


Остановите войну!
for scientists:


default search action
Sherman S. M. Chow
Person information

- affiliation: The Chinese University of Hong Kong, Sha Tin, Hong Kong
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [c127]Huangting Wu, Sherman S. M. Chow
:
Anonymous (Hierarchical) Identity-Based Encryption from Broader Assumptions. ACNS 2023: 366-395 - [c126]Sherman S. M. Chow
, Jack P. K. Ma, Tsz Hon Yuen
:
Scored Anonymous Credentials. ACNS 2023: 484-515 - [c125]Harry W. H. Wong, Jack P. K. Ma, Hoover H. F. Yin, Sherman S. M. Chow:
Real Threshold ECDSA. NDSS 2023 - [c124]Minxin Du
, Xiang Yue
, Sherman S. M. Chow
, Huan Sun
:
Sanitizing Sentence Embeddings (and Labels) for Local Differential Privacy. WWW 2023: 2349-2359 - [i37]Cheuk Ting Li, Sherman S. M. Chow:
Unconditionally Secure Access Control Encryption. CoRR abs/2305.07593 (2023) - 2022
- [j38]Yu Chen, Baodong Qin, Jiang Zhang, Yi Deng, Sherman S. M. Chow
:
Non-Malleable Functions and their Applications. J. Cryptol. 35(2): 11 (2022) - [j37]Jiafan Wang, Sherman S. M. Chow
:
Forward and Backward-Secure Range-Searchable Symmetric Encryption. Proc. Priv. Enhancing Technol. 2022(1): 28-48 (2022) - [j36]Minghui Li
, Sherman S. M. Chow
, Shengshan Hu
, Yuejing Yan, Chao Shen, Qian Wang
:
Optimizing Privacy-Preserving Outsourced Convolutional Neural Network Predictions. IEEE Trans. Dependable Secur. Comput. 19(3): 1592-1604 (2022) - [c123]Tsz Hon Yuen
, Cong Zhang, Sherman S. M. Chow
:
Don't Tamper with Dual System Encryption - Beyond Polynomial Related-Key Security of IBE. ACNS 2022: 419-439 - [c122]Jack P. K. Ma, Sherman S. M. Chow
:
Secure-Computation-Friendly Private Set Intersection from Oblivious Compact Graph Evaluation. AsiaCCS 2022: 1086-1097 - [c121]Jiafan Wang, Sherman S. M. Chow:
Omnes pro uno: Practical Multi-Writer Encrypted Database. USENIX Security Symposium 2022: 2371-2388 - [i36]Shaoying Cai, Yingjiu Li, Changshe Ma, Sherman S. M. Chow, Robert H. Deng:
Prove You Owned Me: One Step beyond RFID Tag/Mutual Authentication. CoRR abs/2210.10244 (2022) - 2021
- [j35]Asma Aloufi
, Peizhao Hu, Hang Liu, Sherman S. M. Chow
, Kim-Kwang Raymond Choo
:
Universal location referencing and homomorphic evaluation of geospatial query. Comput. Secur. 102: 102137 (2021) - [j34]Sherman S. M. Chow
, Kim-Kwang Raymond Choo
, Jinguang Han:
Editorial for accountability and privacy issues in blockchain and cryptocurrency. Future Gener. Comput. Syst. 114: 647-648 (2021) - [j33]Yongjun Zhao
, Sherman S. M. Chow
:
Updatable Block-Level Message-Locked Encryption. IEEE Trans. Dependable Secur. Comput. 18(4): 1620-1631 (2021) - [j32]Asma Aloufi
, Peizhao Hu
, Harry W. H. Wong, Sherman S. M. Chow
:
Blindfolded Evaluation of Random Forests with Multi-Key Homomorphic Encryption. IEEE Trans. Dependable Secur. Comput. 18(4): 1821-1835 (2021) - [c120]Lucien K. L. Ng, Sherman S. M. Chow, Anna P. Y. Woo, Donald P. H. Wong, Yongjun Zhao:
