


Остановите войну!
for scientists:
Man Ho Au
Man Ho Allen Au
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [j81]Shabnam Kasra Kermanshahi
, Shifeng Sun
, Joseph K. Liu
, Ron Steinfeld, Surya Nepal
, Wang Fat Lau, Man Ho Allen Au
:
Geometric Range Search on Encrypted Data With Forward/Backward Security. IEEE Trans. Dependable Secur. Comput. 19(1): 698-716 (2022) - [j80]Xiao Yang
, Mengling Liu
, Man Ho Au
, Xiapu Luo
, Qingqing Ye
:
Efficient Verifiably Encrypted ECDSA-Like Signatures and Their Applications. IEEE Trans. Inf. Forensics Secur. 17: 1573-1582 (2022) - [c118]Zhimei Sui, Joseph K. Liu, Jiangshan Yu, Man Ho Au, Jia Liu:
AuxChannel: Enabling Efficient Bi-Directional Channel for Scriptless Blockchains. AsiaCCS 2022: 138-152 - [c117]Lixin Liu, Xinyu Li, Man Ho Au, Zhuoya Fan, Xiaofeng Meng:
Metadata Privacy Preservation for Blockchain-Based Healthcare Systems. DASFAA (1) 2022: 404-412 - [i42]Zhimei Sui, Joseph K. Liu, Jiangshan Yu, Man Ho Au, Jia Liu:
AuxChannel: Enabling Efficient Bi-Directional Channel for Scriptless Blockchains. IACR Cryptol. ePrint Arch. 2022: 117 (2022) - [i41]Haiyang Xue, Man Ho Au, Xiang Xie, Tsz Hon Yuen, Handong Cui:
Efficient Online-friendly Two-Party ECDSA Signature. IACR Cryptol. ePrint Arch. 2022: 318 (2022) - 2021
- [j79]Wenjuan Li
, Yu Wang
, Jin Li, Man Ho Au:
Toward a blockchain-based framework for challenge-based collaborative intrusion detection. Int. J. Inf. Sec. 20(2): 127-139 (2021) - [j78]Wenjuan Li
, Man Ho Au, Yu Wang:
A fog-based collaborative intrusion detection framework for smart grid. Int. J. Netw. Manag. 31(2) (2021) - [j77]Yannan Li
, Guomin Yang
, Willy Susilo
, Yong Yu
, Man Ho Au
, Dongxi Liu:
Traceable Monero: Anonymous Cryptocurrency with Enhanced Accountability. IEEE Trans. Dependable Secur. Comput. 18(2): 679-691 (2021) - [j76]Peng Jiang
, Fuchun Guo
, Willy Susilo
, Man Ho Au
, Xinyi Huang
, Joseph K. Liu
:
Efficient and Adaptive Procurement Protocol with Purchasing Privacy. IEEE Trans. Serv. Comput. 14(3): 683-694 (2021) - [j75]Peng Jiang
, Fuchun Guo
, Willy Susilo
, Man Ho Au
, Jianchang Lai
, Wenmin Li:
PPFilter: Provider Privacy-Aware Encrypted Filtering System. IEEE Trans. Serv. Comput. 14(5): 1519-1530 (2021) - [c116]Wang Fat Lau, Dennis Y. W. Liu, Man Ho Au:
Blockchain-Based Supply Chain System for Traceability, Regulation and Anti-Counterfeiting. Blockchain 2021: 82-89 - [c115]Haiyang Xue, Man Ho Au, Xiang Xie, Tsz Hon Yuen, Handong Cui:
Efficient Online-friendly Two-Party ECDSA Signature. CCS 2021: 558-573 - [c114]Tsz Hon Yuen
, Muhammed F. Esgin, Joseph K. Liu, Man Ho Au
, Zhimin Ding:
DualRing: Generic Construction of Ring Signatures with Efficient Instantiations. CRYPTO (1) 2021: 251-281 - [c113]Joseph K. Liu, Man Ho Au, Tsz Hon Yuen, Cong Zuo, Jiawei Wang, Amin Sakzad, Xiapu Luo, Li Li, Kim-Kwang Raymond Choo:
Privacy-Preserving Contact Tracing Protocol for Mobile Devices: A Zero-Knowledge Proof Approach. ISPEC 2021: 327-344 - [c112]Ji Qi, Xusheng Chen, Yunpeng Jiang, Jianyu Jiang, Tianxiang Shen, Shixiong Zhao, Sen Wang, Gong Zhang, Li Chen, Man Ho Au, Heming Cui:
