The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Duncan S. Wong: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Bessie C. Hu, Duncan S. Wong, Zhenfeng Zhang, Xiaotie Deng
    Key Replacement Attack Against a Generic Construction of Certificateless Signature. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:235-246 [Conf]
  2. Joseph K. Liu, Victor K. Wei, Duncan S. Wong
    Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:325-335 [Conf]
  3. Guomin Yang, Duncan S. Wong, Xiaotie Deng
    Deposit-Case Attack Against Secure Roaming. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:417-428 [Conf]
  4. Zhenfeng Zhang, Duncan S. Wong, Jing Xu, Dengguo Feng
    Certificateless Public-Key Signature: Security Model and Efficient Construction. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:293-308 [Conf]
  5. Guomin Yang, Duncan S. Wong, Xiaotie Deng
    Efficient Anonymous Roaming and Its Security Analysis. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:334-349 [Conf]
  6. Duncan S. Wong, Hector Ho Fuentes, Agnes Hui Chan
    The Performance Measurement of Cryptographic Primitives on Palm Devices. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:92-101 [Conf]
  7. Duncan S. Wong, Agnes Hui Chan
    Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:272-289 [Conf]
  8. Jonathan Wong, Duncan S. Wong
    Known Session Key Attack Against a Collection of Signcryption Schemes. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:119-126 [Conf]
  9. Xiaojian Tian, Duncan S. Wong
    Session Corruption Attack and Improvements on Encryption Based MT-Authenticators. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2006, pp:34-51 [Conf]
  10. Joseph K. Liu, Patrick P. Tsang, Duncan S. Wong
    Efficient Verifiable Ring Encryption for Ad Hoc Groups. [Citation Graph (0, 0)][DBLP]
    ESAS, 2005, pp:1-13 [Conf]
  11. Joseph K. Liu, Patrick P. Tsang, Duncan S. Wong
    Recoverable and Untraceable E-Cash. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2005, pp:206-214 [Conf]
  12. Joseph K. Liu, Duncan S. Wong
    Linkable Ring Signatures: Security Models and New Schemes. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:614-623 [Conf]
  13. Duncan S. Wong, Karyin Fung, Joseph K. Liu, Victor K. Wei
    On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:34-46 [Conf]
  14. Guomin Yang, Duncan S. Wong, Huaxiong Wang, Xiaotie Deng
    Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper). [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:82-91 [Conf]
  15. Joseph K. Liu, Patrick P. Tsang, Duncan S. Wong, Robert W. Zhu
    Universal Custodian-Hiding Verifiable Encryption for Discrete Logarithms. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:389-409 [Conf]
  16. Joseph K. Liu, Duncan S. Wong
    On the Security Models of (Threshold) Ring Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:204-217 [Conf]
  17. Joseph K. Liu, Victor K. Wei, Duncan S. Wong
    A Separable Threshold Ring Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:12-26 [Conf]
  18. Duncan S. Wong, Agnes Hui Chan, Feng Zhu
    Password Authenticated Key Exchange for Resource-Constrained Wireless Communications (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:827-834 [Conf]
  19. Patrick P. Tsang, Victor K. Wei, Tony K. Chan, Man Ho Au, Joseph K. Liu, Duncan S. Wong
    Separable Linkable Threshold Ring Signatures. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:384-398 [Conf]
  20. Duncan S. Wong, Agnes Hui Chan, Feng Zhu
    More Efficient Password Authenticated Key Exchange Based on RSA. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:375-387 [Conf]
  21. Joseph K. Liu, Duncan S. Wong
    A Restricted Multi-show Credential System and Its Application on E-Voting. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:268-279 [Conf]
  22. Guomin Yang, Duncan S. Wong, Xiaotie Deng
    Analysis and Improvement of a Signcryption Scheme with Key Privacy. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:218-232 [Conf]
  23. Feng Zhu, Duncan S. Wong, Agnes Hui Chan, Robbie Ye
    Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:150-161 [Conf]
  24. Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Duncan S. Wong
    ID-Based Ring Signature Scheme Secure in the Standard Model. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:1-16 [Conf]
  25. Joseph K. Liu, Willy Susilo, Duncan S. Wong
    Ring Signature with Designated Linkability. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:104-119 [Conf]
  26. Duncan S. Wong
    Security Analysis of Two Anonymous Authentication Protocols for Distributed Wireless Networks. [Citation Graph (0, 0)][DBLP]
    PerCom Workshops, 2005, pp:284-288 [Conf]
  27. Guomin Yang, Duncan S. Wong, Xiaotie Deng, Huaxiong Wang
    Anonymous Signature Schemes. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:347-363 [Conf]
  28. Joseph K. Liu, Sandy H. Wong, Duncan S. Wong
    Transferable E-Cash Revisit. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:171-188 [Conf]
  29. Robert W. Zhu, Guomin Yang, Duncan S. Wong