Goten: GPU-Outsourcing Trusted Execution of Neural Network Training. AAAI 2021: 14876-14883 - [c119]Xiang Yue, Minxin Du, Tianhao Wang, Yaliang Li, Huan Sun, Sherman S. M. Chow
:
Differential Privacy for Text Analytics via Natural Text Sanitization. ACL/IJCNLP (Findings) 2021: 3853-3866 - [c118]Xiuhua Wang, Harry W. H. Wong, Sherman S. M. Chow
:
Access Control Encryption from Group Encryption. ACNS (1) 2021: 417-441 - [c117]Sherman S. M. Chow
, Ming Li, Yongjun Zhao
, Wenqiang Jin:
Sipster: Settling IOU Privately and Quickly with Smart Meters. ACSAC 2021: 219-234 - [c116]Jiafan Wang, Sherman S. M. Chow
:
Simple Storage-Saving Structure for Volume-Hiding Encrypted Multi-maps - (A Slot in Need is a Slot Indeed). DBSec 2021: 63-83 - [c115]Lucien K. L. Ng, Sherman S. M. Chow
, Donald P. H. Wong, Anna P. Y. Woo:
LDSP: Shopping with Cryptocurrency Privately and Quickly under Leadership. ICDCS 2021: 261-271 - [c114]Jack P. K. Ma, Raymond K. H. Tai, Yongjun Zhao, Sherman S. M. Chow:
Let's Stride Blindfolded in a Forest: Sublinear Multi-Client Decision Trees Evaluation. NDSS 2021 - [c113]Xiuhua Wang, Sherman S. M. Chow
:
Cross-Domain Access Control Encryption: Arbitrary-policy, Constant-size, Efficient. IEEE Symposium on Security and Privacy 2021: 748-761 - [c112]Lucien K. L. Ng, Sherman S. M. Chow:
GForce: GPU-Friendly Oblivious and Rapid Neural Network Inference. USENIX Security Symposium 2021: 2147-2164 - [i35]Xiang Yue, Minxin Du, Tianhao Wang, Yaliang Li, Huan Sun, Sherman S. M. Chow:
Differential Privacy for Text Analytics via Natural Text Sanitization. CoRR abs/2106.01221 (2021) - 2020
- [c111]Sherman S. M. Chow
, Katharina Fech, Russell W. F. Lai
, Giulio Malavolta:
Multi-client Oblivious RAM with Poly-logarithmic Communication. ASIACRYPT (2) 2020: 160-190 - [c110]Jiafan Wang, Minxin Du, Sherman S. M. Chow
:
Stargazing in the Dark: Secure Skyline Queries with SGX. DASFAA (3) 2020: 322-338 - [c109]Harry W. H. Wong, Jack P. K. Ma, Donald P. H. Wong, Lucien K. L. Ng, Sherman S. M. Chow:
Learning Model with Error - Exposing the Hidden Model of BAYHENN. IJCAI 2020: 3529-3535 - [i34]Minghui Li, Sherman S. M. Chow, Shengshan Hu, Yuejing Yan, Minxin Du, Zhibo Wang:
Optimizing Privacy-Preserving Outsourced Convolutional Neural Network Predictions. CoRR abs/2002.10944 (2020) - [i33]Sherman S. M. Chow, Katharina Fech, Russell W. F. Lai, Giulio Malavolta:
Multi-Client Oblivious RAM with Poly-Logarithmic Communication. IACR Cryptol. ePrint Arch. 2020: 1551 (2020)
2010 – 2019
- 2019
- [j31]Zhiqiang Liu, Shuyang Tang
, Sherman S. M. Chow
, Zhen Liu, Yu Long:
Fork-free hybrid consensus with flexible Proof-of-Activity. Future Gener. Comput. Syst. 96: 515-524 (2019) - [j30]Russell W. F. Lai
, Kam-Fung Cheung
, Sherman S. M. Chow
, Anthony Man-Cho So
:
Another Look at Anonymous Communication. IEEE Trans. Dependable Secur. Comput. 16(5): 731-742 (2019) - [j29]Lejla Batina, Sherman S. M. Chow
, Gerhard P. Hancke
, Zhe Liu:
Introduction to the Special Issue on Cryptographic Engineering for Internet of Things: Security Foundations, Lightweight Solutions, and Attacks. ACM Trans. Embed. Comput. Syst. 18(3): 22:1-22:3 (2019) - [c108]Shuyang Tang
, Sherman S. M. Chow
, Zhiqiang Liu, Joseph K. Liu:
Fast-to-Finalize Nakamoto-Like Consensus. ACISP 2019: 271-288 - [c107]Sherman S. M. Chow:
Can We Securely Outsource Big Data Analytics with Lightweight Cryptography? SCC@AsiaCCS 2019: 1 - [c106]Tao Zhang, Huangting Wu, Sherman S. M. Chow
:
Structure-Preserving Certificateless Encryption and Its Application. CT-RSA 2019: 1-22 - [c105]Sherman S. M. Chow
, Alexander Russell
, Qiang Tang, Moti Yung, Yongjun Zhao
, Hong-Sheng Zhou
:
Let a Non-barking Watchdog Bite: Cliptographic Signatures with an Offline Watchdog. Public Key Cryptography (1) 2019: 221-251 - [i32]Jiafan Wang, Sherman S. M. Chow:
Forward and Backward-Secure Range-Searchable Symmetric Encryption. IACR Cryptol. ePrint Arch. 2019: 497 (2019) - [i31]Asma Aloufi, Peizhao Hu, Harry W. H. Wong, Sherman S. M. Chow:
Blindfolded Evaluation of Random Forests with Multi-Key Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2019: 819 (2019) - [i30]Asma Aloufi, Peizhao Hu, Hang Liu, Sherman S. M. Chow:
Universal Location Referencing and Homomorphic Evaluation of Geospatial Query. IACR Cryptol. ePrint Arch. 2019: 820 (2019) - 2018
- [j28]Jin Li, Xiaofeng Chen, Sherman S. M. Chow
, Qiong Huang, Duncan S. Wong, Zheli Liu:
Multi-authority fine-grained access control with accountability and its application in cloud. J. Netw. Comput. Appl. 112: 89-96 (2018) - [j27]Qian Wang
, Meiqi He, Minxin Du
, Sherman S. M. Chow
, Russell W. F. Lai, Qin Zou:
Searchable Encryption over Feature-Rich Data. IEEE Trans. Dependable Secur. Comput. 15(3): 496-510 (2018) - [j26]Shengshan Hu
, Minghui Li
, Qian Wang
, Sherman S. M. Chow
, Minxin Du
:
Outsourced Biometric Identification With Privacy. IEEE Trans. Inf. Forensics Secur. 13(10): 2448-2463 (2018) - [c104]Russell W. F. Lai
, Raymond K. H. Tai, Harry W. H. Wong, Sherman S. M. Chow:
Multi-key Homomorphic Signatures Unforgeable Under Insider Corruption. ASIACRYPT (2) 2018: 465-492 - [c103]Shuyang Tang, Sherman S. M. Chow
:
Systematic Market Control of Cryptocurrency Inflations. BCC@AsiaCCS 2018: 61-63 - [c102]Sherman S. M. Chow
:
Privacy-Preserving Machine Learning. FCS 2018: 3-6 - [c101]Minghui Li
, Mingxue Zhang, Qian Wang
, Sherman S. M. Chow
, Minxin Du, Yanjiao Chen, Chenliang Li:
InstantCryptoGram: Secure Image Retrieval Service. INFOCOM 2018: 2222-2230 - [c100]Sherman S. M. Chow
, Ziliang Lai, Chris Liu, Eric Lo, Yongjun Zhao
:
Sharding Blockchain. iThings/GreenCom/CPSCom/SmartData 2018: 1665 - [c99]Weizhi Meng, Jianfeng Wang, Xianmin Wang
, Joseph K. Liu, Zuoxia Yu, Jin Li, Yongjun Zhao
, Sherman S. M. Chow
:
Position Paper on Blockchain Technology: Smart Contract and Applications. NSS 2018: 474-483 - [c98]Russell W. F. Lai, Christoph Egger, Manuel Reinert, Sherman S. M. Chow, Matteo Maffei, Dominique Schröder:
Simple Password-Hardened Encryption Services. USENIX Security Symposium 2018: 1405-1421 - [c97]Yongjun Zhao
, Sherman S. M. Chow
:
Can You Find The One for Me? WPES@CCS 2018: 54-65 - [e4]Srdjan Capkun, Sherman S. M. Chow
:
Cryptology and Network Security - 16th International Conference, CANS 2017, Hong Kong, China, November 30 - December 2, 2017, Revised Selected Papers. Lecture Notes in Computer Science 11261, Springer 2018, ISBN 978-3-030-02640-0 [contents] - [i29]Yongjun Zhao, Sherman S. M. Chow:
Can you find the one for me? Privacy-Preserving Matchmaking via Threshold PSI. IACR Cryptol. ePrint Arch. 2018: 184 (2018) - [i28]Peizhao Hu, Sherman S. M. Chow, Asma Aloufi:
Geosocial Query with User-Controlled Privacy. IACR Cryptol. ePrint Arch. 2018: 304 (2018) - 2017
- [j25]Yongjun Zhao
, Sherman S. M. Chow
:
Are you The One to Share? Secret Transfer with Access Structure. Proc. Priv. Enhancing Technol. 2017(1): 149-169 (2017) - [c96]Russell W. F. Lai
, Sherman S. M. Chow
:
Forward-Secure Searchable Encryption on Labeled Bipartite Graphs. ACNS 2017: 478-497 - [c95]Yongjun Zhao
, Sherman S. M. Chow
:
Updatable Block-Level Message-Locked Encryption. AsiaCCS 2017: 449-460 - [c94]Raymond K. H. Tai, Jack P. K. Ma, Yongjun Zhao
, Sherman S. M. Chow
:
Privacy-Preserving Decision Trees Evaluation via Linear Functions. ESORICS (2) 2017: 494-512 - [c93]Sherman S. M. Chow
, Haibin Zhang, Tao Zhang:
Real Hidden Identity-Based Signatures. Financial Cryptography 2017: 21-38 - [c92]Jiafan Wang, Sherman S. M. Chow
:
Secure Strategyproof Ascending-Price Spectrum Auction. PAC 2017: 96-106 - [c91]Russell W. F. Lai, Christoph Egger, Dominique Schröder, Sherman S. M. Chow:
Phoenix: Rebirth of a Cryptographic Password-Hardening Service. USENIX Security Symposium 2017: 899-916 - [c90]Peizhao Hu, Sherman S. M. Chow
, Asma Aloufi:
Geosocial query with user-controlled privacy. WISEC 2017: 163-172 - [i27]Russell W. F. Lai, Tao Zhang, Sherman S. M. Chow, Dominique Schröder:
Efficient Sanitizable Signatures without Random Oracles. IACR Cryptol. ePrint Arch. 2017: 268 (2017) - [i26]Shuyang Tang, Zhiqiang Liu, Sherman S. M. Chow, Zhen Liu, Yu Long:
Forking-Free Hybrid Consensus with Generalized Proof-of-Activity. IACR Cryptol. ePrint Arch. 2017: 367 (2017) - [i25]Russell W. F. Lai, Sherman S. M. Chow:
Forward-Secure Searchable Encryption on Labeled Bipartite Graphs. IACR Cryptol. ePrint Arch. 2017: 659 (2017) - 2016
- [j24]Joseph K. Liu, Sze Ling Yeo, Wun-She Yap
, Sherman S. M. Chow
, Duncan S. Wong, Willy Susilo
:
Faulty Instantiations of Threshold Ring Signature from Threshold Proof-of-Knowledge Protocol. Comput. J. 59(7): 945-954 (2016) - [j23]Sherman S. M. Chow
, Urs Hengartner, Joseph K. Liu, Kui Ren
:
Special Issue on Security and Privacy in Mobile Clouds. Pervasive Mob. Comput. 28: 100-101 (2016) - [j22]Fei Chen, Tao Xiang
, Yuanyuan Yang