Bidl: A High-throughput, Low-latency Permissioned Blockchain Framework for Datacenter Networks. SOSP 2021: 18-34 - [c111]Lei Xue, Hao Zhou, Xiapu Luo, Yajin Zhou, Yang Shi, Guofei Gu, Fengwei Zhang, Man Ho Au:
Happer: Unpacking Android Apps via a Hardware-Assisted Approach. IEEE Symposium on Security and Privacy 2021: 1641-1658 - [e9]Jiannong Cao, Man Ho Au, Zhiqiang Lin, Moti Yung:
ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, Virtual Event, Hong Kong, June 7-11, 2021. ACM 2021, ISBN 978-1-4503-8287-8 [contents] - [e8]Jiannong Cao, Man Ho Au, Mauro Conti, Nils Ole Tippenhauer, Alessandro Brighente:
Proceedings of the 7th ACM on Cyber-Physical System Security Workshop, CPSS@AsiaCCS 2021, Virtual Event / Hong Kong, 7 June 2021. ACM 2021, ISBN 978-1-4503-8402-5 [contents] - [i40]Tsz Hon Yuen, Muhammed F. Esgin, Joseph K. Liu, Man Ho Au, Zhimin Ding:
DualRing: Generic Construction of Ring Signatures with Efficient Instantiations. IACR Cryptol. ePrint Arch. 2021: 1213 (2021) - 2020
- [j74]Kang Li, Wang Fat Lau
, Man Ho Au, Ivan Wang Hei Ho, Yilei Wang:
Efficient Message Authentication with Revocation Transparency Using Blockchain for Vehicular Networks. Comput. Electr. Eng. 86: 106721 (2020) - [j73]Man Ho Au, Jinguang Han, Qianhong Wu, Colin Boyd:
Special Issue on Cryptographic Currency and Blockchain Technology. Future Gener. Comput. Syst. 107: 758-759 (2020) - [j72]Weizhi Meng
, Wenjuan Li
, Yu Wang, Man Ho Au
:
Detecting insider attacks in medical cyber-physical networks based on behavioral profiling. Future Gener. Comput. Syst. 108: 1258-1266 (2020) - [j71]Wenjuan Li
, Weizhi Meng, Zhiqiang Liu, Man Ho Au:
Towards Blockchain-Based Software-Defined Networking: Security Challenges and Solutions. IEICE Trans. Inf. Syst. 103-D(2): 196-203 (2020) - [j70]Wenjuan Li, Weizhi Meng, Man Ho Au:
Enhancing collaborative intrusion detection via disagreement-based semi-supervised learning in IoT environments. J. Netw. Comput. Appl. 161: 102631 (2020) - [j69]Junzuo Lai, Zhengan Huang
, Man Ho Au, Xianping Mao:
Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation. Theor. Comput. Sci. 847: 1-16 (2020) - [j68]Xiao Yang
, Wang Fat Lau, Qingqing Ye
, Man Ho Au
, Joseph K. Liu
, Jacob Cheng:
Practical Escrow Protocol for Bitcoin. IEEE Trans. Inf. Forensics Secur. 15: 3023-3034 (2020) - [c110]Rupeng Yang, Junzuo Lai, Zhengan Huang, Man Ho Au, Qiuliang Xu, Willy Susilo
:
Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-challenge Setting. ASIACRYPT (1) 2020: 191-220 - [c109]Rupeng Yang, Man Ho Au, Zuoxia Yu, Qiuliang Xu:
Collusion Resistant Watermarkable PRFs from Standard Assumptions. CRYPTO (1) 2020: 590-620 - [c108]Yu Chen, Xuecheng Ma, Cong Tang, Man Ho Au:
PGC: Decentralized Confidential Payment System with Auditability. ESORICS (1) 2020: 591-610 - [c107]Tsz Hon Yuen, Shi-Feng Sun, Joseph K. Liu, Man Ho Au, Muhammed F. Esgin, Qingzhao Zhang, Dawu Gu:
RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security. Financial Cryptography 2020: 464-483 - [c106]Yuefeng Du
