin Jiang, Xuan Wang, Zhenhao Nong, Man Ho Au, Junbin Fang:
A Secure Decentralized Trustless E-Voting System Based on Smart Contract. TrustCom/BigDataSE 2019: 570-577 - [c88]Xingye Lu, Man Ho Au, Zhenfei Zhang:
(Linkable) Ring Signature from Hash-Then-One-Way Signature. TrustCom/BigDataSE 2019: 578-585 - [c87]Borui Gong, Man Ho Au, Haiyang Xue:
Constructing Strong Designated Verifier Signatures from Key Encapsulation Mechanisms. TrustCom/BigDataSE 2019: 586-593 - [p4]Zuoxia Yu, Man Ho Au, Rupeng Yang:
Accountable Anonymous Credentials. Advances in Cyber Security 2019: 49-68 - [i34]Yue Fu, Rong Du, Haibo Hu, Man Ho Au, Dagang Li:
Matrix Bloom Filter: An Efficient Probabilistic Data Structure for 2-tuple Batch Lookup. CoRR abs/1912.07153 (2019) - [i33]Jiangshan Yu, Man Ho Allen Au, Paulo Jorge Esteves Veríssimo:
Re-thinking untraceability in the CryptoNote-style blockchain. IACR Cryptol. ePrint Arch. 2019: 186 (2019) - [i32]Tsz Hon Yuen, Shifeng Sun, Joseph K. Liu, Man Ho Au, Muhammed F. Esgin, Qingzhao Zhang, Dawu Gu:
RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security. IACR Cryptol. ePrint Arch. 2019: 508 (2019) - [i31]Xingye Lu, Man Ho Au, Zhenfei Zhang:
(Linkable) Ring Signature from Hash-Then-One-Way Signature. IACR Cryptol. ePrint Arch. 2019: 567 (2019) - [i30]Rupeng Yang, Man Ho Au, Zhenfei Zhang, Qiuliang Xu, Zuoxia Yu, William Whyte:
Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications. IACR Cryptol. ePrint Arch. 2019: 747 (2019) - 2018
- [j57]Yi Dou, Henry C. B. Chan
, Man Ho Au:
Order-Hiding Range Query over Encrypted Data without Search Pattern Leakage. Comput. J. 61(12): 1806-1824 (2018) - [j56]Peng Zhang, Joseph K. Liu, F. Richard Yu, Mehdi Sookhak, Man Ho Au, Xiapu Luo
:
A Survey on Access Control in Fog Computing. IEEE Commun. Mag. 56(2): 144-149 (2018) - [j55]Jongkil Kim
, Willy Susilo, Fuchun Guo, Man Ho Au
:
Functional encryption for computational hiding in prime order groups via pair encodings. Des. Codes Cryptogr. 86(1): 97-120 (2018) - [j54]Zuoxia Yu, Man Ho Au
, Qiuliang Xu, Rupeng Yang, Jinguang Han
:
Towards leakage-resilient fine-grained access control in fog computing. Future Gener. Comput. Syst. 78: 763-777 (2018) - [j53]Rupeng Yang, Qiuliang Xu, Man Ho Au
, Zuoxia Yu, Hao Wang, Lu Zhou:
Position based cryptography with location privacy: A step for Fog Computing. Future Gener. Comput. Syst. 78: 799-806 (2018) - [j52]Man Ho Au
, Kaitai Liang
, Joseph K. Liu, Rongxing Lu, Jianting Ning:
Privacy-preserving personal data operation on mobile cloud - Chances and challenges over advanced persistent threat. Future Gener. Comput. Syst. 79: 337-349 (2018) - [j51]Shuang Zhao, Xiapu Luo, Xiaobo Ma
, Bo Bai, Yankang Zhao, Wei Zou, Zeming Yang, Man Ho Au, Xinliang Qiu:
Exploiting Proximity-Based Mobile Apps for Large-Scale Location Privacy Probing. Secur. Commun. Networks 2018: 3182402:1-3182402:22 (2018) - [j50]Hao Wang
, Debiao He, Jian Shen, Zhihua Zheng, Xiaoyan Yang, Man Ho Au
:
Fuzzy matching and direct revocation: a new CP-ABE scheme from multilinear maps. Soft Comput. 22(7): 2267-2274 (2018) - [c86]Zuoxia Yu, Man Ho Au, Rupeng Yang, Junzuo Lai, Qiuliang Xu:
Lattice-Based Universal Accumulator with Nonmembership Arguments. ACISP 2018: 502-519 - [c85]Wilson Abel Alberto Torres, Ron Steinfeld, Amin Sakzad
, Joseph K. Liu, Veronika Kuchta, Nandita Bhattacharjee, Man Ho Au, Jacob Cheng:
Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT v1.0). ACISP 2018: 558-576 - [c84]Rupeng Yang, Man Ho Au, Qiuliang Xu, Zuoxia Yu:
Decentralized Blacklistable Anonymous Credentials with Reputation. ACISP 2018: 720-738 - [c83]Junzuo Lai, Zhengan Huang, Man Ho Au, Xianping Mao:
Constant-Size CCA-Secure Multi-hop Unidirectional Proxy Re-encryption from Indistinguishability Obfuscation. ACISP 2018: 805-812 - [c82]Xingye Lu
, Zhenfei Zhang, Man Ho Au:
Practical Signatures from the Partial Fourier Recovery Problem Revisited: A Provably-Secure and Gaussian-Distributed Construction. ACISP 2018: 813-820 - [c81]Zuoxia Yu, Man Ho Au, Rupeng Yang, Junzuo Lai, Qiuliang Xu:
Achieving Flexibility for ABE with Outsourcing via Proxy Re-Encryption. AsiaCCS 2018: 659-672 - [c80]Jianfeng Wang, Xiaofeng Chen, Shifeng Sun, Joseph K. Liu, Man Ho Au, Zhi-Hui Zhan:
Towards Efficient Verifiable Conjunctive Keyword Search for Large Encrypted Database. ESORICS (2) 2018: 83-100 - [c79]Huang Zhang, Fangguo Zhang, Haibo Tian, Man Ho Au:
Anonymous Post-Quantum Cryptocash. Financial Cryptography 2018: 461-479 - [c78]Bin Yu, Joseph K. Liu, Amin Sakzad
, Surya Nepal, Ron Steinfeld, Paul Rimba, Man Ho Au:
Platform-Independent Secure Blockchain-Based Voting System. ISC 2018: 369-386 - [c77]Zhengan Huang, Junzuo Lai, Wenbin Chen, Man Ho Au, Zhen Peng, Jin Li:
Hedged Nonce-Based Public-Key Encryption: Adaptive Security Under Randomness Failures. Public Key Cryptography (1) 2018: 253-279 - [c76]Rupeng Yang, Man Ho Au, Junzuo Lai, Qiuliang Xu, Zuoxia Yu:
Unforgeable Watermarking Schemes with Public Extraction. SCN 2018: 63-80 - [c75]Cheng Xu
, Jianliang Xu
, Haibo Hu, Man Ho Au:
When Query Authentication Meets Fine-Grained Access Control: A Zero-Knowledge Approach. SIGMOD Conference 2018: 147-162 - [e6]Man Ho Au, Siu-Ming Yiu, Jin Li, Xiapu Luo, Cong Wang, Aniello Castiglione, Kamil Kluczniak:
Network and System Security - 12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings. Lecture Notes in Computer Science 11058, Springer 2018, ISBN 978-3-030-02743-8 [contents] - [i29]Zhengan Huang, Junzuo Lai, Wenbin Chen, Man Ho Au, Zhen Peng, Jin Li:
Hedged Nonce-Based Public-Key Encryption: Adaptive Security under Randomness Failures. IACR Cryptol. ePrint Arch. 2018: 25 (2018) - [i28]Kamil Kluczniak, Man Ho Au:
Fine-Tuning Decentralized Anonymous Payment Systems based on Arguments for Arithmetic Circuit Satisfiability. IACR Cryptol. ePrint Arch. 2018: 176 (2018) - [i27]Wilson Abel Alberto Torres, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Veronika Kuchta, Nandita Bhattacharjee, Man Ho Au, Jacob Cheng:
Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT v1.0). IACR Cryptol. ePrint Arch. 2018: 379 (2018) - [i26]Bin Yu, Joseph K. Liu, Amin Sakzad, Surya Nepal, Paul Rimba, Ron Steinfeld, Man Ho Au:
Platform-independent Secure Blockchain-Based Voting System. IACR Cryptol. ePrint Arch. 2018: 657 (2018) - [i25]Zhengan Huang, Junzuo Lai, Wenbin Chen, Man Ho Au, Zhen Peng, Jin Li:
Simulation-Based Selective Opening Security for Receivers under Chosen-Ciphertext Attacks. IACR Cryptol. ePrint Arch. 2018: 755 (2018) - [i24]Xingye Lu, Man Ho Au, Zhenfei Zhang:
Raptor: A Practical Lattice-Based (Linkable) Ring Signature. IACR Cryptol. ePrint Arch. 2018: 857 (2018) - 2017
- [j49]Man Ho Au, Joseph K. Liu, Zhenfei Zhang, Willy Susilo, Jin Li:
Anonymous Announcement System (AAS) for Electric Vehicle in VANETs. Comput. J. 60(4): 588-599 (2017) - [j48]Yong Yu, Atsuko Miyaji, Man Ho Au
, Willy Susilo:
Cloud computing security and privacy: Standards and regulations. Comput. Stand. Interfaces 54: 1-2 (2017) - [j47]Man Ho Au
, Tsz Hon Yuen
, Joseph K. Liu, Willy Susilo, Xinyi Huang, Yang Xiang, Zoe Lin Jiang:
A general framework for secure sharing of personal health records in cloud system. J. Comput. Syst. Sci. 90: 46-62 (2017) - [j46]Wei Chen, Xiapu Luo
, Chengyu Yin, Bin Xiao
, Man Ho Au
, Yajuan Tang:
CloudBot: Advanced mobile botnets using ubiquitous cloud technologies. Pervasive Mob. Comput. 41: 270-285 (2017) - [j45]Joseph K. Liu, Kim-Kwang Raymond Choo
, Xinyi Huang, Man Ho Au
:
Special issue on security and privacy for smart cities. Pers. Ubiquitous Comput. 21(5): 775 (2017) - [j44]Joseph K. Liu, Kim-Kwang Raymond Choo
, Xinyi Huang, Man Ho Au
:
Erratum to: Special issue on security and privacy for smart cities. Pers. Ubiquitous Comput. 21(5): 777 (2017) - [j43]Xu Jing, Hanwen Hu
, Huijun Yang, Man Ho Au
, Shuqin Li, Naixue Xiong, Muhammad Imran, Athanasios V. Vasilakos:
A Quantitative Risk Assessment Model Involving Frequency and Threat Degree under Line-of-Business Services for Infrastructure of Emerging Sensor Networks. Sensors 17(3): 642 (2017) - [j42]Wei Wu, Shun Hu, Xu Yang, Joseph K. Liu, Man Ho Au
:
Towards secure and cost-effective fuzzy access control in mobile cloud computing. Soft Comput. 21(10): 2643-2649 (2017) - [j41]Yong Yu, Man Ho Au
, Giuseppe Ateniese, Xinyi Huang, Willy Susilo
, Yuanshun Dai, Geyong Min
:
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage. IEEE Trans. Inf. Forensics Secur. 12(4): 767-778 (2017) - [c74]Weizhi Meng
, Lee Wang Hao, Man Ho Au
, Zhe Liu:
Exploring Effect of Location Number on Map-Based Graphical Password Authentication. ACISP (2) 2017: 301-313 - [c73]Jongkil Kim
, Willy Susilo, Fuchun Guo, Man Ho Au
, Surya Nepal
:
An Efficient KP-ABE with Short Ciphertexts in Prime OrderGroups under Standard Assumption. AsiaCCS 2017: 823-834 - [c72]Weizhi Meng
, Wenjuan Li
, Yu Wang, Man Ho Au:
Detecting Malicious Nodes in Medical Smartphone Networks Through Euclidean Distance-Based Behavioral Profiling. CSS 2017: 163-175 - [c71]Shifeng Sun, Man Ho Au
, Joseph K. Liu, Tsz Hon Yuen
:
RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero. ESORICS (2) 2017: 456-474 - [c70]Weizhi Meng, Fei Fei, Wenjuan Li
, Man Ho Au:
Evaluating Challenge-Based Trust Mechanism in Medical Smartphone Networks: An Empirical Study. GLOBECOM 2017: 1-6 - [c69]Kang Li, Rupeng Yang, Man Ho Au, Qiuliang Xu:
Practical Range Proof for Cryptocurrency Monero with Provable Security. ICICS 2017: 255-262 - [c68]Weizhi Meng
, Man Ho Au
:
Towards Statistical Trust Computation for Medical Smartphone Networks Based on Behavioral Profiling. IFIPTM 2017: 152-159 - [c67]Ting Chen, Xiaoqi Li
, Ying Wang, Jiachi Chen, Zihao Li, Xiapu Luo
, Man Ho Au, Xiaosong Zhang:
An Adaptive Gas Cost Mechanism for Ethereum to Defend Against Under-Priced DoS Attacks. ISPEC 2017: 3-24 - [c66]Weizhi Meng
, Fei Fei, Wenjuan Li
, Man Ho Au:
Harvesting Smartphone Privacy Through Enhanced Juice Filming Charging Attacks. ISC 2017: 291-308 - [c65]Hui Cui, Man Ho Au
, Baodong Qin, Robert H. Deng, Xun Yi
:
Fuzzy Public-Key Encryption Based on Biometric Data. ProvSec 2017: 400-409 - [c64]Gongxian Zeng, Siu-Ming Yiu, Jun Zhang, Hiroki Kuzuno, Man Ho Au:
A Nonoutsourceable Puzzle Under GHOST Rule. PST 2017: 35-43 - [c63]Shengtuo Hu, Xiaobo Ma, Muhui Jiang, Xiapu Luo
, Man Ho Au:
AutoFlowLeaker: Circumventing Web Censorship through Automation Services. SRDS 2017: 214-223 - [p3]Man Ho Au
, Kim-Kwang Raymond Choo:
Mobile Security and Privacy. Mobile Security and Privacy 2017: 1-4 - [p2]Xingye Lu, Man Ho Au
:
An Introduction to Various Privacy Models. Mobile Security and Privacy 2017: 235-245 - [p1]Dennis Y. W. Liu, Guozhi Xue, Yi Xie, Xiapu Luo, Man Ho Au
:
Performance of Digital Signature Schemes on Mobile Devices. Mobile Security and Privacy 2017: 247-256 - [e5]Man Ho Allen Au, Kim-Kwang Raymond Choo:
Mobile Security and Privacy - Advances, Challenges and Future Research Directions. Elsevier 2017, ISBN 978-0-12-804629-6 [contents] - [e4]Man Ho Allen Au, Arcangelo Castiglione, Kim-Kwang Raymond Choo, Francesco Palmieri, Kuan-Ching Li:
Green, Pervasive, and Cloud Computing - 12th International Conference, GPC 2017, Cetara, Italy, May 11-14, 2017, Proceedings. Lecture Notes in Computer Science 10232, 2017, ISBN 978-3-319-57185-0 [contents] - [e3]Tatsuaki Okamoto, Yong Yu, Man Ho Au, Yannan Li:
Provable Security - 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings. Lecture Notes in Computer Science 10592, Springer 2017, ISBN 978-3-319-68636-3 [contents] - [i23]Ting Chen, Xiaoqi Li, Ying Wang, Jiachi Chen, Zihao Li, Xiapu Luo, Man Ho Au, Xiaosong Zhang:
An Adaptive Gas Cost Mechanism for Ethereum to Defend Against Under-Priced DoS Attacks. CoRR abs/1712.06438 (2017) - [i22]Rupeng Yang, Man Ho Au, Qiuliang Xu, Zuoxia Yu:
Decentralized Blacklistable Anonymous Credentials with Reputation. IACR Cryptol. ePrint Arch. 2017: 389 (2017) - [i21]Huang Zhang, Fangguo Zhang, Haibo Tian, Man Ho Au:
Anonymous Post-Quantum Cryptocash. IACR Cryptol. ePrint Arch. 2017: 716 (2017) - [i20]Rupeng Yang, Man Ho Au, Junzuo Lai, Qiuliang Xu, Zuoxia Yu:
Lattice-Based Techniques for Accountable Anonymity: Composition of Abstract Stern's Protocols and Weak PRF with Efficient Protocols from LWR. IACR Cryptol. ePrint Arch. 2017: 781 (2017) - [i19]Shifeng Sun, Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Dawu Gu:
RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero. IACR Cryptol. ePrint Arch. 2017: 921 (2017) - [i18]Rupeng Yang, Man Ho Au, Junzuo Lai, Qiuliang Xu, Zuoxia Yu:
Collusion Resistant Watermarking Schemes for Cryptographic Functionalities. IACR Cryptol. ePrint Arch. 2017: 1201 (2017) - 2016
- [j40]Joonsang Baek
, Duncan S. Wong, Jin Li, Man Ho Au
:
Efficient Generic Construction of CCA-Secure Identity-Based Encryption from Randomness Extraction. Comput. J. 59(4): 508-521 (2016) - [j39]Joseph K. Liu, Willy Susilo, Tsz Hon Yuen
, Man Ho Au
, Jun-bin Fang, Zoe Lin Jiang, Jianying Zhou:
Efficient Privacy-Preserving Charging Station Reservation System for Electric Vehicles. Comput. J. 59(7): 1040-1053 (2016) - [j38]Yang Xiang, Man Ho Au
, Miroslaw Kutylowsky:
Security and privacy in big data. Concurr. Comput. Pract. Exp. 28(10): 2856-2857 (2016) - [j37]Yong Yu, Liang Xue, Man Ho Au
, Willy Susilo, Jianbing Ni, Yafang Zhang, Athanasios V. Vasilakos, Jian Shen:
Cloud data integrity checking with an identity-based auditing mechanism from RSA. Future Gener. Comput. Syst. 62: 85-91 (2016) - [j36]Hui Cui, Yi Mu, Man Ho Au
:
Relations between robustness and RKA security under public-key encryption. Theor. Comput. Sci. 628: 78-91 (2016) - [j35]Joseph K. Liu, Man Ho Au, Xinyi Huang, Rongxing Lu, Jin Li:
Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services. IEEE Trans. Inf. Forensics Secur. 11(3): 484-497 (2016) - [c62]Shuang Zhao, Xiapu Luo
, Bo Bai, Xiaobo Ma, Wei Zou, Xinliang Qiu, Man Ho Au
:
I Know Where You All Are! Exploiting Mobile Social Apps for Large-Scale Location Privacy Probing. ACISP (1) 2016: 3-19 - [c61]Wei Chen, Xiapu Luo