, Sherman S. M. Chow
:
Secure Cloud Storage Meets with Secure Network Coding. IEEE Trans. Computers 65(6): 1936-1948 (2016) - [c89]Sherman S. M. Chow
:
Functional Credentials for Internet of Things. IoTPTS@AsiaCCS 2016: 1 - [c88]Tao Zhang, Sherman S. M. Chow
, Jinyuan Sun:
Password-Controlled Encryption with Accountable Break-Glass Access. AsiaCCS 2016: 235-246 - [c87]Zhe Zhou, Tao Zhang, Sherman S. M. Chow
, Yupeng Zhang, Kehuan Zhang:
Efficient Authenticated Multi-Pattern Matching. AsiaCCS 2016: 593-604 - [c86]Cong Zhang, David Cash, Xiuhua Wang, Xiaoqi Yu, Sherman S. M. Chow
:
Combiners for Chosen-Ciphertext Security. COCOON 2016: 257-268 - [c85]Russell W. F. Lai, Tao Zhang, Sherman S. M. Chow
, Dominique Schröder
:
Efficient Sanitizable Signatures Without Random Oracles. ESORICS (1) 2016: 363-380 - [c84]Yu-Chi Chen
, Sherman S. M. Chow
, Kai-Min Chung
, Russell W. F. Lai
, Wei-Kai Lin, Hong-Sheng Zhou
:
Cryptography for Parallel RAM from Indistinguishability Obfuscation. ITCS 2016: 179-190 - [c83]Tao Zhang, Sherman S. M. Chow
, Zhe Zhou, Ming Li:
Privacy-Preserving Wi-Fi Fingerprinting Indoor Localization. IWSEC 2016: 215-233 - [c82]Russell W. F. Lai
, Henry K. F. Cheung
, Sherman S. M. Chow
, Anthony Man-Cho So
:
Another Look at Anonymous Communication - Security and Modular Constructions. Mycrypt 2016: 56-82 - [c81]Sherman S. M. Chow
, Russell W. F. Lai, Xiuhua Wang, Yongjun Zhao
:
Privacy Preserving Credit Systems. NSS 2016: 184-199 - [c80]Yu Chen, Baodong Qin, Jiang Zhang
, Yi Deng, Sherman S. M. Chow
:
Non-Malleable Functions and Their Applications. Public Key Cryptography (2) 2016: 386-416 - [c79]Yongjun Zhao
, Sherman S. M. Chow
:
Towards Proofs of Ownership Beyond Bounded Leakage. ProvSec 2016: 340-350 - [c78]Sherman S. M. Chow
:
A Framework of Multi-Authority Attribute-Based Encryption with Outsourcing and Revocation. SACMAT 2016: 215-226 - [c77]Tao Zhang, Xiuhua Wang, Sherman S. M. Chow
:
Privacy-Preserving Multi-pattern Matching. SecureComm 2016: 199-218 - [c76]Russell W. F. Lai, Sherman S. M. Chow
:
Parallel and Dynamic Structured Encryption. SecureComm 2016: 219-238 - [c75]Shengshan Hu
, Qian Wang
, Jingjun Wang, Sherman S. M. Chow
, Qin Zou:
Securing Fast Learning! Ridge Regression over Encrypted Big Data. Trustcom/BigDataSE/ISPA 2016: 19-26 - [i24]Russell W. F. Lai, Raymond K. H. Tai, Harry W. H. Wong, Sherman S. M. Chow:
A Zoo of Homomorphic Signatures: Multi-Key and Key-Homomorphism. IACR Cryptol. ePrint Arch. 2016: 834 (2016) - 2015
- [j21]Ying-Kai Tang, Sherman S. M. Chow
, Joseph K. Liu
:
Comments on 'Efficient Revocable Certificateless Encryption Secure in the Standard Model'. Comput. J. 58(4): 779-781 (2015) - [j20]Zongyang Zhang
, Sherman S. M. Chow
, Zhenfu Cao
:
Post-challenge leakage in public-key encryption. Theor. Comput. Sci. 572: 25-49 (2015) - [j19]Yujue Wang, Duncan S. Wong, Qianhong Wu, Sherman S. M. Chow
, Bo Qin, Jianwei Liu
, Yong Ding:
Practical (fully) distributed signatures provably secure in the standard model. Theor. Comput. Sci. 595: 143-158 (2015) - [j18]Joseph K. Liu
, Cheng-Kang Chu, Sherman S. M. Chow
, Xinyi Huang, Man Ho Au
, Jianying Zhou
:
Time-Bound Anonymous Authentication for Roaming Networks. IEEE Trans. Inf. Forensics Secur. 10(1): 178-189 (2015) - [c74]Tsz Hon Yuen
, Cong Zhang, Sherman S. M. Chow
, Siu-Ming Yiu:
Related Randomness Attacks for Public Key Cryptosystems. AsiaCCS 2015: 215-223 - [c73]Yongjun Zhao
, Sherman S. M. Chow
:
Privacy Preserving Collaborative Filtering from Asymmetric Randomized Encoding. Financial Cryptography 2015: 459-477 - [c72]Russell W. F. Lai, Sherman S. M. Chow
:
Structured Encryption with Non-interactive Updates and Parallel Traversal. ICDCS 2015: 776-777 - [c71]Zongyang Zhang, Yu Chen, Sherman S. M. Chow
, Goichiro Hanaoka
, Zhenfu Cao
, Yunlei Zhao:
Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model. ProvSec 2015: 435-454 - [e3]Feng Bao, Steven Miller, Sherman S. M. Chow
, Danfeng Yao:
Proceedings of the 3rd International Workshop on Security in Cloud Computing, SCC@ASIACCS '15, Singapore, Republic of Singapore, April 14, 2015. ACM 2015, ISBN 978-1-4503-3447-1 [contents] - [i23]Yu-Chi Chen, Sherman S. M. Chow, Kai-Min Chung, Russell W. F. Lai, Wei-Kai Lin, Hong-Sheng Zhou:
Computation-Trace Indistinguishability Obfuscation and its Applications. IACR Cryptol. ePrint Arch. 2015: 406 (2015) - [i22]Yongjun Zhao, Sherman S. M. Chow:
Are you The One to Share? Secret Transfer with Access Structure. IACR Cryptol. ePrint Arch. 2015: 929 (2015) - [i21]Yu Chen, Baodong Qin, Jiang Zhang, Yi Deng, Sherman S. M. Chow:
Non-Malleable Functions and Their Applications. IACR Cryptol. ePrint Arch. 2015: 1253 (2015) - 2014
- [j17]Yue Tong, Jinyuan Sun, Sherman S. M. Chow
, Pan Li
:
Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability. IEEE J. Biomed. Health Informatics 18(2): 419-429 (2014) - [j16]Cheng-Kang Chu, Sherman S. M. Chow
, Wen-Guey Tzeng, Jianying Zhou
, Robert H. Deng
:
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage. IEEE Trans. Parallel Distributed Syst. 25(2): 468-477 (2014) - [c70]Zongyang Zhang, Yu Chen, Sherman S. M. Chow
, Goichiro Hanaoka, Zhenfu Cao
, Yunlei Zhao:
All-but-One Dual Projective Hashing and Its Applications. ACNS 2014: 181-198 - [c69]Hua Deng, Qianhong Wu, Bo Qin, Sherman S. M. Chow
, Josep Domingo-Ferrer
, Wenchang Shi:
Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data. AsiaCCS 2014: 425-434 - [c68]Tao Zhang, Sherman S. M. Chow
:
Security of Direct Anonymous Authentication Using TPM 2.0 Signature - A Possible Implementation Flaw. Inscrypt 2014: 37-48 - [c67]Russell W. F. Lai, Henry K. F. Cheung
, Sherman S. M. Chow
:
Trapdoors for Ideal Lattices with Applications. Inscrypt 2014: 239-256 - [c66]Boyang Wang, Ming Li, Sherman S. M. Chow
, Hui Li:
A tale of two clouds: Computing on data encrypted under multiple keys. CNS 2014: 337-345 - [c65]Sherman S. M. Chow
