The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Sherman S. M. Chow: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow
    Two Improved Partially Blind Signature Schemes from Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:316-328 [Conf]
  2. Richard W. C. Lui, Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu
    Role Activation Management in Role Based Access Control. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:358-369 [Conf]
  3. Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui
    Efficient Identity Based Ring Signature. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:499-512 [Conf]
  4. Sherman S. M. Chow, H. W. Go, Ricky W. M. Tang
    Impact of Recent Advances in Crytography on Online Game. [Citation Graph (0, 0)][DBLP]
    ADCOG, 2004, pp:68-73 [Conf]
  5. Sherman S. M. Chow, Victor K.-W. Wei, Joseph K. Liu, Tsz Hon Yuen
    Ring signatures without random oracles. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:297-302 [Conf]
  6. Sherman S. M. Chow, Zhengjun Cao, Joseph K. Liu
    Security Analysis of Three Cryptographic Schemes from Other Cryptographic Schemes. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:290-301 [Conf]
  7. Man Ho Au, Sherman S. M. Chow, Willy Susilo, Patrick P. Tsang
    Short Linkable Ring Signatures Revisited. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2006, pp:101-115 [Conf]
  8. Sherman S. M. Chow
    Identity-Based Strong Multi-Designated Verifiers Signatures. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2006, pp:257-259 [Conf]
  9. Sherman S. M. Chow, Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu
    Identity Based Ring Signature: Why, How and What Next. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2005, pp:144-161 [Conf]
  10. Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow
    An e-Lottery Scheme Using Verifiable Random Function. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2005, pp:651-660 [Conf]
  11. Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow
    Secure Hierarchical Identity Based Signature and Its Application. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:480-494 [Conf]
  12. Sherman S. M. Chow, Willy Susilo
    Generic Construction of (Identity-Based) Perfect Concurrent Signatures. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:194-206 [Conf]
  13. Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu
    Identity Based Threshold Ring Signature. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:218-232 [Conf]
  14. Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui, K. P. Chow
    Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:352-369 [Conf]
  15. Richard W. C. Lui, Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu
    Supporting Efficient Authorization in Delegation with Supervision. [Citation Graph (0, 0)][DBLP]
    ICPADS (2), 2005, pp:240-244 [Conf]
  16. Ai Fen Sui, Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow, Wai Wan Tsang, C. F. Chong, Kevin K. H. Pun, H. W. Chan
    Separable and Anonymous Identity-Based Key Issuing. [Citation Graph (0, 0)][DBLP]
    ICPADS (2), 2005, pp:275-279 [Conf]
  17. Man Ho Au, Sherman S. M. Chow, Willy Susilo
    Short E-Cash. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2005, pp:332-346 [Conf]
  18. Sherman S. M. Chow, Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu
    Identity Based Delegation Network. [Citation Graph (0, 0)][DBLP]
    Mycrypt, 2005, pp:99-115 [Conf]
  19. Sherman S. M. Chow, Colin Boyd, Juan Manuel González Nieto
    Security-Mediated Certificateless Cryptography. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:508-524 [Conf]
  20. Sherman S. M. Chow, Tsz Hon Yuen, Lucas Chi Kwong Hui, Siu-Ming Yiu
    Signcryption in Hierarchical Identity Based Cryptosystem. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:443-457 [Conf]
  21. Sherman S. M. Chow
    Verifiable Pairing and Its Applications. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:170-187 [Conf]
  22. Sherman S. M. Chow, Willy Susilo, Tsz Hon Yuen
    Escrowed Linkability of Ring Signatures and Its Applications. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:175-192 [Conf]
  23. Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow
    Practical electronic lotteries with offline TTP. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:15, pp:2830-2840 [Journal]
  24. Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow, Richard W. C. Lui
    A generic anti-spyware solution by access control list at kernel level. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:75, n:1-2, pp:227-234 [Journal]
  25. Wun-She Yap, Sherman S. M. Chow, Swee-Huay Heng, Bok-Min Goi
    Security Mediated Certificateless Signatures. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:459-477 [Conf]
  26. Sherman S. M. Chow
    Running on Karma - P2P Reputation and Currency Systems. [Citation Graph (0, 0)][DBLP]
    CANS, 2007, pp:146-158 [Conf]
  27. Sherman S. M. Chow, Duncan S. Wong
    Anonymous Identification and Designated-Verifiers Signatures from Insecure Batch Verification. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2007, pp:203-219 [Conf]
  28. Chung Ki Li, Guomin Yang, Duncan S. Wong, Xiaotie Deng, Sherman S. M. Chow
    An Efficient Signcryption Scheme with Key Privacy. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2007, pp:78-93 [Conf]
  29. Sherman S. M. Chow
    Token-Controlled Public Key Encryption in the Standard Model. [Citation Graph (0, 0)][DBLP]
    ISC, 2007, pp:315-332 [Conf]
  30. Sherman S. M. Chow, Kim-Kwang Raymond Choo
    Strongly-Secure Identity-Based Key Agreement and Anonymous Extension. [Citation Graph (0, 0)][DBLP]
    ISC, 2007, pp:203-220 [Conf]
  31. Patrick P. Tsang, Sherman S. M. Chow, Sean W. Smith
    Batch Pairing Delegation. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2007, pp:74-90 [Conf]

  32. Conditional Proxy Broadcast Re-Encryption. [Citation Graph (, )][DBLP]


  33. Improving privacy and security in multi-authority attribute-based encryption. [Citation Graph (, )][DBLP]


  34. Zero-Knowledge Argument for Simultaneous Discrete Logarithms. [Citation Graph (, )][DBLP]


  35. Proxy Re-signatures in the Standard Model. [Citation Graph (, )][DBLP]


  36. Robust Receipt-Free Election System with Ballot Secrecy and Verifiability. [Citation Graph (, )][DBLP]


  37. Two-Party Computation Model for Privacy-Preserving Queries over Distributed Databases. [Citation Graph (, )][DBLP]


  38. Removing Escrow from Identity-Based Encryption. [Citation Graph (, )][DBLP]


  39. Brief announcement: improving social-network-based sybil-resilient node admission control. [Citation Graph (, )][DBLP]


  40. Real Traceable Signatures. [Citation Graph (, )][DBLP]


  41. General Certificateless Encryption and Timed-Release Encryption. [Citation Graph (, )][DBLP]


  42. Timed-Release Encryption Revisited. [Citation Graph (, )][DBLP]


  43. Efficient Unidirectional Proxy Re-Encryption. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002