Æȷοì
Duncan S. Wong
Duncan S. Wong
Associate Professor of Computer Science, City University of Hong Kong
cityu.edu.hkÀÇ À̸ÞÀÏ È®ÀεÊ
Á¦¸ñ
Àοë
Àοë
¿¬µµ
Linkable spontaneous anonymous group signature for ad hoc groups
JK Liu, VK Wei, DS Wong
Information Security and Privacy: 9th Australasian Conference, ACISP 2004 ¡¦, 2004
6022004
Certificateless public-key signature: security model and efficient construction
Z Zhang, DS Wong, J Xu, D Feng
Applied Cryptography and Network Security: 4th International Conference ¡¦, 2006
3952006
Certificateless signature revisited
X Huang, Y Mu, W Susilo, DS Wong, W Wu
Australasian Conference on Information Security and Privacy, 308-322, 2007
3932007
A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security
K Liang, L Fang, W Susilo, DS Wong
2013 5th International Conference on Intelligent Networking and ¡¦, 2013
3192013
Surveying the development of biometric user authentication on mobile phones
W Meng, DS Wong, S Furnell, J Zhou
IEEE Communications Surveys & Tutorials 17 (3), 1268-1293, 2014
3142014
Probabilistic public key encryption with equality test
G Yang, CH Tan, Q Huang, DS Wong
Topics in Cryptology-CT-RSA 2010: The Cryptographers¡¯ Track at the RSA ¡¦, 2010
3012010
Malicious KGC attacks in certificateless cryptography
MH Au, Y Mu, J Chen, DS Wong, JK Liu, G Yang
Proceedings of the 2nd ACM symposium on Information, computer and ¡¦, 2007
2892007
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
Y Zhang, X Chen, J Li, DS Wong, H Li, I You
Information Sciences 379, 42-61, 2017
2852017
Key replacement attack against a generic construction of certificateless signature
BC Hu, DS Wong, Z Zhang, X Deng
Australasian Conference on Information Security and Privacy, 235-246, 2006
2732006
New algorithms for secure outsourcing of large-scale systems of linear equations
X Chen, X Huang, J Li, J Ma, W Lou, DS Wong
IEEE transactions on information forensics and security 10 (1), 69-78, 2014
2542014
White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures
Z Liu, Z Cao, DS Wong
IEEE Transactions on Information Forensics and Security 8 (1), 76-88, 2012
2542012
Two-factor mutual authentication based on smart cards and passwords
G Yang, DS Wong, H Wang, X Deng
Journal of computer and system sciences 74 (7), 1160-1172, 2008
2482008
Multi-authority ciphertext-policy attribute-based encryption with accountability
J Li, Q Huang, X Chen, SSM Chow, DS Wong, D Xie
Proceedings of the 6th ACM Symposium on Information, Computer and ¡¦, 2011
2202011
Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface
M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ...
Lecture Notes in Computer Science (including subseries Lecture Notes in ¡¦, 2006
214*2006
CP-ABE with constant-size keys for lightweight devices
F Guo, Y Mu, W Susilo, DS Wong, V Varadharajan
IEEE transactions on information forensics and security 9 (5), 763-771, 2014
2112014
An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing
K Liang, JK Liu, DS Wong, W Susilo
Computer Security-ESORICS 2014: 19th European Symposium on Research in ¡¦, 2014
1992014
L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing
J Li, Z Liu, X Chen, F Xhafa, X Tan, DS Wong
Knowledge-Based Systems 79, 18-26, 2015
1922015
Touch gestures based biometric authentication scheme for touchscreen mobile phones
Y Meng, DS Wong, R Schlegel, L Kwok
Information Security and Cryptology: 8th International Conference, Inscrypt ¡¦, 2013
1792013
A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing
K Liang, MH Au, JK Liu, W Susilo, DS Wong, G Yang, Y Yu, A Yang
Future Generation Computer Systems 52, 95-108, 2015
1752015
Universal authentication protocols for anonymous wireless communications
G Yang, Q Huang, DS Wong, X Deng
IEEE Transactions on Wireless Communications 9 (1), 168-174, 2010
1712010
ÇöÀç ½Ã½ºÅÛÀÌ ÀÛµ¿µÇÁö ¾Ê½À´Ï´Ù. ³ªÁß¿¡ ´Ù½Ã ½ÃµµÇØ ÁÖ¼¼¿ä.
ÇмúÀÚ·á 1–20