, Huayi Duan
, Anxin Zhou
, Cong Wang, Man Ho Au, Qian Wang
:
Towards Privacy-assured and Lightweight On-chain Auditing of Decentralized Storage. ICDCS 2020: 201-211 - [c105]Yue Fu, Man Ho Au, Rong Du, Haibo Hu, Dagang Li:
Cloud Password Shield: A Secure Cloud-based Firewall against DDoS on Authentication Servers. ICDCS 2020: 1209-1210 - [c104]Qingqing Ye, Haibo Hu
, Man Ho Au, Xiaofeng Meng, Xiaokui Xiao
:
Towards Locally Differentially Private Generic Graph Metric Estimation. ICDE 2020: 1922-1925 - [e7]Jianying Zhou
, Mauro Conti
, Chuadhry Mujeeb Ahmed
, Man Ho Au
, Lejla Batina
, Zhou Li
, Jingqiang Lin, Eleonora Losiouk
, Bo Luo, Suryadipta Majumdar
, Weizhi Meng
, Martín Ochoa
, Stjepan Picek
, Georgios Portokalidis
, Cong Wang
, Kehuan Zhang:
Applied Cryptography and Network Security Workshops - ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings. Lecture Notes in Computer Science 12418, Springer 2020, ISBN 978-3-030-61637-3 [contents] - [i39]Yuefeng Du, Huayi Duan, Anxin Zhou, Cong Wang, Man Ho Au, Qian Wang:
Towards Privacy-assured and Lightweight On-chain Auditing of Decentralized Storage. CoRR abs/2005.05531 (2020) - [i38]Joseph K. Liu, Man Ho Au, Tsz Hon Yuen, Cong Zuo, Jiawei Wang, Amin Sakzad, Xiapu Luo, Li Li:
Privacy-Preserving COVID-19 Contact Tracing App: A Zero-Knowledge Proof Approach. IACR Cryptol. ePrint Arch. 2020: 528 (2020) - [i37]Rupeng Yang, Man Ho Au, Zuoxia Yu, Qiuliang Xu:
Collusion Resistant Watermarkable PRFs from Standard Assumptions. IACR Cryptol. ePrint Arch. 2020: 695 (2020) - [i36]Rupeng Yang, Junzuo Lai, Zhengan Huang, Man Ho Au, Qiuliang Xu, Willy Susilo:
Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-Challenge Setting. IACR Cryptol. ePrint Arch. 2020: 1080 (2020) - [i35]Haiyang Xue, Man Ho Au, Rupeng Yang, Bei Liang, Haodong Jiang:
Compact Authenticated Key Exchange in the Quantum Random Oracle Model. IACR Cryptol. ePrint Arch. 2020: 1282 (2020)
2010 – 2019
- 2019
- [j67]Rupeng Yang, Man Ho Au
, Qiuliang Xu, Zuoxia Yu:
Decentralized blacklistable anonymous credentials with reputation. Comput. Secur. 85: 353-371 (2019) - [j66]Zhengan Huang
, Junzuo Lai, Wenbin Chen, Man Ho Au, Zhen Peng, Jin Li:
Simulation-based selective opening security for receivers under chosen-ciphertext attacks. Des. Codes Cryptogr. 87(6): 1345-1371 (2019) - [j65]Lingyue Zhang, Huilin Li, Yannan Li
, Yong Yu, Man Ho Au, Baocang Wang:
An efficient linkable group signature for payer tracing in anonymous cryptocurrencies. Future Gener. Comput. Syst. 101: 29-38 (2019) - [j64]Dagang Li
, Rong Du, Yue Fu
, Man Ho Au
:
Meta-Key: A Secure Data-Sharing Protocol Under Blockchain-Based Decentralized Storage Architecture. IEEE Netw. Lett. 1(1): 30-33 (2019) - [j63]Peng Jiang, Jianchang Lai, Fuchun Guo
, Willy Susilo
, Man Ho Au, Guomin Yang
, Yi Mu, Rongmao Chen:
Identity-based revocation system: Enhanced security model and scalable bounded IBRS construction with short parameters. Inf. Sci. 472: 35-52 (2019) - [j62]Liang Xue, Yong Yu
, Yannan Li