    An Efficient Identity-Based Key Exchange Protocol with KGS Forward Secrecy for Low-Power Devices. [Citation Graph (0, 0)][DBLP]
    WINE, 2005, pp:500-509 [Conf]
  30. Joseph K. Liu, Victor K. Wei, Duncan S. Wong
    Custodian-Hiding Verifiable Encryption. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:51-64 [Conf]
  31. Shoulun Long, Josef Pieprzyk, Huaxiong Wang, Duncan S. Wong
    Generalised Cumulative Arrays in Secret Sharing. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2006, v:40, n:2, pp:191-209 [Journal]
  32. Bessie C. Hu, Duncan S. Wong, Zhenfeng Zhang, Xiaotie Deng
    Certificateless signature: a new security model and an improved generic construction. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2007, v:42, n:2, pp:109-126 [Journal]
  33. Reihaneh Safavi-Naini, Huaxiong Wang, Duncan S. Wong
    Resilient Lkh: Secure Multicast Key Distribution Schemes. [Citation Graph (0, 0)][DBLP]
    Int. J. Found. Comput. Sci., 2006, v:17, n:5, pp:1205-1222 [Journal]
  34. Joseph K. Liu, Duncan S. Wong
    Enhanced Security Models and a Generic Construction Approach for Linkable Ring Signature. [Citation Graph (0, 0)][DBLP]
    Int. J. Found. Comput. Sci., 2006, v:17, n:6, pp:1403-1422 [Journal]
  35. Duncan S. Wong
    An optimized authentication protocol for mobile network reconsidered. [Citation Graph (0, 0)][DBLP]
    Mobile Computing and Communications Review, 2002, v:6, n:4, pp:74-76 [Journal]
  36. Qiong Huang, Duncan S. Wong
    Generic Certificateless Key Encapsulation Mechanism. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:215-229 [Conf]
  37. Xinyi Huang, Yi Mu, Willy Susilo, Duncan S. Wong, Wei Wu
    Certificateless Signature Revisited. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:308-322 [Conf]
  38. Qiong Huang, Duncan S. Wong, Yiming Zhao
    Generic Transformation to Strongly Unforgeable Signatures. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:1-17 [Conf]
  39. Guomin Yang, Jing Chen, Duncan S. Wong, Xiaotie Deng, Dongsheng Wang
    A More Natural Way to Construct Identity-Based Identification Schemes. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:307-322 [Conf]
  40. Sherman S. M. Chow, Duncan S. Wong
    Anonymous Identification and Designated-Verifiers Signatures from Insecure Batch Verification. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2007, pp:203-219 [Conf]
  41. Chung Ki Li, Guomin Yang, Duncan S. Wong, Xiaotie Deng, Sherman S. M. Chow
    An Efficient Signcryption Scheme with Key Privacy. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2007, pp:78-93 [Conf]
  42. Bessie C. Hu, Duncan S. Wong, Qiong Huang, Guomin Yang, Xiaotie Deng
    Time Capsule Signature: Efficient and Provably Secure Constructions. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2007, pp:126-142 [Conf]
  43. Haimin Jin, Duncan S. Wong, Yinlong Xu
    An Efficient Password-Only Two-Server Authenticated Key Exchange System. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:44-56 [Conf]
  44. Dennis Y. W. Liu, Duncan S. Wong, Xinyi Huang, Guilin Wang, Qiong Huang, Yi Mu, Willy Susilo
    Formal Definition and Construction of Nominative Signature. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:57-68 [Conf]
  45. Qiong Huang, Duncan S. Wong
    Generic Certificateless Encryption in the Standard Model. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2007, pp:278-291 [Conf]
  46. Dennis Y. W. Liu, Shuang Chang, Duncan S. Wong, Yi Mu
    Nominative Signature from Ring Signature. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2007, pp:396-411 [Conf]
  47. Guilin Wang, Joonsang Baek, Duncan S. Wong, Feng Bao
    On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:43-60 [Conf]
  48. Robert W. Zhu, Guomin Yang, Duncan S. Wong
    An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2007, v:378, n:2, pp:198-207 [Journal]

  49. Traceable and Retrievable Identity-Based Encryption. [Citation Graph (, )][DBLP]


  50. Generic Security-Amplifying Methods of Ordinary Digital Signatures. [Citation Graph (, )][DBLP]


  51. Ambiguous Optimistic Fair Exchange. [Citation Graph (, )][DBLP]


  52. Efficient Non-interactive Range Proof. [Citation Graph (, )][DBLP]


  53. Further Discussions on the Security of a Nominative Signature Scheme. [Citation Graph (, )][DBLP]


  54. Probabilistic Public Key Encryption with Equality Test. [Citation Graph (, )][DBLP]


  55. Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles. [Citation Graph (, )][DBLP]


  56. The Design of A Rule-based and Event-driven Trust Management Framework. [Citation Graph (, )][DBLP]


  57. TinyPairing: Computing Tate Pairing on Sensor Nodes with Higher Speed and Less Memory. [Citation Graph (, )][DBLP]


  58. Robust Receipt-Free Election System with Ballot Secrecy and Verifiability. [Citation Graph (, )][DBLP]


  59. A More Efficient Convertible Nominative Signature. [Citation Graph (, )][DBLP]


  60. TinyPairing: A Fast and Lightweight Pairing-Based Cryptographic Library for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002