, Matthew K. Franklin, Haibin Zhang:
Practical Dual-Receiver Encryption - Soundness, Complete Non-malleability, and Applications. CT-RSA 2014: 85-105 - [c64]Yujue Wang, Duncan S. Wong, Qianhong Wu, Sherman S. M. Chow
, Bo Qin, Jianwei Liu
:
Practical Distributed Signatures in the Standard Model. CT-RSA 2014: 307-326 - [c63]Yujue Wang, Qianhong Wu, Duncan S. Wong, Bo Qin, Sherman S. M. Chow
, Zhen Liu, Xiao Tan:
Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage. ESORICS (1) 2014: 326-343 - [c62]Fei Chen, Tao Xiang
, Yuanyuan Yang
, Sherman S. M. Chow
:
Secure cloud storage meets with secure network coding. INFOCOM 2014: 673-681 - [e2]Sherman S. M. Chow
, Jan Camenisch, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Information Security - 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014. Proceedings. Lecture Notes in Computer Science 8783, Springer 2014, ISBN 978-3-319-13256-3 [contents] - [e1]Sherman S. M. Chow
, Joseph K. Liu, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings. Lecture Notes in Computer Science 8782, Springer 2014, ISBN 978-3-319-12474-2 [contents] - [i20]Pili Hu, Sherman S. M. Chow, Wing Cheong Lau:
Secure Friend Discovery via Privacy-Preserving and Decentralized Community Detection. CoRR abs/1405.4951 (2014) - [i19]Tsz Hon Yuen, Sherman S. M. Chow, Cong Zhang, Siu-Ming Yiu:
Exponent-inversion Signatures and IBE under Static Assumptions. IACR Cryptol. ePrint Arch. 2014: 311 (2014) - 2013
- [j15]Masayuki Abe, Sherman S. M. Chow
, Kristiyan Haralambiev, Miyako Ohkubo:
Double-trapdoor anonymous tags for traceable signatures. Int. J. Inf. Sec. 12(1): 19-31 (2013) - [j14]Sherman S. M. Chow
, Man Ho Au
, Willy Susilo
:
Server-aided signatures verification secure against collusion attack. Inf. Secur. Tech. Rep. 17(3): 46-57 (2013) - [j13]Man Ho Au
, Willy Susilo
, Yi Mu, Sherman S. M. Chow
:
Constant-Size Dynamic $k$ -Times Anonymous Authentication. IEEE Syst. J. 7(2): 249-261 (2013) - [j12]Cong Wang
, Sherman S. M. Chow
, Qian Wang
, Kui Ren
, Wenjing Lou:
Privacy-Preserving Public Auditing for Secure Cloud Storage. IEEE Trans. Computers 62(2): 362-375 (2013) - [c61]Cong Zhang, Tsz Hon Yuen
, Hao Xiong, Sherman S. M. Chow
, Siu-Ming Yiu, Yi Jun He:
Multi-key leakage-resilient threshold cryptography. AsiaCCS 2013: 61-70 - [c60]Lei Zhang, Qianhong Wu, Josep Domingo-Ferrer
, Bo Qin, Sherman S. M. Chow
, Wenchang Shi:
Secure One-to-Group Communications Escrow-Free ID-Based Asymmetric Group Key Agreement. Inscrypt 2013: 239-254 - [c59]Boyang Wang, Ming Li, Sherman S. M. Chow
, Hui Li:
Computing encrypted cloud data efficiently under multiple keys. CNS 2013: 504-513 - [c58]Yue Tong, Jinyuan Sun, Sherman S. M. Chow
, Pan Li
:
Towards auditable cloud-assisted access of encrypted health data. CNS 2013: 514-519 - [c57]Tolga Acar, Sherman S. M. Chow
, Lan Nguyen:
Accumulators and U-Prove Revocation. Financial Cryptography 2013: 189-196 - [c56]