, Man Ho Au, Xiaojiang Du, Bo Yang:
Efficient attribute-based encryption with attribute revocation for assured data deletion. Inf. Sci. 479: 640-650 (2019) - [j61]Lifeng Zhang, Yilei Wang
, Fengyin Li, Yuemei Hu, Man Ho Au
:
A game-theoretic method based on Q-learning to invalidate criminal smart contracts. Inf. Sci. 498: 144-153 (2019) - [j60]Yang Shi
, Wujing Wei
, Hongfei Fan
, Man Ho Au
, Xiapu Luo
:
A Light-Weight White-Box Encryption Scheme for Securing Distributed Embedded Devices. IEEE Trans. Computers 68(10): 1411-1427 (2019) - [j59]Yi Dou
, Henry C. B. Chan
, Man Ho Au
:
A Distributed Trust Evaluation Protocol with Privacy Protection for Intercloud. IEEE Trans. Parallel Distributed Syst. 30(6): 1208-1221 (2019) - [j58]Lei Zhang, Mingxing Luo, Jiangtao Li
, Man Ho Au
, Kim-Kwang Raymond Choo
, Tong Chen, Shengwei Tian:
Blockchain based secure data sharing system for Internet of vehicles: A position paper. Veh. Commun. 16: 85-93 (2019) - [c103]Xingye Lu
, Man Ho Au
, Zhenfei Zhang:
Raptor: A Practical Lattice-Based (Linkable) Ring Signature. ACNS 2019: 110-130 - [c102]Wenjuan Li
, Yu Wang, Jin Li, Man Ho Au:
Towards Blockchained Challenge-Based Collaborative Intrusion Detection. ACNS Workshops 2019: 122-139 - [c101]Shi-Feng Sun, Dawu Gu, Man Ho Au, Shuai Han, Yu Yu, Joseph K. Liu:
Strong Leakage and Tamper-Resilient PKE from Refined Hash Proof System. ACNS 2019: 486-506 - [c100]Dipayan Das, Man Ho Au, Zhenfei Zhang:
Ring Signatures Based on Middle-Product Learning with Errors Problems. AFRICACRYPT 2019: 139-156 - [c99]Xiu Xu, Haiyang Xue, Kunpeng Wang, Man Ho Au, Song Tian:
Strongly Secure Authenticated Key Exchange from Supersingular Isogenies. ASIACRYPT (1) 2019: 278-308 - [c98]Rupeng Yang, Man Ho Au, Junzuo Lai, Qiuliang Xu, Zuoxia Yu:
Collusion Resistant Watermarking Schemes for Cryptographic Functionalities. ASIACRYPT (1) 2019: 371-398 - [c97]Rupeng Yang, Man Ho Au, Zhenfei Zhang, Qiuliang Xu, Zuoxia Yu, William Whyte:
Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications. CRYPTO (1) 2019: 147-175 - [c96]Jiangshan Yu, Man Ho Allen Au, Paulo Jorge Esteves Veríssimo:
Re-Thinking Untraceability in the CryptoNote-Style Blockchain. CSF 2019: 94-107 - [c95]Zuoxia Yu, Man Ho Au, Jiangshan Yu, Rupeng Yang, Qiuliang Xu, Wang Fat Lau:
New Empirical Traceability Analysis of CryptoNote-Style Blockchains. Financial Cryptography 2019: 133-149 - [c94]Kang Li, Wang Fat Lau, Man Ho Au:
A Secure and Efficient Privacy-Preserving Authentication Scheme for Vehicular Networks with Batch Verification Using Cuckoo Filter. NSS 2019: 615-631 - [c93]Huayi Duan
, Yifeng Zheng
, Yuefeng Du
, Anxin Zhou
, Cong Wang, Man Ho Au:
Aggregating Crowd Wisdom via Blockchain: A Private, Correct, and Robust Realization. PerCom 2019: 1-10 - [c92]Kang Li, Man Ho Au, Ivan Wang Hei Ho, Yilei Wang:
An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks Using Online/Offline Certificateless Aggregate Signature. ProvSec 2019: 59-76 - [c91]Borui Gong, Xingye Lu, Wang Fat Lau, Man Ho Au:
Blockchain-Based Threshold Electronic Voting System. SocialSec 2019: 238-250 - [c90]Dennis Y. W. Liu
, Alven C. Y. Leung, Man Ho Au, Xiapu Luo, Pit Ho Patrio Chiu
, Siu Wo Tarloff Im, Winnie W. M. Lam:
Virtual Laboratory: Facilitating Teaching and Learning in Cybersecurity for Students with Diverse Disciplines. TALE 2019: 1-6 - [c89]Jiazhuo Lyu, Zoe Lin Jiang, Xuan Wang, Zhenhao Nong, Man Ho Au, Junbin Fang:
A Secure Decentralized Trustless E-Voting System Based on Smart Contract. TrustCom/BigDataSE 2019: 570-577 - [c88]Xingye Lu, Man Ho Au, Zhenfei Zhang:
(Linkable) Ring Signature from Hash-Then-One-Way Signature. TrustCom/BigDataSE 2019: 578-585 - [c87]Borui Gong, Man Ho Au, Haiyang Xue:
Constructing Strong Designated Verifier Signatures from Key Encapsulation Mechanisms. TrustCom/BigDataSE 2019: 586-593 - [p4]Zuoxia Yu, Man Ho Au, Rupeng Yang:
Accountable Anonymous Credentials. Advances in Cyber Security 2019: 49-68 - [i34]Yue Fu, Rong Du, Haibo Hu, Man Ho Au, Dagang Li:
Matrix Bloom Filter: An Efficient Probabilistic Data Structure for 2-tuple Batch Lookup. CoRR abs/1912.07153 (2019) - [i33]Jiangshan Yu, Man Ho Allen Au, Paulo Jorge Esteves Veríssimo:
Re-thinking untraceability in the CryptoNote-style blockchain. IACR Cryptol. ePrint Arch. 2019: 186 (2019) - [i32]Tsz Hon Yuen, Shifeng Sun, Joseph K. Liu, Man Ho Au, Muhammed F. Esgin, Qingzhao Zhang, Dawu Gu:
RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security. IACR Cryptol. ePrint Arch. 2019: 508 (2019) - [i31]Xingye Lu, Man Ho Au, Zhenfei Zhang:
(Linkable) Ring Signature from Hash-Then-One-Way Signature. IACR Cryptol. ePrint Arch. 2019: 567 (2019) - [i30]Rupeng Yang, Man Ho Au, Zhenfei Zhang, Qiuliang Xu, Zuoxia Yu, William Whyte:
Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications. IACR Cryptol. ePrint Arch. 2019: 747 (2019) - 2018
- [j57]Yi Dou, Henry C. B. Chan
, Man Ho Au:
Order-Hiding Range Query over Encrypted Data without Search Pattern Leakage. Comput. J. 61(12): 1806-1824 (2018) - [j56]Peng Zhang, Joseph K. Liu, F. Richard Yu, Mehdi Sookhak
, Man Ho Au, Xiapu Luo
:
A Survey on Access Control in Fog Computing. IEEE Commun. Mag. 56(2): 144-149 (2018) - [j55]Jongkil Kim
, Willy Susilo
, Fuchun Guo, Man Ho Au
:
Functional encryption for computational hiding in prime order groups via pair encodings. Des. Codes Cryptogr. 86(1): 97-120 (2018) - [j54]Zuoxia Yu, Man Ho Au
, Qiuliang Xu, Rupeng Yang, Jinguang Han
:
Towards leakage-resilient fine-grained access control in fog computing. Future Gener. Comput. Syst. 78: 763-777 (2018) - [j53]Rupeng Yang, Qiuliang Xu, Man Ho Au
, Zuoxia Yu, Hao Wang, Lu Zhou:
Position based cryptography with location privacy: A step for Fog Computing. Future Gener. Comput. Syst. 78: 799-806 (2018) - [j52]Man Ho Au
, Kaitai Liang
, Joseph K. Liu, Rongxing Lu, Jianting Ning:
Privacy-preserving personal data operation on mobile cloud - Chances and challenges over advanced persistent threat. Future Gener. Comput. Syst. 79: 337-349 (2018) - [j51]Shuang Zhao, Xiapu Luo, Xiaobo Ma
, Bo Bai, Yankang Zhao, Wei Zou, Zeming Yang, Man Ho Au, Xinliang Qiu:
