The SCEAS System
Navigation Menu

Search the dblp DataBase


Patrick P. Tsang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Joseph K. Liu, Patrick P. Tsang, Duncan S. Wong
    Efficient Verifiable Ring Encryption for Ad Hoc Groups. [Citation Graph (0, 0)][DBLP]
    ESAS, 2005, pp:1-13 [Conf]
  2. Man Ho Au, Sherman S. M. Chow, Willy Susilo, Patrick P. Tsang
    Short Linkable Ring Signatures Revisited. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2006, pp:101-115 [Conf]
  3. Joseph K. Liu, Patrick P. Tsang, Duncan S. Wong
    Recoverable and Untraceable E-Cash. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2005, pp:206-214 [Conf]
  4. Joseph K. Liu, Patrick P. Tsang, Duncan S. Wong, Robert W. Zhu
    Universal Custodian-Hiding Verifiable Encryption for Discrete Logarithms. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:389-409 [Conf]
  5. Patrick P. Tsang, Victor K. Wei, Tony K. Chan, Man Ho Au, Joseph K. Liu, Duncan S. Wong
    Separable Linkable Threshold Ring Signatures. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:384-398 [Conf]
  6. Patrick P. Tsang, Victor K. Wei
    Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:48-60 [Conf]
  7. Patrick P. Tsang, Sherman S. M. Chow, Sean W. Smith
    Batch Pairing Delegation. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2007, pp:74-90 [Conf]
  8. Peter C. Johnson, Apu Kapadia, Patrick P. Tsang, Sean W. Smith
    Nymble: Anonymous IP-Address Blocking. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2007, pp:113-133 [Conf]

  9. PPAA: Peer-to-Peer Anonymous Authentication. [Citation Graph (, )][DBLP]

  10. Blacklistable anonymous credentials: blocking misbehaving users without ttps. [Citation Graph (, )][DBLP]

  11. PEREA: towards practical TTP-free revocation in anonymous authentication. [Citation Graph (, )][DBLP]

  12. Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems. [Citation Graph (, )][DBLP]

  13. Secure Cryptographic Precomputation with Insecure Memory. [Citation Graph (, )][DBLP]

  14. Combating Spam and Denial-of-Service Attacks with Trusted Puzzle Solvers. [Citation Graph (, )][DBLP]

  15. Attribute-Based Publishing with Hidden Credentials and Hidden Policies. [Citation Graph (, )][DBLP]

  16. YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems. [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.004secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002