|
Search the dblp DataBase
Patrick P. Tsang:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Joseph K. Liu, Patrick P. Tsang, Duncan S. Wong
Efficient Verifiable Ring Encryption for Ad Hoc Groups. [Citation Graph (0, 0)][DBLP] ESAS, 2005, pp:1-13 [Conf]
- Man Ho Au, Sherman S. M. Chow, Willy Susilo, Patrick P. Tsang
Short Linkable Ring Signatures Revisited. [Citation Graph (0, 0)][DBLP] EuroPKI, 2006, pp:101-115 [Conf]
- Joseph K. Liu, Patrick P. Tsang, Duncan S. Wong
Recoverable and Untraceable E-Cash. [Citation Graph (0, 0)][DBLP] EuroPKI, 2005, pp:206-214 [Conf]
- Joseph K. Liu, Patrick P. Tsang, Duncan S. Wong, Robert W. Zhu
Universal Custodian-Hiding Verifiable Encryption for Discrete Logarithms. [Citation Graph (0, 0)][DBLP] ICISC, 2005, pp:389-409 [Conf]
- Patrick P. Tsang, Victor K. Wei, Tony K. Chan, Man Ho Au, Joseph K. Liu, Duncan S. Wong
Separable Linkable Threshold Ring Signatures. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2004, pp:384-398 [Conf]
- Patrick P. Tsang, Victor K. Wei
Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation. [Citation Graph (0, 0)][DBLP] ISPEC, 2005, pp:48-60 [Conf]
- Patrick P. Tsang, Sherman S. M. Chow, Sean W. Smith
Batch Pairing Delegation. [Citation Graph (0, 0)][DBLP] IWSEC, 2007, pp:74-90 [Conf]
- Peter C. Johnson, Apu Kapadia, Patrick P. Tsang, Sean W. Smith
Nymble: Anonymous IP-Address Blocking. [Citation Graph (0, 0)][DBLP] Privacy Enhancing Technologies, 2007, pp:113-133 [Conf]
PPAA: Peer-to-Peer Anonymous Authentication. [Citation Graph (, )][DBLP]
Blacklistable anonymous credentials: blocking misbehaving users without ttps. [Citation Graph (, )][DBLP]
PEREA: towards practical TTP-free revocation in anonymous authentication. [Citation Graph (, )][DBLP]
Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems. [Citation Graph (, )][DBLP]
Secure Cryptographic Precomputation with Insecure Memory. [Citation Graph (, )][DBLP]
Combating Spam and Denial-of-Service Attacks with Trusted Puzzle Solvers. [Citation Graph (, )][DBLP]
Attribute-Based Publishing with Hidden Credentials and Hidden Policies. [Citation Graph (, )][DBLP]
YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems. [Citation Graph (, )][DBLP]
Search in 0.013secs, Finished in 0.014secs
|