Exploiting Proximity-Based Mobile Apps for Large-Scale Location Privacy Probing. Secur. Commun. Networks 2018: 3182402:1-3182402:22 (2018) - [j50]Hao Wang
, Debiao He, Jian Shen, Zhihua Zheng, Xiaoyan Yang, Man Ho Au
:
Fuzzy matching and direct revocation: a new CP-ABE scheme from multilinear maps. Soft Comput. 22(7): 2267-2274 (2018) - [c86]Zuoxia Yu, Man Ho Au, Rupeng Yang, Junzuo Lai, Qiuliang Xu:
Lattice-Based Universal Accumulator with Nonmembership Arguments. ACISP 2018: 502-519 - [c85]Wilson Abel Alberto Torres, Ron Steinfeld, Amin Sakzad
, Joseph K. Liu, Veronika Kuchta, Nandita Bhattacharjee, Man Ho Au, Jacob Cheng:
Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT v1.0). ACISP 2018: 558-576 - [c84]Rupeng Yang, Man Ho Au, Qiuliang Xu, Zuoxia Yu:
Decentralized Blacklistable Anonymous Credentials with Reputation. ACISP 2018: 720-738 - [c83]Junzuo Lai, Zhengan Huang, Man Ho Au, Xianping Mao:
Constant-Size CCA-Secure Multi-hop Unidirectional Proxy Re-encryption from Indistinguishability Obfuscation. ACISP 2018: 805-812 - [c82]Xingye Lu
, Zhenfei Zhang, Man Ho Au:
Practical Signatures from the Partial Fourier Recovery Problem Revisited: A Provably-Secure and Gaussian-Distributed Construction. ACISP 2018: 813-820 - [c81]Zuoxia Yu, Man Ho Au, Rupeng Yang, Junzuo Lai, Qiuliang Xu:
Achieving Flexibility for ABE with Outsourcing via Proxy Re-Encryption. AsiaCCS 2018: 659-672 - [c80]Jianfeng Wang, Xiaofeng Chen, Shifeng Sun, Joseph K. Liu, Man Ho Au, Zhi-Hui Zhan:
Towards Efficient Verifiable Conjunctive Keyword Search for Large Encrypted Database. ESORICS (2) 2018: 83-100 - [c79]Huang Zhang
, Fangguo Zhang, Haibo Tian, Man Ho Au:
Anonymous Post-Quantum Cryptocash. Financial Cryptography 2018: 461-479 - [c78]Bin Yu, Joseph K. Liu, Amin Sakzad
, Surya Nepal, Ron Steinfeld, Paul Rimba, Man Ho Au:
Platform-Independent Secure Blockchain-Based Voting System. ISC 2018: 369-386 - [c77]Zhengan Huang, Junzuo Lai, Wenbin Chen, Man Ho Au, Zhen Peng, Jin Li:
Hedged Nonce-Based Public-Key Encryption: Adaptive Security Under Randomness Failures. Public Key Cryptography (1) 2018: 253-279 - [c76]Rupeng Yang, Man Ho Au, Junzuo Lai, Qiuliang Xu, Zuoxia Yu:
Unforgeable Watermarking Schemes with Public Extraction. SCN 2018: 63-80 - [c75]Cheng Xu
, Jianliang Xu
, Haibo Hu, Man Ho Au:
When Query Authentication Meets Fine-Grained Access Control: A Zero-Knowledge Approach. SIGMOD Conference 2018: 147-162 - [e6]Man Ho Au, Siu-Ming Yiu, Jin Li, Xiapu Luo, Cong Wang, Aniello Castiglione, Kamil Kluczniak:
Network and System Security - 12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings. Lecture Notes in Computer Science 11058, Springer 2018, ISBN 978-3-030-02743-8 [contents] - [i29]Zhengan Huang, Junzuo Lai, Wenbin Chen, Man Ho Au, Zhen Peng, Jin Li:
Hedged Nonce-Based Public-Key Encryption: Adaptive Security under Randomness Failures. IACR Cryptol. ePrint Arch. 2018: 25 (2018) - [i28]Kamil Kluczniak, Man Ho Au:
Fine-Tuning Decentralized Anonymous Payment Systems based on Arguments for Arithmetic Circuit Satisfiability. IACR Cryptol. ePrint Arch. 2018: 176 (2018) - [i27]Wilson Abel Alberto Torres, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Veronika Kuchta
, Nandita Bhattacharjee, Man Ho Au, Jacob Cheng:
Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT v1.0). IACR Cryptol. ePrint Arch. 2018: 379 (2018) - [i26]Bin Yu, Joseph K. Liu, Amin Sakzad, Surya Nepal, Paul Rimba, Ron Steinfeld, Man Ho Au:
Platform-independent Secure Blockchain-Based Voting System. IACR Cryptol. ePrint Arch. 2018: 657 (2018) - [i25]Zhengan Huang, Junzuo Lai, Wenbin Chen, Man Ho Au, Zhen Peng, Jin Li:
Simulation-Based Selective Opening Security for Receivers under Chosen-Ciphertext Attacks. IACR Cryptol. ePrint Arch. 2018: 755 (2018) - [i24]Xingye Lu, Man Ho Au, Zhenfei Zhang:
Raptor: A Practical Lattice-Based (Linkable) Ring Signature. IACR Cryptol. ePrint Arch. 2018: 857 (2018) - 2017
- [j49]Man Ho Au, Joseph K. Liu, Zhenfei Zhang, Willy Susilo
, Jin Li:
Anonymous Announcement System (AAS) for Electric Vehicle in VANETs. Comput. J. 60(4): 588-599 (2017) - [j48]Yong Yu, Atsuko Miyaji, Man Ho Au
, Willy Susilo
:
Cloud computing security and privacy: Standards and regulations. Comput. Stand. Interfaces 54: 1-2 (2017) - [j47]Man Ho Au
, Tsz Hon Yuen
, Joseph K. Liu, Willy Susilo
, Xinyi Huang, Yang Xiang, Zoe Lin Jiang:
A general framework for secure sharing of personal health records in cloud system. J. Comput. Syst. Sci. 90: 46-62 (2017) - [j46]Wei Chen, Xiapu Luo
, Chengyu Yin, Bin Xiao
, Man Ho Au
, Yajuan Tang:
CloudBot: Advanced mobile botnets using ubiquitous cloud technologies. Pervasive Mob. Comput. 41: 270-285 (2017) - [j45]Joseph K. Liu, Kim-Kwang Raymond Choo
, Xinyi Huang, Man Ho Au
:
Special issue on security and privacy for smart cities. Pers. Ubiquitous Comput. 21(5): 775 (2017) - [j44]Joseph K. Liu, Kim-Kwang Raymond Choo
, Xinyi Huang, Man Ho Au
:
Erratum to: Special issue on security and privacy for smart cities. Pers. Ubiquitous Comput. 21(5): 777 (2017) - [j43]Xu Jing, Hanwen Hu
, Huijun Yang, Man Ho Au
, Shuqin Li, Naixue Xiong, Muhammad Imran, Athanasios V. Vasilakos
:
A Quantitative Risk Assessment Model Involving Frequency and Threat Degree under Line-of-Business Services for Infrastructure of Emerging Sensor Networks. Sensors 17(3): 642 (2017) - [j42]Wei Wu, Shun Hu, Xu Yang, Joseph K. Liu, Man Ho Au
:
Towards secure and cost-effective fuzzy access control in mobile cloud computing. Soft Comput. 21(10): 2643-2649 (2017) - [j41]Yong Yu, Man Ho Au
, Giuseppe Ateniese, Xinyi Huang, Willy Susilo
, Yuanshun Dai, Geyong Min
:
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage. IEEE Trans. Inf. Forensics Secur. 12(4): 767-778 (2017) - [c74]Weizhi Meng
, Lee Wang Hao, Man Ho Au
, Zhe Liu:
Exploring Effect of Location Number on Map-Based Graphical Password Authentication. ACISP (2) 2017: 301-313 - [c73]Jongkil Kim
, Willy Susilo
, Fuchun Guo, Man Ho Au
, Surya Nepal
:
An Efficient KP-ABE with Short Ciphertexts in Prime OrderGroups under Standard Assumption. AsiaCCS 2017: 823-834 - [c72]